CINXE.COM
Cyberspace Research Papers - Academia.edu
<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>Cyberspace Research Papers - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "by_tag", 'action': "show_one", 'controller_action': 'by_tag#show_one', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="38g54MrptLSHNpGWYCqgoiWEZ+YTTpvfe5GQiWc5AyQLOArHL8nhNzub9F7YAlqda+6Ajsb+otr94GCUwpMBdw==" /> <link href="/Documents/in/Cyberspace?after=50%2C43783862" rel="next" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&family=Gupter:wght@400;500;700&family=IBM+Plex+Mono:wght@300;400&family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> <meta name="description" content="View Cyberspace Research Papers on Academia.edu for free." /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'by_tag'; var $action_name = "show_one"; var $rails_env = 'production'; var $app_rev = '92477ec68c09d28ae4730a4143c926f074776319'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":15276,"monthly_visitors":"113 million","monthly_visitor_count":113458213,"monthly_visitor_count_in_millions":113,"user_count":277562247,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1732824609000); window.Aedu.timeDifference = new Date().getTime() - 1732824609000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" rel="stylesheet"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-bdb9e8c097f01e611f2fc5e2f1a9dc599beede975e2ae5629983543a1726e947.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-bae13f9b51961d5f1e06008e39e31d0138cb31332e8c2e874c6d6a250ec2bb14.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-19a25d160d01bde427443d06cd6b810c4c92c6026e7cb31519e06313eb24ed90.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://www.academia.edu/Documents/in/Cyberspace" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-by_tag a-show_one logged_out u-bgColorWhite'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-by_tag a-show_one logged_out u-bgColorWhite'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&c2=26766707&cv=2.0&cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to <a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav no-sm no-md"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more <span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://medium.com/@academia">Blog</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i> We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/"><i class="fa fa-question-circle"></i> Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less <span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <div class="DesignSystem" style="margin-top:-40px"><div class="PageHeader"><div class="container"><div class="row"><style type="text/css">.sor-abstract { display: -webkit-box; overflow: hidden; text-overflow: ellipsis; -webkit-line-clamp: 3; -webkit-box-orient: vertical; }</style><div class="col-xs-12 clearfix"><div class="u-floatLeft"><h1 class="PageHeader-title u-m0x u-fs30">Cyberspace</h1><div class="u-tcGrayDark">28,252 Followers</div><div class="u-tcGrayDark u-mt2x">Recent papers in <b>Cyberspace</b></div></div></div></div></div></div><div class="TabbedNavigation"><div class="container"><div class="row"><div class="col-xs-12 clearfix"><ul class="nav u-m0x u-p0x list-inline u-displayFlex"><li class="active"><a href="https://www.academia.edu/Documents/in/Cyberspace">Top Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Cyberspace/MostCited">Most Cited Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Cyberspace/MostDownloaded">Most Downloaded Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Cyberspace/MostRecent">Newest Papers</a></li><li><a class="" href="https://www.academia.edu/People/Cyberspace">People</a></li></ul></div><style type="text/css">ul.nav{flex-direction:row}@media(max-width: 567px){ul.nav{flex-direction:column}.TabbedNavigation li{max-width:100%}.TabbedNavigation li.active{background-color:var(--background-grey, #dddde2)}.TabbedNavigation li.active:before,.TabbedNavigation li.active:after{display:none}}</style></div></div></div><div class="container"><div class="row"><div class="col-xs-12"><div class="u-displayFlex"><div class="u-flexGrow1"><div class="works"><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_42927655" data-work_id="42927655" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/42927655/ANALYSIS_OF_CYBER_INCIDENTS_BETWEEN_DYADIC_RIVALS">ANALYSIS OF CYBER INCIDENTS BETWEEN DYADIC RIVALS</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Cyber conflict between states is a growing trend. There is a large body of research on cyber conflict, but there is very little quantitative analysis to support the theories or to assist in predicting future use of cyber operations. Using... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_42927655" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Cyber conflict between states is a growing trend. There is a large body of research on cyber conflict, but there is very little quantitative analysis to support the theories or to assist in predicting future use of cyber operations. Using a logistic regression analysis, this thesis studies cyber conflicts between dyadic rivals from 2001 to 2011 to answer under what conditions cyber incidents occur between dyadic rivals in the past in the hopes to better analyze and predict future cyber incidents. The data demonstrate that the geographic proximity between dyads increases the probability of a cyber incident occurring while any or both of the dyads holds membership in NATO causes a decrease in the probability that cyber operations occur between dyadic rivals. The share of military personnel, military expenditure, and energy consumption is not enough to explain cyber incident trends. The results also show that many of my variables are conditional upon each other for their significance. It is imperative that states address the issues surrounding cyber conflict as the trend is increasing. At the present, the fear of retaliation will always be present as some argue that cyber defensive capabilities will never overtake cyber offensive capabilities as the latter is constantly transforming and evolving while the former is constantly playing “catch up.”</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/42927655" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="adb041d81b64931e2271a1da4d32c7f7" rel="nofollow" data-download="{"attachment_id":63179645,"asset_id":42927655,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/63179645/download_file?st=MTczMjgyNDYwOCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="41434897" href="https://boisestate.academia.edu/BarryNewell">Barry Newell</a><script data-card-contents-for-user="41434897" type="text/json">{"id":41434897,"first_name":"Barry","last_name":"Newell","domain_name":"boisestate","page_name":"BarryNewell","display_name":"Barry Newell","profile_url":"https://boisestate.academia.edu/BarryNewell?f_ri=30945","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_42927655 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="42927655"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 42927655, container: ".js-paper-rank-work_42927655", }); });</script></li><li class="js-percentile-work_42927655 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 42927655; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_42927655"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_42927655 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="42927655"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 42927655; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=42927655]").text(description); $(".js-view-count-work_42927655").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_42927655").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="42927655"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">7</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>, <script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1166" href="https://www.academia.edu/Documents/in/International_Relations_Theory">International Relations Theory</a>, <script data-card-contents-for-ri="1166" type="text/json">{"id":1166,"name":"International Relations Theory","url":"https://www.academia.edu/Documents/in/International_Relations_Theory?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3826" href="https://www.academia.edu/Documents/in/NATO">NATO</a>, <script data-card-contents-for-ri="3826" type="text/json">{"id":3826,"name":"NATO","url":"https://www.academia.edu/Documents/in/NATO?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4486" href="https://www.academia.edu/Documents/in/Political_Science">Political Science</a><script data-card-contents-for-ri="4486" type="text/json">{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=42927655]'), work: {"id":42927655,"title":"ANALYSIS OF CYBER INCIDENTS BETWEEN DYADIC RIVALS","created_at":"2020-05-03T01:21:28.623-07:00","url":"https://www.academia.edu/42927655/ANALYSIS_OF_CYBER_INCIDENTS_BETWEEN_DYADIC_RIVALS?f_ri=30945","dom_id":"work_42927655","summary":"Cyber conflict between states is a growing trend. There is a large body of research on cyber conflict, but there is very little quantitative analysis to support the theories or to assist in predicting future use of cyber operations. Using a logistic regression analysis, this thesis studies cyber conflicts between dyadic rivals from 2001 to 2011 to answer under what conditions cyber incidents occur between dyadic rivals in the past in the hopes to better analyze and predict future cyber incidents. The data demonstrate that the geographic proximity between dyads increases the probability of a cyber incident occurring while any or both of the dyads holds membership in NATO causes a decrease in the probability that cyber operations occur between dyadic rivals. The share of military personnel, military expenditure, and energy consumption is not enough to explain cyber incident trends. The results also show that many of my variables are conditional upon each other for their significance. It is imperative that states address the issues surrounding cyber conflict as the trend is increasing. At the present, the fear of retaliation will always be present as some argue that cyber defensive capabilities will never overtake cyber offensive capabilities as the latter is constantly transforming and evolving while the former is constantly playing “catch up.”","downloadable_attachments":[{"id":63179645,"asset_id":42927655,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":41434897,"first_name":"Barry","last_name":"Newell","domain_name":"boisestate","page_name":"BarryNewell","display_name":"Barry Newell","profile_url":"https://boisestate.academia.edu/BarryNewell?f_ri=30945","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=30945","nofollow":false},{"id":1166,"name":"International Relations Theory","url":"https://www.academia.edu/Documents/in/International_Relations_Theory?f_ri=30945","nofollow":false},{"id":3826,"name":"NATO","url":"https://www.academia.edu/Documents/in/NATO?f_ri=30945","nofollow":false},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=30945","nofollow":false},{"id":11337,"name":"Cyber Warfare","url":"https://www.academia.edu/Documents/in/Cyber_Warfare?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":42194,"name":"Warfare","url":"https://www.academia.edu/Documents/in/Warfare?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_73682291" data-work_id="73682291" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/73682291/Hybrid_Threats_New_Counterintelligence_Era_with_Advanced_Artificial_Intelligence">Hybrid Threats: New Counterintelligence Era with Advanced Artificial Intelligence</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Objectives: The main objective of research is to identify a valid model that ensures the capabilities of national counterintelligence interests in the processes of identification, analysis and response to hybrid threats in cyberspace... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_73682291" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Objectives: The main objective of research is to identify a valid model that ensures the capabilities of national counterintelligence interests in the processes of identification, analysis and response to hybrid threats in cyberspace associated with the national security strategy taking into account the capabilities provided by advanced artificial intelligence. Based on this strategic approach, provide key factors for roadmap of adoption in the process of introducing disruptive technologies in counter-intelligence processes for maximization of results in technology adoption. Methodology: The applied research methodology is mixed. It will combine qualitative and quantitative criteria according to the proposed objectives by each research phase.