Always in control? Sovereign states in cyberspace [PDF]
For well over twenty years, we have witnessed an intriguing debate about the nature of cyberspace. Used for everything from communication to commerce, it has transformed the way individuals and societies live.
Mainwaring, Sarah
core +1 more source
Negotiating cultures in cyberspace [PDF]
In this paper we report findings of a multidisciplinary study of online participation by culturally diverse participants in a distance adult education course offered in Canada and examine in detail three of the study's findings.
Chase, Mackie +3 more
core +1 more source
Voluntary Vaccination through Self-organizing Behaviors on Locally-mixed Social Networks
Voluntary vaccination reflects how individuals weigh the risk of infection and the cost of vaccination against the spread of vaccine-preventable diseases, such as smallpox and measles.
Benyun Shi +5 more
doaj +1 more source
Research on cyberspace security situation awareness
Cyberspace is the fifth sovereignty space after the sea,land,sky and space.The security of cyberspace is closely relative to national security.How to discover threat in time,how to defense network attack,how to trace attackers were the problems to be ...
Gan-sen ZHAO,Jie-chao WU,Zi-hao CHEN,Xue-qi REN,Hao-xiang TAN +1 more
doaj +3 more sources
Reconfiguring Interactivity, Agency and Pleasure in the Education and Computer Games Debate – using Žižek’s concept of interpassivity to analyse educational play [PDF]
Digital or computer games have recently attracted the interest of education researchers and policy-makers for two main reasons: their interactivity, which is said to allow greater agency, and their inherent pleasures, which is linked to increased ...
Pelletier, Caroline
core +2 more sources
A Many-Objective Evolutionary Algorithm Based on Indicator and Decomposition
In the field of many-objective evolutionary optimization algorithms (MaOEAs), how to maintain the balance between convergence and diversity has been a significant research problem.
Yizhang Xia +5 more
doaj +1 more source
Model and application of cyberspace information system
For the visualization of cyberspace is still using the traditional geographic information system,which makes it difficult to truly express the characteristics and laws of cyberspace,a multi-scale,multi-dimensional and multi-view cyberspace information ...
Jilong WANG +3 more
doaj +2 more sources
Identifying the Challenges of Users in Using the Services of Electronic Health Platforms [PDF]
Introduction: In recent years, especially with the spread of the COVID-19 disease, the use of electronic health services has increased greatly. Along with the growth and development of the use of electronic services among users, the concern about ethical
Nafiseh Salehnia, Fatemeh Salehnia
doaj
Phishing Node Detection in Ethereum Transaction Network Using Graph Convolutional Networks
As the use of digital currencies, such as cryptocurrencies, increases in popularity, phishing scams and other cybercriminal activities on blockchain platforms (e.g., Ethereum) have also risen.
Zhen Zhang +5 more
doaj +1 more source
Adversarial Attack for Deep Steganography Based on Surrogate Training and Knowledge Diffusion
Deep steganography (DS), using neural networks to hide one image in another, has performed well in terms of invisibility, embedding capacity, etc. Current steganalysis methods for DS can only detect or remove secret images hidden in natural images and ...
Fangjian Tao +5 more
doaj +1 more source

