Results 61 to 70 of about 165,246 (172)

eTime [PDF]

open access: yes
The paper examines various measures of time and argues that none of the measures meet the needs of commerce and law for transactions carried out in the cyberspace. It therefore suggests that a new measure of the time and epoch, called eTime be introduced.
Singh J P
core  

Anonymity In Cyberspace: Judicial and Legislative Regulations [PDF]

open access: yes, 2013
Historically, the scope of constitutional protections for fundamental rights has evolved to keep pace with new social norms and new technology. Internet speech is on the rise. The First Amendment protects an individual’s right to speak anonymously, but
Qasir, Sophia
core   +1 more source

Honey password vaults tolerating leakage of both personally identifiable information and passwords

open access: yesCybersecurity
Honey vaults are useful tools for password management. A vault usually contains usernames for each domain, and the corresponding passwords, encrypted with a master password chosen by the owner.
Chao An   +4 more
doaj   +1 more source

Internet innovations:exploring new horizons [PDF]

open access: yes, 2014
The aim of this paper is to provide a standpoint on an emerging trend in sharing digital video content over the Internet. The paper is based on participative evaluative analysis of business model employed by digital video content sharing providers.
Avramenko, Alex, Tamadon-Nejad, Parveen
core   +1 more source

PERANCANGAN INTERFACE APLIKASI E-SKRIPSI BERBASIS ANDROID

open access: yesCyberspace, 2019
Skripsimerupakan suatu karya tulis ilmiah yang dibuat oleh mahasiswa sebagai tugas akhir untuk memperoleh gelar sarjana dari perguruan tinggi. Untuk membuat skripsi tentunya tidak mudah, mahasiswa harus terlebih dahulu mengajukan judul dari skripsi yang ...
Rike Mahara, Basrul Basrul
doaj   +1 more source

PENGELOLAAN INFORMASI PENYELENGGARAAN CONFERENCE TERPADU DI UIN AR-RANIRY BANDA ACEH DENGAN APLIKASI OPEN CONFERENCE SYSTEM (OCS)

open access: yesCyberspace, 2019
This research was motivated by information media in holding a conference at UIN Ar-Raniry which was considered to be still less effective in disseminating conference information to be held.
Rahmad Ade Akbar   +2 more
doaj   +1 more source

Who Is Caring for the Caregiver? The Role of Cybercoping for Dementia Caregivers [PDF]

open access: yes, 2018
The purpose of this study is to investigate the relationship between dementia caregivers’ communication behaviors (information seeking and forwarding) and their outcomes (coping outcomes: e.g., dealing better with negative feelings or improved medical ...
Chon, Myoung-Gi   +2 more
core   +1 more source

MCDC‐Net: Multi‐scale forgery image detection network based on central difference convolution

open access: yesIET Image Processing
Generative Adversarial Networks (GANs) emerged thanks to the development of deep neural networks. Forgery images generated by various variants of GANs are widely spread on the Internet, which may be damage personal credibility and cause huge property ...
Defen He   +6 more
doaj   +1 more source

PENERIMAAN METODE PEMBELAJARAN BERBASIS E-LEARNING DI DAYAH JEUMALA AMAL LUENG PUTU, PIDIE JAYA

open access: yesCyberspace, 2017
The growth of Information Technology (IT) has changed the order of conventional learning process toward the learning model without geographical boundaries, which is known as E-learning. This study aims to explore the readiness of Dayah Jeumala Amal Lueng
Bustami Yusuf   +4 more
doaj   +1 more source

Muddy rules for cyberspace: Musings of a she-blogger [PDF]

open access: yes
‘Muddy rules for cyberspace’: Musings of a she-blogger. Yvonne Downs Although referring specifically to intellectual property rights, the above quotation from Burk (1998) gives a sense of the complex, emergent, often ambiguous terms on which we enter ...
Downs, Yvonne
core  

Home - About - Disclaimer - Privacy