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/73682291" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="1b7b27201520759c0b120535994d66ff" rel="nofollow" data-download="{"attachment_id":82108073,"asset_id":73682291,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/82108073/download_file?st=MTczMjgyNDYwOCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="38436118" href="https://independentresearcher.academia.edu/RogerSanz">Roger Sanz Gonzalez</a><script data-card-contents-for-user="38436118" type="text/json">{"id":38436118,"first_name":"Roger","last_name":"Sanz Gonzalez","domain_name":"independentresearcher","page_name":"RogerSanz","display_name":"Roger Sanz Gonzalez","profile_url":"https://independentresearcher.academia.edu/RogerSanz?f_ri=30945","photo":"https://0.academia-photos.com/38436118/50992547/39045348/s65_roger.sanz.jpg"}</script></span></span></li><li class="js-paper-rank-work_73682291 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="73682291"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 73682291, container: ".js-paper-rank-work_73682291", }); });</script></li><li class="js-percentile-work_73682291 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 73682291; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_73682291"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_73682291 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="73682291"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 73682291; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=73682291]").text(description); $(".js-view-count-work_73682291").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_73682291").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="73682291"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">14</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="465" href="https://www.academia.edu/Documents/in/Artificial_Intelligence">Artificial Intelligence</a>, <script data-card-contents-for-ri="465" type="text/json">{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2008" href="https://www.academia.edu/Documents/in/Machine_Learning">Machine Learning</a>, <script data-card-contents-for-ri="2008" type="text/json">{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="7057" href="https://www.academia.edu/Documents/in/Cyberstudies">Cyberstudies</a>, <script data-card-contents-for-ri="7057" type="text/json">{"id":7057,"name":"Cyberstudies","url":"https://www.academia.edu/Documents/in/Cyberstudies?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a><script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=73682291]'), work: {"id":73682291,"title":"Hybrid Threats: New Counterintelligence Era with Advanced Artificial Intelligence","created_at":"2022-03-13T12:49:18.516-07:00","url":"https://www.academia.edu/73682291/Hybrid_Threats_New_Counterintelligence_Era_with_Advanced_Artificial_Intelligence?f_ri=30945","dom_id":"work_73682291","summary":"Objectives: The main objective of research is to identify a valid model that ensures the capabilities of national counterintelligence interests in the processes of identification, analysis and response to hybrid threats in cyberspace associated with the national security strategy taking into account the capabilities provided by advanced artificial intelligence. Based on this strategic approach, provide key factors for roadmap of adoption in the process of introducing disruptive technologies in counter-intelligence processes for maximization of results in technology adoption. Methodology: The applied research methodology is mixed. It will combine qualitative and quantitative criteria according to the proposed objectives by each research phase.","downloadable_attachments":[{"id":82108073,"asset_id":73682291,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":38436118,"first_name":"Roger","last_name":"Sanz Gonzalez","domain_name":"independentresearcher","page_name":"RogerSanz","display_name":"Roger Sanz Gonzalez","profile_url":"https://independentresearcher.academia.edu/RogerSanz?f_ri=30945","photo":"https://0.academia-photos.com/38436118/50992547/39045348/s65_roger.sanz.jpg"}],"research_interests":[{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence?f_ri=30945","nofollow":false},{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning?f_ri=30945","nofollow":false},{"id":7057,"name":"Cyberstudies","url":"https://www.academia.edu/Documents/in/Cyberstudies?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":45764,"name":"Disruptive Technologies","url":"https://www.academia.edu/Documents/in/Disruptive_Technologies?f_ri=30945"},{"id":54123,"name":"Artificial Neural Networks","url":"https://www.academia.edu/Documents/in/Artificial_Neural_Networks?f_ri=30945"},{"id":118583,"name":"Technology Adoption","url":"https://www.academia.edu/Documents/in/Technology_Adoption?f_ri=30945"},{"id":179724,"name":"Counterintelligence","url":"https://www.academia.edu/Documents/in/Counterintelligence?f_ri=30945"},{"id":378350,"name":"Hybrid Threats","url":"https://www.academia.edu/Documents/in/Hybrid_Threats?f_ri=30945"},{"id":1038695,"name":"Grey Zone","url":"https://www.academia.edu/Documents/in/Grey_Zone?f_ri=30945"},{"id":1183960,"name":"Cyberoperations","url":"https://www.academia.edu/Documents/in/Cyberoperations?f_ri=30945"},{"id":1328172,"name":"Hybrid Warfare","url":"https://www.academia.edu/Documents/in/Hybrid_Warfare?f_ri=30945"},{"id":2430296,"name":"Proof of Concept","url":"https://www.academia.edu/Documents/in/Proof_of_Concept?f_ri=30945"},{"id":4098761,"name":"advanced artificial intelligence","url":"https://www.academia.edu/Documents/in/advanced_artificial_intelligence?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_23033592" data-work_id="23033592" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/23033592/A_Conversation_with_Jennifer_A_Gonz%C3%A1lez">A Conversation with Jennifer A. González</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">The following is an interview conducted for Octopus: A Visual Studies Journal with Jennifer A. González, author of Subject to Display: Reframing Race in Contemporary Installation Art (The MIT Press, 2008).</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/23033592" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="335cc8e0a2c5e2c455666b4c9b08726c" rel="nofollow" data-download="{"attachment_id":43542674,"asset_id":23033592,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/43542674/download_file?st=MTczMjgyNDYwOCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="372655" href="https://neu.academia.edu/NathanBlake">Nathan D Blake</a><script data-card-contents-for-user="372655" type="text/json">{"id":372655,"first_name":"Nathan","last_name":"Blake","domain_name":"neu","page_name":"NathanBlake","display_name":"Nathan D Blake","profile_url":"https://neu.academia.edu/NathanBlake?f_ri=30945","photo":"https://0.academia-photos.com/372655/114894/979839/s65_nathan.blake.jpg"}</script></span></span></li><li class="js-paper-rank-work_23033592 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="23033592"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 23033592, container: ".js-paper-rank-work_23033592", }); });</script></li><li class="js-percentile-work_23033592 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 23033592; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_23033592"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_23033592 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="23033592"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 23033592; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=23033592]").text(description); $(".js-view-count-work_23033592").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_23033592").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="23033592"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">8</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="863" href="https://www.academia.edu/Documents/in/Visual_Studies">Visual Studies</a>, <script data-card-contents-for-ri="863" type="text/json">{"id":863,"name":"Visual Studies","url":"https://www.academia.edu/Documents/in/Visual_Studies?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2080" href="https://www.academia.edu/Documents/in/Installation_Art">Installation Art</a>, <script data-card-contents-for-ri="2080" type="text/json">{"id":2080,"name":"Installation Art","url":"https://www.academia.edu/Documents/in/Installation_Art?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2432" href="https://www.academia.edu/Documents/in/Critical_Race_Studies">Critical Race Studies</a>, <script data-card-contents-for-ri="2432" type="text/json">{"id":2432,"name":"Critical Race Studies","url":"https://www.academia.edu/Documents/in/Critical_Race_Studies?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5247" href="https://www.academia.edu/Documents/in/Critical_Race_Theory">Critical Race Theory</a><script data-card-contents-for-ri="5247" type="text/json">{"id":5247,"name":"Critical Race Theory","url":"https://www.academia.edu/Documents/in/Critical_Race_Theory?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=23033592]'), work: {"id":23033592,"title":"A Conversation with Jennifer A. González","created_at":"2016-03-09T05:08:28.376-08:00","url":"https://www.academia.edu/23033592/A_Conversation_with_Jennifer_A_Gonz%C3%A1lez?f_ri=30945","dom_id":"work_23033592","summary":"The following is an interview conducted for Octopus: A Visual Studies Journal with Jennifer A. González, author of Subject to Display: Reframing Race in Contemporary Installation Art (The MIT Press, 2008).","downloadable_attachments":[{"id":43542674,"asset_id":23033592,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":372655,"first_name":"Nathan","last_name":"Blake","domain_name":"neu","page_name":"NathanBlake","display_name":"Nathan D Blake","profile_url":"https://neu.academia.edu/NathanBlake?f_ri=30945","photo":"https://0.academia-photos.com/372655/114894/979839/s65_nathan.blake.jpg"}],"research_interests":[{"id":863,"name":"Visual Studies","url":"https://www.academia.edu/Documents/in/Visual_Studies?f_ri=30945","nofollow":false},{"id":2080,"name":"Installation Art","url":"https://www.academia.edu/Documents/in/Installation_Art?f_ri=30945","nofollow":false},{"id":2432,"name":"Critical Race Studies","url":"https://www.academia.edu/Documents/in/Critical_Race_Studies?f_ri=30945","nofollow":false},{"id":5247,"name":"Critical Race Theory","url":"https://www.academia.edu/Documents/in/Critical_Race_Theory?f_ri=30945","nofollow":false},{"id":5453,"name":"Race and Ethnicity","url":"https://www.academia.edu/Documents/in/Race_and_Ethnicity?f_ri=30945"},{"id":9535,"name":"Giorgio Agamben","url":"https://www.academia.edu/Documents/in/Giorgio_Agamben?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":482018,"name":"Franz Fanon","url":"https://www.academia.edu/Documents/in/Franz_Fanon?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_1150127" data-work_id="1150127" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/1150127/Cyberspace_and_the_State_Toward_a_Strategy_for_Cyber_Power">Cyberspace and the State: Toward a Strategy for Cyber-Power</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">"The so-called cyber-threat commands the attention of multinational corporations, governments and the strategic community, keen as they are to harness the power of digital communications yet anxious to protect their interests. Attacks... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_1150127" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">"The so-called cyber-threat commands the attention of multinational corporations, governments and the strategic community, keen as they are to harness the power of digital communications yet anxious to protect their interests. Attacks such as those which disrupted on-line banking in Estonia and defaced government websites in Georgia, as well as the infamous Stuxnet worm that temporarily shut down Iran’s nuclear programme, are vivid examples of what may be possible within this new strategic domain. But are our networked societies really vulnerable, as some have suggested, to a knock-out blow, perpetrated by state-sponsored hackers or terrorists? And what can be done to defend the state from this and from the encroachment of external networks that transcend its borders and breach its laws? <br /> <br />This Adelphi tackles the range of issues raised by our dependence on digital networks. It considers how instantaneous, global communications are challenging national and social orders and what shape those challenges may take as the net is cast ever wider. Comparing the transformations of the Information Age with those of previous generations, when new technologies and emerging transnational threats spread panic in political and strategic circles, the authors examine the real implications for states and statehood."</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/1150127" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="72760d07778e75ccb2c9c9e70b0b0656" rel="nofollow" data-download="{"attachment_id":31280417,"asset_id":1150127,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/31280417/download_file?st=MTczMjgyNDYwOCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="409774" href="https://kcl.academia.edu/TimStevens">Tim Stevens</a><script data-card-contents-for-user="409774" type="text/json">{"id":409774,"first_name":"Tim","last_name":"Stevens","domain_name":"kcl","page_name":"TimStevens","display_name":"Tim Stevens","profile_url":"https://kcl.academia.edu/TimStevens?f_ri=30945","photo":"https://0.academia-photos.com/409774/360375/6249293/s65_tim.stevens.jpg"}</script></span></span></li><li class="js-paper-rank-work_1150127 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="1150127"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 1150127, container: ".js-paper-rank-work_1150127", }); });</script></li><li class="js-percentile-work_1150127 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 1150127; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_1150127"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_1150127 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="1150127"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 1150127; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=1150127]").text(description); $(".js-view-count-work_1150127").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_1150127").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="1150127"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">8</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="579" href="https://www.academia.edu/Documents/in/Strategy_Military_Science_">Strategy (Military Science)</a>, <script data-card-contents-for-ri="579" type="text/json">{"id":579,"name":"Strategy (Military Science)","url":"https://www.academia.edu/Documents/in/Strategy_Military_Science_?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>, <script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2825" href="https://www.academia.edu/Documents/in/Power_social_">Power (social)</a>, <script data-card-contents-for-ri="2825" type="text/json">{"id":2825,"name":"Power (social)","url":"https://www.academia.edu/Documents/in/Power_social_?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3661" href="https://www.academia.edu/Documents/in/Sovereignty">Sovereignty</a><script data-card-contents-for-ri="3661" type="text/json">{"id":3661,"name":"Sovereignty","url":"https://www.academia.edu/Documents/in/Sovereignty?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=1150127]'), work: {"id":1150127,"title":"Cyberspace and the State: Toward a Strategy for Cyber-Power","created_at":"2011-12-11T16:24:04.007-08:00","url":"https://www.academia.edu/1150127/Cyberspace_and_the_State_Toward_a_Strategy_for_Cyber_Power?f_ri=30945","dom_id":"work_1150127","summary":"\"The so-called cyber-threat commands the attention of multinational corporations, governments and the strategic community, keen as they are to harness the power of digital communications yet anxious to protect their interests. Attacks such as those which disrupted on-line banking in Estonia and defaced government websites in Georgia, as well as the infamous Stuxnet worm that temporarily shut down Iran’s nuclear programme, are vivid examples of what may be possible within this new strategic domain. But are our networked societies really vulnerable, as some have suggested, to a knock-out blow, perpetrated by state-sponsored hackers or terrorists? And what can be done to defend the state from this and from the encroachment of external networks that transcend its borders and breach its laws? \r\n\r\nThis Adelphi tackles the range of issues raised by our dependence on digital networks. It considers how instantaneous, global communications are challenging national and social orders and what shape those challenges may take as the net is cast ever wider. Comparing the transformations of the Information Age with those of previous generations, when new technologies and emerging transnational threats spread panic in political and strategic circles, the authors examine the real implications for states and statehood.\"","downloadable_attachments":[{"id":31280417,"asset_id":1150127,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":409774,"first_name":"Tim","last_name":"Stevens","domain_name":"kcl","page_name":"TimStevens","display_name":"Tim Stevens","profile_url":"https://kcl.academia.edu/TimStevens?f_ri=30945","photo":"https://0.academia-photos.com/409774/360375/6249293/s65_tim.stevens.jpg"}],"research_interests":[{"id":579,"name":"Strategy (Military Science)","url":"https://www.academia.edu/Documents/in/Strategy_Military_Science_?f_ri=30945","nofollow":false},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=30945","nofollow":false},{"id":2825,"name":"Power (social)","url":"https://www.academia.edu/Documents/in/Power_social_?f_ri=30945","nofollow":false},{"id":3661,"name":"Sovereignty","url":"https://www.academia.edu/Documents/in/Sovereignty?f_ri=30945","nofollow":false},{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=30945"},{"id":3873,"name":"Strategic Studies","url":"https://www.academia.edu/Documents/in/Strategic_Studies?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":220464,"name":"Politics and International relations","url":"https://www.academia.edu/Documents/in/Politics_and_International_relations?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_3471542" data-work_id="3471542" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/3471542/THE_INTRODUCTION_TO_CYBERCRIME_SECURITY_PREVENTION_AND_DETECTION_OF_CYBERCRIME_IN_TANZANIA">THE INTRODUCTION TO CYBERCRIME: SECURITY, PREVENTION AND DETECTION OF CYBERCRIME IN TANZANIA</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">"" In our daily life, economic activities, and national security highly depend on stability, safely, and resilient cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_3471542" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">"" <br />In our daily life, economic activities, and national security highly depend on stability, safely, and resilient cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government with various services. <br />However it is through the same cyber networks which intrude and attack our privacy, economy, social life in a way which is harmful. Some scholars have interestingly argued that, “in the Internet nobody knows you are a dog”. This raises some legal issues and concerns. <br />This paper presents important issues on the Security, Prevention, and Detection of Cyber Crime. The paper consists of four parts in Romanic Numbers. <br />In Part I, the attempt here is simply to familiarize the reader with a careful understanding of the Cyber Crimes. The author will trace back the meaning, history, and types of Cyber Crimes <br />In Part II, one has to know the concept of Cyber Security; this will include meaning, background, types if any and important of Cyber Security. <br />Part III will explain on Cyber Prevention and Detection the same will include meaning and history, Cyber Prevention and Detection Methodologies and Legal Instruments. <br />And Part IV, Personal Assessment basically in Tanzanian Laws. <br />""</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/3471542" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="10adbaf03f79aed99dd78be452ec84a0" rel="nofollow" data-download="{"attachment_id":31223024,"asset_id":3471542,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/31223024/download_file?st=MTczMjgyNDYwOCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3585116" href="https://tumainiuniversity.academia.edu/AsherryMagalla">Asherry B P Magalla</a><script data-card-contents-for-user="3585116" type="text/json">{"id":3585116,"first_name":"Asherry","last_name":"Magalla","domain_name":"tumainiuniversity","page_name":"AsherryMagalla","display_name":"Asherry B P Magalla","profile_url":"https://tumainiuniversity.academia.edu/AsherryMagalla?f_ri=30945","photo":"https://0.academia-photos.com/3585116/1246482/49266753/s65_asherry.magalla.jpg"}</script></span></span></li><li class="js-paper-rank-work_3471542 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="3471542"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 3471542, container: ".js-paper-rank-work_3471542", }); });</script></li><li class="js-percentile-work_3471542 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 3471542; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_3471542"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_3471542 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="3471542"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 3471542; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=3471542]").text(description); $(".js-view-count-work_3471542").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_3471542").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="3471542"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">18</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="2008" href="https://www.academia.edu/Documents/in/Machine_Learning">Machine Learning</a>, <script data-card-contents-for-ri="2008" type="text/json">{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2009" href="https://www.academia.edu/Documents/in/Data_Mining">Data Mining</a>, <script data-card-contents-for-ri="2009" type="text/json">{"id":2009,"name":"Data Mining","url":"https://www.academia.edu/Documents/in/Data_Mining?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2511" href="https://www.academia.edu/Documents/in/Cybercrimes">Cybercrimes</a>, <script data-card-contents-for-ri="2511" type="text/json">{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="7798" href="https://www.academia.edu/Documents/in/Access_Control">Access Control</a><script data-card-contents-for-ri="7798" type="text/json">{"id":7798,"name":"Access Control","url":"https://www.academia.edu/Documents/in/Access_Control?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=3471542]'), work: {"id":3471542,"title":"THE INTRODUCTION TO CYBERCRIME: SECURITY, PREVENTION AND DETECTION OF CYBERCRIME IN TANZANIA","created_at":"2013-05-05T22:38:52.470-07:00","url":"https://www.academia.edu/3471542/THE_INTRODUCTION_TO_CYBERCRIME_SECURITY_PREVENTION_AND_DETECTION_OF_CYBERCRIME_IN_TANZANIA?f_ri=30945","dom_id":"work_3471542","summary":"\"\"\r\nIn our daily life, economic activities, and national security highly depend on stability, safely, and resilient cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government with various services. \r\nHowever it is through the same cyber networks which intrude and attack our privacy, economy, social life in a way which is harmful. Some scholars have interestingly argued that, “in the Internet nobody knows you are a dog”. This raises some legal issues and concerns. \r\nThis paper presents important issues on the Security, Prevention, and Detection of Cyber Crime. The paper consists of four parts in Romanic Numbers.\r\nIn Part I, the attempt here is simply to familiarize the reader with a careful understanding of the Cyber Crimes. The author will trace back the meaning, history, and types of Cyber Crimes\r\nIn Part II, one has to know the concept of Cyber Security; this will include meaning, background, types if any and important of Cyber Security.\r\nPart III will explain on Cyber Prevention and Detection the same will include meaning and history, Cyber Prevention and Detection Methodologies and Legal Instruments. \r\nAnd Part IV, Personal Assessment basically in Tanzanian Laws.\r\n\"\"","downloadable_attachments":[{"id":31223024,"asset_id":3471542,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3585116,"first_name":"Asherry","last_name":"Magalla","domain_name":"tumainiuniversity","page_name":"AsherryMagalla","display_name":"Asherry B P Magalla","profile_url":"https://tumainiuniversity.academia.edu/AsherryMagalla?f_ri=30945","photo":"https://0.academia-photos.com/3585116/1246482/49266753/s65_asherry.magalla.jpg"}],"research_interests":[{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning?f_ri=30945","nofollow":false},{"id":2009,"name":"Data Mining","url":"https://www.academia.edu/Documents/in/Data_Mining?f_ri=30945","nofollow":false},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=30945","nofollow":false},{"id":7798,"name":"Access Control","url":"https://www.academia.edu/Documents/in/Access_Control?f_ri=30945","nofollow":false},{"id":14106,"name":"Tanzanian Studies","url":"https://www.academia.edu/Documents/in/Tanzanian_Studies?f_ri=30945"},{"id":23241,"name":"Tanzania","url":"https://www.academia.edu/Documents/in/Tanzania?f_ri=30945"},{"id":26860,"name":"Cloud Computing","url":"https://www.academia.edu/Documents/in/Cloud_Computing?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":54788,"name":"Smart spaces","url":"https://www.academia.edu/Documents/in/Smart_spaces?f_ri=30945"},{"id":65430,"name":"Cyber Physical Systems","url":"https://www.academia.edu/Documents/in/Cyber_Physical_Systems?f_ri=30945"},{"id":66634,"name":"Complex Event Processing","url":"https://www.academia.edu/Documents/in/Complex_Event_Processing?f_ri=30945"},{"id":98010,"name":"Internet and computer crimes","url":"https://www.academia.edu/Documents/in/Internet_and_computer_crimes?f_ri=30945"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=30945"},{"id":121361,"name":"Semantic Computing","url":"https://www.academia.edu/Documents/in/Semantic_Computing?f_ri=30945"},{"id":162629,"name":"Cyber Laws and Cyber Crime","url":"https://www.academia.edu/Documents/in/Cyber_Laws_and_Cyber_Crime?f_ri=30945"},{"id":898202,"name":"P2P/Overlay Networks","url":"https://www.academia.edu/Documents/in/P2P_Overlay_Networks?f_ri=30945"},{"id":931931,"name":"VoIP/SIP/IMS","url":"https://www.academia.edu/Documents/in/VoIP_SIP_IMS?f_ri=30945"},{"id":931932,"name":"Distributed Information Systems","url":"https://www.academia.edu/Documents/in/Distributed_Information_Systems?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_37672756" data-work_id="37672756" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/37672756/Hacks_leaks_and_disruptions_Russian_cyber_strategies">Hacks, leaks and disruptions Russian cyber strategies</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">What is the relationship between cyber activities conducted by Russia at home and abroad? What role do cyber operations play as an instrument of Russia’s coercive diplomacy? How different is Russia from other cyber powers, and how do we... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_37672756" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">What is the relationship between cyber activities conducted by Russia at home and abroad? What role do cyber operations play as an instrument of Russia’s coercive diplomacy? How different is Russia from other cyber powers, and how do we know for sure if the Kremlin is behind certain cyberattacks that have been attributed to it?<br /><br />This Chaillot Paper examines these and other key questions as it explores how Russia’s increasingly assertive behaviour in cyberspace has lent new urgency to the debate about cybersecurity in the West. It focuses on what lessons EU member states have learned from recent events, and on how the EU and NATO have responded to these cyber challenges on the diplomatic, political and security fronts. The paper argues that Russia’s aggressive use of cyber tools has led the US and many Europeans states to adopt more defensive cyber strategies, and that as a result Russia may have lost the strategic advantage it has hitherto enjoyed in what is becoming an ever-more contested domain.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/37672756" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="f841f9eab57c476bf41769524b0c6d56" rel="nofollow" data-download="{"attachment_id":57661748,"asset_id":37672756,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/57661748/download_file?st=MTczMjgyNDYwOCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="2811016" href="https://independent.academia.edu/StanislavSecrieru">Stanislav Secrieru</a><script data-card-contents-for-user="2811016" type="text/json">{"id":2811016,"first_name":"Stanislav","last_name":"Secrieru","domain_name":"independent","page_name":"StanislavSecrieru","display_name":"Stanislav Secrieru","profile_url":"https://independent.academia.edu/StanislavSecrieru?f_ri=30945","photo":"https://0.academia-photos.com/2811016/954620/1195390/s65_stanislav.secrieru.jpg"}</script></span></span></li><li class="js-paper-rank-work_37672756 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="37672756"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 37672756, container: ".js-paper-rank-work_37672756", }); });</script></li><li class="js-percentile-work_37672756 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37672756; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_37672756"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_37672756 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="37672756"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37672756; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37672756]").text(description); $(".js-view-count-work_37672756").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_37672756").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="37672756"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">10</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="3826" href="https://www.academia.edu/Documents/in/NATO">NATO</a>, <script data-card-contents-for-ri="3826" type="text/json">{"id":3826,"name":"NATO","url":"https://www.academia.edu/Documents/in/NATO?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="10347" href="https://www.academia.edu/Documents/in/European_Union">European Union</a>, <script data-card-contents-for-ri="10347" type="text/json">{"id":10347,"name":"European Union","url":"https://www.academia.edu/Documents/in/European_Union?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="27336" href="https://www.academia.edu/Documents/in/France">France</a>, <script data-card-contents-for-ri="27336" type="text/json">{"id":27336,"name":"France","url":"https://www.academia.edu/Documents/in/France?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a><script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=37672756]'), work: {"id":37672756,"title":"Hacks, leaks and disruptions Russian cyber strategies","created_at":"2018-10-30T01:54:18.348-07:00","url":"https://www.academia.edu/37672756/Hacks_leaks_and_disruptions_Russian_cyber_strategies?f_ri=30945","dom_id":"work_37672756","summary":"What is the relationship between cyber activities conducted by Russia at home and abroad? What role do cyber operations play as an instrument of Russia’s coercive diplomacy? How different is Russia from other cyber powers, and how do we know for sure if the Kremlin is behind certain cyberattacks that have been attributed to it?\n\nThis Chaillot Paper examines these and other key questions as it explores how Russia’s increasingly assertive behaviour in cyberspace has lent new urgency to the debate about cybersecurity in the West. It focuses on what lessons EU member states have learned from recent events, and on how the EU and NATO have responded to these cyber challenges on the diplomatic, political and security fronts. The paper argues that Russia’s aggressive use of cyber tools has led the US and many Europeans states to adopt more defensive cyber strategies, and that as a result Russia may have lost the strategic advantage it has hitherto enjoyed in what is becoming an ever-more contested domain. ","downloadable_attachments":[{"id":57661748,"asset_id":37672756,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":2811016,"first_name":"Stanislav","last_name":"Secrieru","domain_name":"independent","page_name":"StanislavSecrieru","display_name":"Stanislav Secrieru","profile_url":"https://independent.academia.edu/StanislavSecrieru?f_ri=30945","photo":"https://0.academia-photos.com/2811016/954620/1195390/s65_stanislav.secrieru.jpg"}],"research_interests":[{"id":3826,"name":"NATO","url":"https://www.academia.edu/Documents/in/NATO?f_ri=30945","nofollow":false},{"id":10347,"name":"European Union","url":"https://www.academia.edu/Documents/in/European_Union?f_ri=30945","nofollow":false},{"id":27336,"name":"France","url":"https://www.academia.edu/Documents/in/France?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":41863,"name":"Russia","url":"https://www.academia.edu/Documents/in/Russia?f_ri=30945"},{"id":46989,"name":"Ukraine","url":"https://www.academia.edu/Documents/in/Ukraine?f_ri=30945"},{"id":81556,"name":"Critical infrastructure protection","url":"https://www.academia.edu/Documents/in/Critical_infrastructure_protection?f_ri=30945"},{"id":85743,"name":"Estonia","url":"https://www.academia.edu/Documents/in/Estonia?f_ri=30945"},{"id":89536,"name":"Western Balkans","url":"https://www.academia.edu/Documents/in/Western_Balkans?f_ri=30945"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_340464" data-work_id="340464" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/340464/The_Influences_of_Technology_Understanding_How_Technology_Contributes_to_Who_We_Are_Online">The Influences of Technology: Understanding How Technology Contributes to Who We Are Online</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/340464" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="59b5faf7a36207cea556ae232327f8c4" rel="nofollow" data-download="{"attachment_id":3249355,"asset_id":340464,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/3249355/download_file?st=MTczMjgyNDYwOCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="148040" href="https://winchester.academia.edu/MarcusLeaning">Marcus Leaning</a><script data-card-contents-for-user="148040" type="text/json">{"id":148040,"first_name":"Marcus","last_name":"Leaning","domain_name":"winchester","page_name":"MarcusLeaning","display_name":"Marcus Leaning","profile_url":"https://winchester.academia.edu/MarcusLeaning?f_ri=30945","photo":"https://0.academia-photos.com/148040/39130/19199714/s65_marcus.leaning.jpg"}</script></span></span></li><li class="js-paper-rank-work_340464 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="340464"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 340464, container: ".js-paper-rank-work_340464", }); });</script></li><li class="js-percentile-work_340464 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 340464; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_340464"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_340464 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="340464"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 340464; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=340464]").text(description); $(".js-view-count-work_340464").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_340464").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="340464"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2000" href="https://www.academia.edu/Documents/in/Critical_Theory_of_Technology">Critical Theory of Technology</a>, <script data-card-contents-for-ri="2000" type="text/json">{"id":2000,"name":"Critical Theory of Technology","url":"https://www.academia.edu/Documents/in/Critical_Theory_of_Technology?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4289" href="https://www.academia.edu/Documents/in/Cyberpunk">Cyberpunk</a>, <script data-card-contents-for-ri="4289" type="text/json">{"id":4289,"name":"Cyberpunk","url":"https://www.academia.edu/Documents/in/Cyberpunk?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="7057" href="https://www.academia.edu/Documents/in/Cyberstudies">Cyberstudies</a>, <script data-card-contents-for-ri="7057" type="text/json">{"id":7057,"name":"Cyberstudies","url":"https://www.academia.edu/Documents/in/Cyberstudies?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="29128" href="https://www.academia.edu/Documents/in/Cybercultures">Cybercultures</a><script data-card-contents-for-ri="29128" type="text/json">{"id":29128,"name":"Cybercultures","url":"https://www.academia.edu/Documents/in/Cybercultures?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=340464]'), work: {"id":340464,"title":"The Influences of Technology: Understanding How Technology Contributes to Who We Are Online","created_at":"2010-09-26T20:53:13.196-07:00","url":"https://www.academia.edu/340464/The_Influences_of_Technology_Understanding_How_Technology_Contributes_to_Who_We_Are_Online?f_ri=30945","dom_id":"work_340464","summary":null,"downloadable_attachments":[{"id":3249355,"asset_id":340464,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":148040,"first_name":"Marcus","last_name":"Leaning","domain_name":"winchester","page_name":"MarcusLeaning","display_name":"Marcus Leaning","profile_url":"https://winchester.academia.edu/MarcusLeaning?f_ri=30945","photo":"https://0.academia-photos.com/148040/39130/19199714/s65_marcus.leaning.jpg"}],"research_interests":[{"id":2000,"name":"Critical Theory of Technology","url":"https://www.academia.edu/Documents/in/Critical_Theory_of_Technology?f_ri=30945","nofollow":false},{"id":4289,"name":"Cyberpunk","url":"https://www.academia.edu/Documents/in/Cyberpunk?f_ri=30945","nofollow":false},{"id":7057,"name":"Cyberstudies","url":"https://www.academia.edu/Documents/in/Cyberstudies?f_ri=30945","nofollow":false},{"id":29128,"name":"Cybercultures","url":"https://www.academia.edu/Documents/in/Cybercultures?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_462492" data-work_id="462492" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/462492/Cyber_Security_and_Threat_Politics_US_Efforts_to_Secure_the_Information_Age">Cyber-Security and Threat Politics: US Efforts to Secure the Information Age</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_462492" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US.<br /><br />Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat frames, specific interpretive schemata about what counts as a threat or risk and how to respond to this threat. By approaching this subject from a security studies angle, this book closes a gap between practical and theoretical academic approaches. It also contributes to the more general debate about changing practices of national security and their implications for the international community.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/462492" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="4db20e3956db1cd4bbf1149d0765577f" rel="nofollow" data-download="{"attachment_id":26493216,"asset_id":462492,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/26493216/download_file?st=MTczMjgyNDYwOCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="350006" href="https://ethz.academia.edu/MyriamCavelty">Myriam Dunn Cavelty</a><script data-card-contents-for-user="350006" type="text/json">{"id":350006,"first_name":"Myriam","last_name":"Dunn Cavelty","domain_name":"ethz","page_name":"MyriamCavelty","display_name":"Myriam Dunn Cavelty","profile_url":"https://ethz.academia.edu/MyriamCavelty?f_ri=30945","photo":"https://0.academia-photos.com/350006/94486/302631/s65_myriam.dunn_cavelty.jpg"}</script></span></span></li><li class="js-paper-rank-work_462492 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="462492"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 462492, container: ".js-paper-rank-work_462492", }); });</script></li><li class="js-percentile-work_462492 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 462492; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_462492"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_462492 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="462492"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 462492; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=462492]").text(description); $(".js-view-count-work_462492").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_462492").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="462492"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">8</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="4810" href="https://www.academia.edu/Documents/in/Information_Warfare">Information Warfare</a>, <script data-card-contents-for-ri="4810" type="text/json">{"id":4810,"name":"Information Warfare","url":"https://www.academia.edu/Documents/in/Information_Warfare?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>, <script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="6748" href="https://www.academia.edu/Documents/in/Sociology_of_Risk">Sociology of Risk</a>, <script data-card-contents-for-ri="6748" type="text/json">{"id":6748,"name":"Sociology of Risk","url":"https://www.academia.edu/Documents/in/Sociology_of_Risk?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="12061" href="https://www.academia.edu/Documents/in/Risk_Management">Risk Management</a><script data-card-contents-for-ri="12061" type="text/json">{"id":12061,"name":"Risk Management","url":"https://www.academia.edu/Documents/in/Risk_Management?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=462492]'), work: {"id":462492,"title":"Cyber-Security and Threat Politics: US Efforts to Secure the Information Age","created_at":"2011-03-03T18:03:12.151-08:00","url":"https://www.academia.edu/462492/Cyber_Security_and_Threat_Politics_US_Efforts_to_Secure_the_Information_Age?f_ri=30945","dom_id":"work_462492","summary":"This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US.\n\nMyriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat frames, specific interpretive schemata about what counts as a threat or risk and how to respond to this threat. By approaching this subject from a security studies angle, this book closes a gap between practical and theoretical academic approaches. It also contributes to the more general debate about changing practices of national security and their implications for the international community.","downloadable_attachments":[{"id":26493216,"asset_id":462492,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":350006,"first_name":"Myriam","last_name":"Dunn Cavelty","domain_name":"ethz","page_name":"MyriamCavelty","display_name":"Myriam Dunn Cavelty","profile_url":"https://ethz.academia.edu/MyriamCavelty?f_ri=30945","photo":"https://0.academia-photos.com/350006/94486/302631/s65_myriam.dunn_cavelty.jpg"}],"research_interests":[{"id":4810,"name":"Information Warfare","url":"https://www.academia.edu/Documents/in/Information_Warfare?f_ri=30945","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=30945","nofollow":false},{"id":6748,"name":"Sociology of Risk","url":"https://www.academia.edu/Documents/in/Sociology_of_Risk?f_ri=30945","nofollow":false},{"id":12061,"name":"Risk Management","url":"https://www.academia.edu/Documents/in/Risk_Management?f_ri=30945","nofollow":false},{"id":15389,"name":"Copenhagen School/Securitization","url":"https://www.academia.edu/Documents/in/Copenhagen_School_Securitization?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":41862,"name":"Cyberwarfare","url":"https://www.academia.edu/Documents/in/Cyberwarfare?f_ri=30945"},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_27224787" data-work_id="27224787" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/27224787/CYBERSPACE_GOVERNANCE_The_Imperative_For_National_and_Economic_Security">CYBERSPACE GOVERNANCE: The Imperative For National & Economic Security</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">Proceedings of the INTERNATIONAL CONFERENCE ON <br />"CYBERSPACE GOVERNANCE:The Imperative For National & Economic Security"</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/27224787" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="14079aa38a1961ea19257283e087bf66" rel="nofollow" data-download="{"attachment_id":47482571,"asset_id":27224787,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/47482571/download_file?st=MTczMjgyNDYwOCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="15938679" href="https://nsukonline.academia.edu/EmmanuelDandaura">Emmanuel S Dandaura</a><script data-card-contents-for-user="15938679" type="text/json">{"id":15938679,"first_name":"Emmanuel","last_name":"Dandaura","domain_name":"nsukonline","page_name":"EmmanuelDandaura","display_name":"Emmanuel S Dandaura","profile_url":"https://nsukonline.academia.edu/EmmanuelDandaura?f_ri=30945","photo":"https://0.academia-photos.com/15938679/10541078/11764188/s65_eman.dan.jpg"}</script></span></span></li><li class="js-paper-rank-work_27224787 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="27224787"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 27224787, container: ".js-paper-rank-work_27224787", }); });</script></li><li class="js-percentile-work_27224787 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 27224787; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_27224787"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_27224787 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="27224787"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 27224787; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=27224787]").text(description); $(".js-view-count-work_27224787").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_27224787").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="27224787"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">46</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="128" href="https://www.academia.edu/Documents/in/History">History</a>, <script data-card-contents-for-ri="128" type="text/json">{"id":128,"name":"History","url":"https://www.academia.edu/Documents/in/History?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="184" href="https://www.academia.edu/Documents/in/Sociology">Sociology</a>, <script data-card-contents-for-ri="184" type="text/json">{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="248" href="https://www.academia.edu/Documents/in/Social_Psychology">Social Psychology</a>, <script data-card-contents-for-ri="248" type="text/json">{"id":248,"name":"Social Psychology","url":"https://www.academia.edu/Documents/in/Social_Psychology?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="261" href="https://www.academia.edu/Documents/in/Geography">Geography</a><script data-card-contents-for-ri="261" type="text/json">{"id":261,"name":"Geography","url":"https://www.academia.edu/Documents/in/Geography?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=27224787]'), work: {"id":27224787,"title":"CYBERSPACE GOVERNANCE: The Imperative For National \u0026 Economic Security","created_at":"2016-07-24T12:43:29.686-07:00","url":"https://www.academia.edu/27224787/CYBERSPACE_GOVERNANCE_The_Imperative_For_National_and_Economic_Security?f_ri=30945","dom_id":"work_27224787","summary":"Proceedings of the INTERNATIONAL CONFERENCE ON \n\"CYBERSPACE GOVERNANCE:The Imperative For National \u0026 Economic Security\"","downloadable_attachments":[{"id":47482571,"asset_id":27224787,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":15938679,"first_name":"Emmanuel","last_name":"Dandaura","domain_name":"nsukonline","page_name":"EmmanuelDandaura","display_name":"Emmanuel S Dandaura","profile_url":"https://nsukonline.academia.edu/EmmanuelDandaura?f_ri=30945","photo":"https://0.academia-photos.com/15938679/10541078/11764188/s65_eman.dan.jpg"}],"research_interests":[{"id":128,"name":"History","url":"https://www.academia.edu/Documents/in/History?f_ri=30945","nofollow":false},{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=30945","nofollow":false},{"id":248,"name":"Social Psychology","url":"https://www.academia.edu/Documents/in/Social_Psychology?f_ri=30945","nofollow":false},{"id":261,"name":"Geography","url":"https://www.academia.edu/Documents/in/Geography?f_ri=30945","nofollow":false},{"id":300,"name":"Mathematics","url":"https://www.academia.edu/Documents/in/Mathematics?f_ri=30945"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=30945"},{"id":724,"name":"Economics","url":"https://www.academia.edu/Documents/in/Economics?f_ri=30945"},{"id":808,"name":"Aesthetics","url":"https://www.academia.edu/Documents/in/Aesthetics?f_ri=30945"},{"id":947,"name":"Theatre Studies","url":"https://www.academia.edu/Documents/in/Theatre_Studies?f_ri=30945"},{"id":951,"name":"Humanities","url":"https://www.academia.edu/Documents/in/Humanities?f_ri=30945"},{"id":982,"name":"Cyberlaw","url":"https://www.academia.edu/Documents/in/Cyberlaw?f_ri=30945"},{"id":1197,"name":"Digital Humanities","url":"https://www.academia.edu/Documents/in/Digital_Humanities?f_ri=30945"},{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=30945"},{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering?f_ri=30945"},{"id":1452,"name":"Corporate Social Responsibility","url":"https://www.academia.edu/Documents/in/Corporate_Social_Responsibility?f_ri=30945"},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=30945"},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=30945"},{"id":2553,"name":"Social Networking","url":"https://www.academia.edu/Documents/in/Social_Networking?f_ri=30945"},{"id":2606,"name":"Innovation statistics","url":"https://www.academia.edu/Documents/in/Innovation_statistics?f_ri=30945"},{"id":2858,"name":"Popular Culture","url":"https://www.academia.edu/Documents/in/Popular_Culture?f_ri=30945"},{"id":2869,"name":"Digital Media","url":"https://www.academia.edu/Documents/in/Digital_Media?f_ri=30945"},{"id":3723,"name":"History of Science","url":"https://www.academia.edu/Documents/in/History_of_Science?f_ri=30945"},{"id":4181,"name":"Cybernetics","url":"https://www.academia.edu/Documents/in/Cybernetics?f_ri=30945"},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks?f_ri=30945"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=30945"},{"id":5401,"name":"Computer-Mediated Communication","url":"https://www.academia.edu/Documents/in/Computer-Mediated_Communication?f_ri=30945"},{"id":6222,"name":"Drama","url":"https://www.academia.edu/Documents/in/Drama?f_ri=30945"},{"id":6865,"name":"Digital Culture","url":"https://www.academia.edu/Documents/in/Digital_Culture?f_ri=30945"},{"id":7057,"name":"Cyberstudies","url":"https://www.academia.edu/Documents/in/Cyberstudies?f_ri=30945"},{"id":7125,"name":"Culture","url":"https://www.academia.edu/Documents/in/Culture?f_ri=30945"},{"id":8673,"name":"Digital Media \u0026 Learning","url":"https://www.academia.edu/Documents/in/Digital_Media_and_Learning?f_ri=30945"},{"id":9038,"name":"Digital Signal Processing","url":"https://www.academia.edu/Documents/in/Digital_Signal_Processing?f_ri=30945"},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=30945"},{"id":11336,"name":"Cyber Terrorism","url":"https://www.academia.edu/Documents/in/Cyber_Terrorism?f_ri=30945"},{"id":11337,"name":"Cyber Warfare","url":"https://www.academia.edu/Documents/in/Cyber_Warfare?f_ri=30945"},{"id":20594,"name":"Cyber crime","url":"https://www.academia.edu/Documents/in/Cyber_crime?f_ri=30945"},{"id":29128,"name":"Cybercultures","url":"https://www.academia.edu/Documents/in/Cybercultures?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":41862,"name":"Cyberwarfare","url":"https://www.academia.edu/Documents/in/Cyberwarfare?f_ri=30945"},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945"},{"id":48200,"name":"Digital Library","url":"https://www.academia.edu/Documents/in/Digital_Library?f_ri=30945"},{"id":96546,"name":"Cyber Law","url":"https://www.academia.edu/Documents/in/Cyber_Law?f_ri=30945"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=30945"},{"id":272255,"name":"Scienses","url":"https://www.academia.edu/Documents/in/Scienses?f_ri=30945"},{"id":1224548,"name":"Electrical and Computer Engineering (ECE)","url":"https://www.academia.edu/Documents/in/Electrical_and_Computer_Engineering_ECE_?f_ri=30945"},{"id":1226904,"name":"Computer Science and Engineering","url":"https://www.academia.edu/Documents/in/Computer_Science_and_Engineering-1?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_33998805" data-work_id="33998805" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/33998805/CIBER_YIHAD_EL_ESTADO_ISL%C3%81MICO_TERRORISMO_H%C3%8DBRIDO">CIBER YIHAD. EL ESTADO ISLÁMICO. TERRORISMO HÍBRIDO.</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/33998805" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="79e74d1a4a30e64c5419d040bad9469c" rel="nofollow" data-download="{"attachment_id":54177327,"asset_id":33998805,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/54177327/download_file?st=MTczMjgyNDYwOCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="1523611" href="https://independent.academia.edu/AdriannaLlongueras">Adrianna Llongueras Vicente</a><script data-card-contents-for-user="1523611" type="text/json">{"id":1523611,"first_name":"Adrianna","last_name":"Llongueras Vicente","domain_name":"independent","page_name":"AdriannaLlongueras","display_name":"Adrianna Llongueras Vicente","profile_url":"https://independent.academia.edu/AdriannaLlongueras?f_ri=30945","photo":"https://0.academia-photos.com/1523611/539539/31459653/s65_adrianna.llongueras_vicente.png"}</script></span></span></li><li class="js-paper-rank-work_33998805 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="33998805"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 33998805, container: ".js-paper-rank-work_33998805", }); });</script></li><li class="js-percentile-work_33998805 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33998805; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_33998805"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_33998805 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="33998805"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33998805; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33998805]").text(description); $(".js-view-count-work_33998805").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_33998805").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="33998805"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">31</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="570" href="https://www.academia.edu/Documents/in/Military_Intelligence">Military Intelligence</a>, <script data-card-contents-for-ri="570" type="text/json">{"id":570,"name":"Military Intelligence","url":"https://www.academia.edu/Documents/in/Military_Intelligence?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>, <script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="982" href="https://www.academia.edu/Documents/in/Cyberlaw">Cyberlaw</a>, <script data-card-contents-for-ri="982" type="text/json">{"id":982,"name":"Cyberlaw","url":"https://www.academia.edu/Documents/in/Cyberlaw?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1483" href="https://www.academia.edu/Documents/in/Foreign_Policy_Analysis">Foreign Policy Analysis</a><script data-card-contents-for-ri="1483" type="text/json">{"id":1483,"name":"Foreign Policy Analysis","url":"https://www.academia.edu/Documents/in/Foreign_Policy_Analysis?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=33998805]'), work: {"id":33998805,"title":"CIBER YIHAD. EL ESTADO ISLÁMICO. TERRORISMO HÍBRIDO.","created_at":"2017-07-22T11:50:08.176-07:00","url":"https://www.academia.edu/33998805/CIBER_YIHAD_EL_ESTADO_ISL%C3%81MICO_TERRORISMO_H%C3%8DBRIDO?f_ri=30945","dom_id":"work_33998805","summary":null,"downloadable_attachments":[{"id":54177327,"asset_id":33998805,"asset_type":"Work","always_allow_download":false},{"id":53947139,"asset_id":33998805,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":1523611,"first_name":"Adrianna","last_name":"Llongueras Vicente","domain_name":"independent","page_name":"AdriannaLlongueras","display_name":"Adrianna Llongueras Vicente","profile_url":"https://independent.academia.edu/AdriannaLlongueras?f_ri=30945","photo":"https://0.academia-photos.com/1523611/539539/31459653/s65_adrianna.llongueras_vicente.png"}],"research_interests":[{"id":570,"name":"Military Intelligence","url":"https://www.academia.edu/Documents/in/Military_Intelligence?f_ri=30945","nofollow":false},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=30945","nofollow":false},{"id":982,"name":"Cyberlaw","url":"https://www.academia.edu/Documents/in/Cyberlaw?f_ri=30945","nofollow":false},{"id":1483,"name":"Foreign Policy Analysis","url":"https://www.academia.edu/Documents/in/Foreign_Policy_Analysis?f_ri=30945","nofollow":false},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=30945"},{"id":1720,"name":"International Terrorism","url":"https://www.academia.edu/Documents/in/International_Terrorism?f_ri=30945"},{"id":2052,"name":"Intelligence Studies","url":"https://www.academia.edu/Documents/in/Intelligence_Studies?f_ri=30945"},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=30945"},{"id":2674,"name":"Intelligence","url":"https://www.academia.edu/Documents/in/Intelligence?f_ri=30945"},{"id":3873,"name":"Strategic Studies","url":"https://www.academia.edu/Documents/in/Strategic_Studies?f_ri=30945"},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=30945"},{"id":11336,"name":"Cyber Terrorism","url":"https://www.academia.edu/Documents/in/Cyber_Terrorism?f_ri=30945"},{"id":11337,"name":"Cyber Warfare","url":"https://www.academia.edu/Documents/in/Cyber_Warfare?f_ri=30945"},{"id":12628,"name":"Intelligence and Espionage","url":"https://www.academia.edu/Documents/in/Intelligence_and_Espionage?f_ri=30945"},{"id":30456,"name":"War on Terror","url":"https://www.academia.edu/Documents/in/War_on_Terror?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=30945"},{"id":126752,"name":"Inteligencia","url":"https://www.academia.edu/Documents/in/Inteligencia?f_ri=30945"},{"id":141805,"name":"Estrategia","url":"https://www.academia.edu/Documents/in/Estrategia?f_ri=30945"},{"id":306812,"name":"Terrorismo","url":"https://www.academia.edu/Documents/in/Terrorismo?f_ri=30945"},{"id":346639,"name":"Intelligence and security studies","url":"https://www.academia.edu/Documents/in/Intelligence_and_security_studies?f_ri=30945"},{"id":403712,"name":"Islamic State","url":"https://www.academia.edu/Documents/in/Islamic_State?f_ri=30945"},{"id":469642,"name":"Jihadism and Radical Islamism","url":"https://www.academia.edu/Documents/in/Jihadism_and_Radical_Islamism?f_ri=30945"},{"id":575199,"name":"Delincuencia Cibernética","url":"https://www.academia.edu/Documents/in/Delincuencia_Cibernetica?f_ri=30945"},{"id":592394,"name":"Analisis","url":"https://www.academia.edu/Documents/in/Analisis?f_ri=30945"},{"id":761870,"name":"Terrorism and Counterterrorism","url":"https://www.academia.edu/Documents/in/Terrorism_and_Counterterrorism?f_ri=30945"},{"id":828593,"name":"TERRORISMO YIHADISTA","url":"https://www.academia.edu/Documents/in/TERRORISMO_YIHADISTA?f_ri=30945"},{"id":828595,"name":"TERRORISMO INTERNACIONAL","url":"https://www.academia.edu/Documents/in/TERRORISMO_INTERNACIONAL?f_ri=30945"},{"id":1231865,"name":"Islamic State of Iraq and the Levant","url":"https://www.academia.edu/Documents/in/Islamic_State_of_Iraq_and_the_Levant?f_ri=30945"},{"id":1398303,"name":"Daesh","url":"https://www.academia.edu/Documents/in/Daesh?f_ri=30945"},{"id":1576589,"name":"Estado Islámico","url":"https://www.academia.edu/Documents/in/Estado_Isl%C3%A1mico?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_34832996" data-work_id="34832996" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/34832996/Chimeras_in_political_and_social_space_doc">Chimeras in political and social space .doc</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The subject of this article is a relatively new phenomenon of the political "monsters" and their variety – the political "chimeras", which the authors cover from the point of view of the analysis of the substantial and essential, causal... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_34832996" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The subject of this article is a relatively new phenomenon of the political "monsters" and their variety – the political "chimeras", which the authors cover from the point of view of the analysis of the substantial and essential, causal and functional nature of this phenomenon. It is shown that the dual nature of the political "monsters" and "chimeras" allows us to model a new format of relationships, including in virtual space, when the functional component begins to dominate over the content.<br />The authors note that in global information flow when any news don’t live longer than one day, clip consciousness basically can’t critically estimate received information, which is a good ground for the creation, formation and dissemination of the so-called political "monsters" and "chimeras", as a basis for the further ideological and political manipulation.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/34832996" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="d79106812b537c0fa9a132f13b0fcc80" rel="nofollow" data-download="{"attachment_id":54691374,"asset_id":34832996,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/54691374/download_file?st=MTczMjgyNDYwOCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="157606" href="https://hse-ru.academia.edu/MarinaKukartsevaGlaser">Marina Glaser</a><script data-card-contents-for-user="157606" type="text/json">{"id":157606,"first_name":"Marina","last_name":"Glaser","domain_name":"hse-ru","page_name":"MarinaKukartsevaGlaser","display_name":"Marina Glaser","profile_url":"https://hse-ru.academia.edu/MarinaKukartsevaGlaser?f_ri=30945","photo":"https://0.academia-photos.com/157606/40694/37397/s65_marina.kukartseva.jpg"}</script></span></span></li><li class="js-paper-rank-work_34832996 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="34832996"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 34832996, container: ".js-paper-rank-work_34832996", }); });</script></li><li class="js-percentile-work_34832996 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 34832996; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_34832996"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_34832996 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="34832996"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 34832996; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=34832996]").text(description); $(".js-view-count-work_34832996").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_34832996").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="34832996"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">3</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="813" href="https://www.academia.edu/Documents/in/Political_Philosophy">Political Philosophy</a>, <script data-card-contents-for-ri="813" type="text/json">{"id":813,"name":"Political Philosophy","url":"https://www.academia.edu/Documents/in/Political_Philosophy?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4486" href="https://www.academia.edu/Documents/in/Political_Science">Political Science</a>, <script data-card-contents-for-ri="4486" type="text/json">{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a><script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=34832996]'), work: {"id":34832996,"title":"Chimeras in political and social space .doc","created_at":"2017-10-11T12:01:27.917-07:00","url":"https://www.academia.edu/34832996/Chimeras_in_political_and_social_space_doc?f_ri=30945","dom_id":"work_34832996","summary":"The subject of this article is a relatively new phenomenon of the political \"monsters\" and their variety – the political \"chimeras\", which the authors cover from the point of view of the analysis of the substantial and essential, causal and functional nature of this phenomenon. It is shown that the dual nature of the political \"monsters\" and \"chimeras\" allows us to model a new format of relationships, including in virtual space, when the functional component begins to dominate over the content.\nThe authors note that in global information flow when any news don’t live longer than one day, clip consciousness basically can’t critically estimate received information, which is a good ground for the creation, formation and dissemination of the so-called political \"monsters\" and \"chimeras\", as a basis for the further ideological and political manipulation.\n","downloadable_attachments":[{"id":54691374,"asset_id":34832996,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":157606,"first_name":"Marina","last_name":"Glaser","domain_name":"hse-ru","page_name":"MarinaKukartsevaGlaser","display_name":"Marina Glaser","profile_url":"https://hse-ru.academia.edu/MarinaKukartsevaGlaser?f_ri=30945","photo":"https://0.academia-photos.com/157606/40694/37397/s65_marina.kukartseva.jpg"}],"research_interests":[{"id":813,"name":"Political Philosophy","url":"https://www.academia.edu/Documents/in/Political_Philosophy?f_ri=30945","nofollow":false},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_28751046" data-work_id="28751046" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/28751046/amg_o_que_e_pensar_uma_Geopoli_tica_do_Ciberespac_o_27_de_Setembro_2016_ppt">amg, o que é pensar uma Geopolítica do Ciberespaço (27 de Setembro, 2016).ppt</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/28751046" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="129f0c5a5659ed225eb83172e5af7dd5" rel="nofollow" data-download="{"attachment_id":49165127,"asset_id":28751046,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/49165127/download_file?st=MTczMjgyNDYwOCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="134181" href="https://cria.academia.edu/ArmandoMarquesGuedes">Armando Marques-Guedes</a><script data-card-contents-for-user="134181" type="text/json">{"id":134181,"first_name":"Armando","last_name":"Marques-Guedes","domain_name":"cria","page_name":"ArmandoMarquesGuedes","display_name":"Armando Marques-Guedes","profile_url":"https://cria.academia.edu/ArmandoMarquesGuedes?f_ri=30945","photo":"https://0.academia-photos.com/134181/3401094/148494125/s65_armando.marques-guedes.png"}</script></span></span></li><li class="js-paper-rank-work_28751046 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="28751046"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 28751046, container: ".js-paper-rank-work_28751046", }); });</script></li><li class="js-percentile-work_28751046 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 28751046; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_28751046"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_28751046 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="28751046"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 28751046; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=28751046]").text(description); $(".js-view-count-work_28751046").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_28751046").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="28751046"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">98</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="128" href="https://www.academia.edu/Documents/in/History">History</a>, <script data-card-contents-for-ri="128" type="text/json">{"id":128,"name":"History","url":"https://www.academia.edu/Documents/in/History?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="136" href="https://www.academia.edu/Documents/in/Cultural_History">Cultural History</a>, <script data-card-contents-for-ri="136" type="text/json">{"id":136,"name":"Cultural History","url":"https://www.academia.edu/Documents/in/Cultural_History?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="184" href="https://www.academia.edu/Documents/in/Sociology">Sociology</a>, <script data-card-contents-for-ri="184" type="text/json">{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="201" href="https://www.academia.edu/Documents/in/Political_Sociology">Political Sociology</a><script data-card-contents-for-ri="201" type="text/json">{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=28751046]'), work: {"id":28751046,"title":"amg, o que é pensar uma Geopolítica do Ciberespaço (27 de Setembro, 2016).ppt","created_at":"2016-09-27T15:00:37.548-07:00","url":"https://www.academia.edu/28751046/amg_o_que_e_pensar_uma_Geopoli_tica_do_Ciberespac_o_27_de_Setembro_2016_ppt?f_ri=30945","dom_id":"work_28751046","summary":null,"downloadable_attachments":[{"id":49165127,"asset_id":28751046,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":134181,"first_name":"Armando","last_name":"Marques-Guedes","domain_name":"cria","page_name":"ArmandoMarquesGuedes","display_name":"Armando Marques-Guedes","profile_url":"https://cria.academia.edu/ArmandoMarquesGuedes?f_ri=30945","photo":"https://0.academia-photos.com/134181/3401094/148494125/s65_armando.marques-guedes.png"}],"research_interests":[{"id":128,"name":"History","url":"https://www.academia.edu/Documents/in/History?f_ri=30945","nofollow":false},{"id":136,"name":"Cultural History","url":"https://www.academia.edu/Documents/in/Cultural_History?f_ri=30945","nofollow":false},{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=30945","nofollow":false},{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=30945","nofollow":false},{"id":208,"name":"Social Movements","url":"https://www.academia.edu/Documents/in/Social_Movements?f_ri=30945"},{"id":261,"name":"Geography","url":"https://www.academia.edu/Documents/in/Geography?f_ri=30945"},{"id":262,"name":"Human Geography","url":"https://www.academia.edu/Documents/in/Human_Geography?f_ri=30945"},{"id":268,"name":"Political Geography and Geopolitics","url":"https://www.academia.edu/Documents/in/Political_Geography_and_Geopolitics?f_ri=30945"},{"id":300,"name":"Mathematics","url":"https://www.academia.edu/Documents/in/Mathematics?f_ri=30945"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=30945"},{"id":472,"name":"Human Computer Interaction","url":"https://www.academia.edu/Documents/in/Human_Computer_Interaction?f_ri=30945"},{"id":498,"name":"Physics","url":"https://www.academia.edu/Documents/in/Physics?f_ri=30945"},{"id":516,"name":"Optics","url":"https://www.academia.edu/Documents/in/Optics?f_ri=30945"},{"id":724,"name":"Economics","url":"https://www.academia.edu/Documents/in/Economics?f_ri=30945"},{"id":767,"name":"Anthropology","url":"https://www.academia.edu/Documents/in/Anthropology?f_ri=30945"},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=30945"},{"id":802,"name":"Political Economy","url":"https://www.academia.edu/Documents/in/Political_Economy?f_ri=30945"},{"id":803,"name":"Philosophy","url":"https://www.academia.edu/Documents/in/Philosophy?f_ri=30945"},{"id":813,"name":"Political Philosophy","url":"https://www.academia.edu/Documents/in/Political_Philosophy?f_ri=30945"},{"id":821,"name":"Philosophy of Science","url":"https://www.academia.edu/Documents/in/Philosophy_of_Science?f_ri=30945"},{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication?f_ri=30945"},{"id":922,"name":"Education","url":"https://www.academia.edu/Documents/in/Education?f_ri=30945"},{"id":954,"name":"Social Anthropology","url":"https://www.academia.edu/Documents/in/Social_Anthropology?f_ri=30945"},{"id":1003,"name":"Educational Technology","url":"https://www.academia.edu/Documents/in/Educational_Technology?f_ri=30945"},{"id":1166,"name":"International Relations Theory","url":"https://www.academia.edu/Documents/in/International_Relations_Theory?f_ri=30945"},{"id":1233,"name":"Social Networks","url":"https://www.academia.edu/Documents/in/Social_Networks?f_ri=30945"},{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=30945"},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=30945"},{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering?f_ri=30945"},{"id":1512,"name":"Climate Change","url":"https://www.academia.edu/Documents/in/Climate_Change?f_ri=30945"},{"id":1583,"name":"Industrial Ecology","url":"https://www.academia.edu/Documents/in/Industrial_Ecology?f_ri=30945"},{"id":1696,"name":"Political Theory","url":"https://www.academia.edu/Documents/in/Political_Theory?f_ri=30945"},{"id":1736,"name":"Science Education","url":"https://www.academia.edu/Documents/in/Science_Education?f_ri=30945"},{"id":1911,"name":"International Studies","url":"https://www.academia.edu/Documents/in/International_Studies?f_ri=30945"},{"id":2180,"name":"Optical Fiber Communications","url":"https://www.academia.edu/Documents/in/Optical_Fiber_Communications?f_ri=30945"},{"id":2345,"name":"Wireless Communications","url":"https://www.academia.edu/Documents/in/Wireless_Communications?f_ri=30945"},{"id":2509,"name":"Philosophy Of Mathematics","url":"https://www.academia.edu/Documents/in/Philosophy_Of_Mathematics?f_ri=30945"},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=30945"},{"id":2553,"name":"Social Networking","url":"https://www.academia.edu/Documents/in/Social_Networking?f_ri=30945"},{"id":2621,"name":"Higher Education","url":"https://www.academia.edu/Documents/in/Higher_Education?f_ri=30945"},{"id":2990,"name":"Geopolitics","url":"https://www.academia.edu/Documents/in/Geopolitics?f_ri=30945"},{"id":3116,"name":"Space and Place","url":"https://www.academia.edu/Documents/in/Space_and_Place?f_ri=30945"},{"id":3165,"name":"Maritime History","url":"https://www.academia.edu/Documents/in/Maritime_History?f_ri=30945"},{"id":3255,"name":"Climate Change Adaptation","url":"https://www.academia.edu/Documents/in/Climate_Change_Adaptation?f_ri=30945"},{"id":3499,"name":"Social and Cultural Anthropology","url":"https://www.academia.edu/Documents/in/Social_and_Cultural_Anthropology?f_ri=30945"},{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=30945"},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=30945"},{"id":3723,"name":"History of Science","url":"https://www.academia.edu/Documents/in/History_of_Science?f_ri=30945"},{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=30945"},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks?f_ri=30945"},{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=30945"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=30945"},{"id":4730,"name":"Mass Communication","url":"https://www.academia.edu/Documents/in/Mass_Communication?f_ri=30945"},{"id":5420,"name":"Anthropology of space","url":"https://www.academia.edu/Documents/in/Anthropology_of_space?f_ri=30945"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=30945"},{"id":5709,"name":"Politics","url":"https://www.academia.edu/Documents/in/Politics?f_ri=30945"},{"id":6276,"name":"International Political Economy","url":"https://www.academia.edu/Documents/in/International_Political_Economy?f_ri=30945"},{"id":7369,"name":"Political communication","url":"https://www.academia.edu/Documents/in/Political_communication?f_ri=30945"},{"id":7454,"name":"Information Communication Technology","url":"https://www.academia.edu/Documents/in/Information_Communication_Technology?f_ri=30945"},{"id":9846,"name":"Ecology","url":"https://www.academia.edu/Documents/in/Ecology?f_ri=30945"},{"id":10344,"name":"International Politics","url":"https://www.academia.edu/Documents/in/International_Politics?f_ri=30945"},{"id":10601,"name":"Data Warehousing","url":"https://www.academia.edu/Documents/in/Data_Warehousing?f_ri=30945"},{"id":12115,"name":"Optical Communication","url":"https://www.academia.edu/Documents/in/Optical_Communication?f_ri=30945"},{"id":13872,"name":"Facebook","url":"https://www.academia.edu/Documents/in/Facebook?f_ri=30945"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=30945"},{"id":15263,"name":"First World War","url":"https://www.academia.edu/Documents/in/First_World_War?f_ri=30945"},{"id":15588,"name":"Social History","url":"https://www.academia.edu/Documents/in/Social_History?f_ri=30945"},{"id":25618,"name":"Phenomenology of Space and Place","url":"https://www.academia.edu/Documents/in/Phenomenology_of_Space_and_Place?f_ri=30945"},{"id":30632,"name":"Public Space","url":"https://www.academia.edu/Documents/in/Public_Space?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":30947,"name":"The Internet","url":"https://www.academia.edu/Documents/in/The_Internet?f_ri=30945"},{"id":45405,"name":"Global Warming","url":"https://www.academia.edu/Documents/in/Global_Warming?f_ri=30945"},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945"},{"id":48532,"name":"Maritime Security","url":"https://www.academia.edu/Documents/in/Maritime_Security?f_ri=30945"},{"id":49837,"name":"Historia","url":"https://www.academia.edu/Documents/in/Historia?f_ri=30945"},{"id":50361,"name":"Sociologie","url":"https://www.academia.edu/Documents/in/Sociologie?f_ri=30945"},{"id":50967,"name":"Mass Communication and New Media","url":"https://www.academia.edu/Documents/in/Mass_Communication_and_New_Media?f_ri=30945"},{"id":51360,"name":"Economia","url":"https://www.academia.edu/Documents/in/Economia?f_ri=30945"},{"id":51625,"name":"Educación","url":"https://www.academia.edu/Documents/in/Educaci%C3%B3n?f_ri=30945"},{"id":52480,"name":"Sociologia","url":"https://www.academia.edu/Documents/in/Sociologia?f_ri=30945"},{"id":58119,"name":"Facebook Studies","url":"https://www.academia.edu/Documents/in/Facebook_Studies?f_ri=30945"},{"id":60807,"name":"Maritime","url":"https://www.academia.edu/Documents/in/Maritime?f_ri=30945"},{"id":61620,"name":"National Security","url":"https://www.academia.edu/Documents/in/National_Security?f_ri=30945"},{"id":67378,"name":"Sattelite Altimetry","url":"https://www.academia.edu/Documents/in/Sattelite_Altimetry?f_ri=30945"},{"id":88935,"name":"Sociología","url":"https://www.academia.edu/Documents/in/Sociolog%C3%ADa?f_ri=30945"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=30945"},{"id":190814,"name":"Réseau Informatique","url":"https://www.academia.edu/Documents/in/R%C3%A9seau_Informatique?f_ri=30945"},{"id":196091,"name":"Sattelite Imagery","url":"https://www.academia.edu/Documents/in/Sattelite_Imagery?f_ri=30945"},{"id":265674,"name":"Submarine Cable","url":"https://www.academia.edu/Documents/in/Submarine_Cable?f_ri=30945"},{"id":435047,"name":"Architecture Des Ordinateurs","url":"https://www.academia.edu/Documents/in/Architecture_Des_Ordinateurs?f_ri=30945"},{"id":548084,"name":"Humanités Numériques","url":"https://www.academia.edu/Documents/in/Humanites_Numeriques?f_ri=30945"},{"id":670216,"name":"Sattelite Communication","url":"https://www.academia.edu/Documents/in/Sattelite_Communication?f_ri=30945"},{"id":1009312,"name":"Geographic Information Systems (GIS)","url":"https://www.academia.edu/Documents/in/Geographic_Information_Systems_GIS_?f_ri=30945"},{"id":1115297,"name":"Twiiter","url":"https://www.academia.edu/Documents/in/Twiiter?f_ri=30945"},{"id":1147310,"name":"Réseaux et télécoms","url":"https://www.academia.edu/Documents/in/R%C3%A9seaux_et_t%C3%A9l%C3%A9coms?f_ri=30945"},{"id":1195931,"name":"Geographic Information Systems GIS)","url":"https://www.academia.edu/Documents/in/Geographic_Information_Systems_GIS_-2?f_ri=30945"},{"id":1227987,"name":"Mathemtics","url":"https://www.academia.edu/Documents/in/Mathemtics?f_ri=30945"},{"id":1581553,"name":"Global Warming Research Paper Topics Global Warming Research Paper Topics","url":"https://www.academia.edu/Documents/in/Global_Warming_Research_Paper_Topics_Global_Warming_Research_Paper_Topics?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_8492469" data-work_id="8492469" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/8492469/CSEC_630_A_Review_of_Foreign_Policy_Institutes">CSEC 630- A Review of Foreign Policy Institutes</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/8492469" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="2141dddfb699ec364dbc6410acfd93af" rel="nofollow" data-download="{"attachment_id":34873353,"asset_id":8492469,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/34873353/download_file?st=MTczMjgyNDYwOCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3893179" href="https://independent.academia.edu/TigranTerpandjian">Tigran Terpandjian</a><script data-card-contents-for-user="3893179" type="text/json">{"id":3893179,"first_name":"Tigran","last_name":"Terpandjian","domain_name":"independent","page_name":"TigranTerpandjian","display_name":"Tigran Terpandjian","profile_url":"https://independent.academia.edu/TigranTerpandjian?f_ri=30945","photo":"https://0.academia-photos.com/3893179/1441459/3823226/s65_tigran.terpandjian.jpg"}</script></span></span></li><li class="js-paper-rank-work_8492469 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="8492469"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 8492469, container: ".js-paper-rank-work_8492469", }); });</script></li><li class="js-percentile-work_8492469 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 8492469; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_8492469"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_8492469 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="8492469"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 8492469; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=8492469]").text(description); $(".js-view-count-work_8492469").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_8492469").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="8492469"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">6</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="982" href="https://www.academia.edu/Documents/in/Cyberlaw">Cyberlaw</a>, <script data-card-contents-for-ri="982" type="text/json">{"id":982,"name":"Cyberlaw","url":"https://www.academia.edu/Documents/in/Cyberlaw?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="11337" href="https://www.academia.edu/Documents/in/Cyber_Warfare">Cyber Warfare</a>, <script data-card-contents-for-ri="11337" type="text/json">{"id":11337,"name":"Cyber Warfare","url":"https://www.academia.edu/Documents/in/Cyber_Warfare?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a>, <script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="46738" href="https://www.academia.edu/Documents/in/Cybersecurity">Cybersecurity</a><script data-card-contents-for-ri="46738" type="text/json">{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=8492469]'), work: {"id":8492469,"title":"CSEC 630- A Review of Foreign Policy Institutes","created_at":"2014-09-25T05:59:04.846-07:00","url":"https://www.academia.edu/8492469/CSEC_630_A_Review_of_Foreign_Policy_Institutes?f_ri=30945","dom_id":"work_8492469","summary":null,"downloadable_attachments":[{"id":34873353,"asset_id":8492469,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3893179,"first_name":"Tigran","last_name":"Terpandjian","domain_name":"independent","page_name":"TigranTerpandjian","display_name":"Tigran Terpandjian","profile_url":"https://independent.academia.edu/TigranTerpandjian?f_ri=30945","photo":"https://0.academia-photos.com/3893179/1441459/3823226/s65_tigran.terpandjian.jpg"}],"research_interests":[{"id":982,"name":"Cyberlaw","url":"https://www.academia.edu/Documents/in/Cyberlaw?f_ri=30945","nofollow":false},{"id":11337,"name":"Cyber Warfare","url":"https://www.academia.edu/Documents/in/Cyber_Warfare?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945","nofollow":false},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=30945"},{"id":559844,"name":"Cyberspace Operations","url":"https://www.academia.edu/Documents/in/Cyberspace_Operations?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_34105191" data-work_id="34105191" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/34105191/Globalization_into_Cyberspace_Hari_Kunzru_s_Transmission_and_the_Indian_Transnational_Parasite">Globalization into Cyberspace: Hari Kunzru’s Transmission and the Indian Transnational Parasite</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">In The Condition of Postmodernity (1989), the geographer David Harvey articulated the concept of " time-space compression " to designate commodity production and accumulation as key-factors of a renewed relation between time and space.... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_34105191" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">In The Condition of Postmodernity (1989), the geographer David Harvey articulated the concept of " time-space compression " to designate commodity production and accumulation as key-factors of a renewed relation between time and space. Harvey's condition of postmodernity is hence dominated by an alteration of spatio-temporal perceptions, but whereas globalized modernity has dissolved the borders of the nation-states, allowing for the emergence of global mobility of both human and financial capital, it has also turned hope into disillusionment. As Sankaran Krishna argues (2009), postcolonialism raises doubts about the inequalities and injustices of our contemporary liquid global world. Krishna's contention is that the interactions between West and non-West have not been egalitarian in cultural and economic terms, a dissatisfaction that Joseph Stiglitz had already expressed in his Globalization and its Discontent (2002). Pro-globalization policies, Stiglitz claims, can increase vulnerability and poverty when they enhance corruption, rapid change without cultural adaptation, and ethnic conflicts. The complex interaction of globalization, human mobility and cultural commodification can be acknowledged in the transnational turn of early twenty-first century Indian writing. Like a virus, Indian literature has percolated through Anglophone literary spaces. Not only have Rushdie's heirs, or midnight's grandchildren as they have been labelled, disseminated Indian literature. In their works, as Bill Ashcroft contends (2017), " India itself has put the traditional idea of the nation as imagined community into question ". In the wake of global mobility and spatio-temporal disarray, Indian writing has interrogated the idea of the Nation as it had been embraced in the aftermath of Partition. This year, India is celebrating its seventieth anniversary since independence and contemporary diasporic Indian writers ― Jhumpa Lahiri, Kiran Desai and Hari Kunzru, just to name a few ― still draw upon Rushdie's skepticism of nationalism but, disregarding his epic scale tones, they tend to privilege stories of ordinary displaced people. Hari Kunzru's Transmission (2004), for instance, is a tale of worldwide connections and disconnections, global strollers, neoliberal finance and cyberculture clash. A British writer of</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/34105191" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="3399623ba8b08a35d12a31f3c049cef2" rel="nofollow" data-download="{"attachment_id":54036869,"asset_id":34105191,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/54036869/download_file?st=MTczMjgyNDYwOCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="23696200" href="https://uniba-it.academia.edu/AngeloMonaco">Angelo Monaco</a><script data-card-contents-for-user="23696200" type="text/json">{"id":23696200,"first_name":"Angelo","last_name":"Monaco","domain_name":"uniba-it","page_name":"AngeloMonaco","display_name":"Angelo Monaco","profile_url":"https://uniba-it.academia.edu/AngeloMonaco?f_ri=30945","photo":"https://0.academia-photos.com/23696200/6425211/143262698/s65_angelo.monaco.jpg"}</script></span></span></li><li class="js-paper-rank-work_34105191 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="34105191"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 34105191, container: ".js-paper-rank-work_34105191", }); });</script></li><li class="js-percentile-work_34105191 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 34105191; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_34105191"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_34105191 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="34105191"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 34105191; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=34105191]").text(description); $(".js-view-count-work_34105191").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_34105191").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="34105191"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1439" href="https://www.academia.edu/Documents/in/Globalization">Globalization</a>, <script data-card-contents-for-ri="1439" type="text/json">{"id":1439,"name":"Globalization","url":"https://www.academia.edu/Documents/in/Globalization?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2860" href="https://www.academia.edu/Documents/in/Postcolonial_Studies">Postcolonial Studies</a>, <script data-card-contents-for-ri="2860" type="text/json">{"id":2860,"name":"Postcolonial Studies","url":"https://www.academia.edu/Documents/in/Postcolonial_Studies?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a>, <script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="95431" href="https://www.academia.edu/Documents/in/Indian_Diaspora">Indian Diaspora</a><script data-card-contents-for-ri="95431" type="text/json">{"id":95431,"name":"Indian Diaspora","url":"https://www.academia.edu/Documents/in/Indian_Diaspora?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=34105191]'), work: {"id":34105191,"title":"Globalization into Cyberspace: Hari Kunzru’s Transmission and the Indian Transnational Parasite","created_at":"2017-08-02T00:53:30.889-07:00","url":"https://www.academia.edu/34105191/Globalization_into_Cyberspace_Hari_Kunzru_s_Transmission_and_the_Indian_Transnational_Parasite?f_ri=30945","dom_id":"work_34105191","summary":"In The Condition of Postmodernity (1989), the geographer David Harvey articulated the concept of \" time-space compression \" to designate commodity production and accumulation as key-factors of a renewed relation between time and space. Harvey's condition of postmodernity is hence dominated by an alteration of spatio-temporal perceptions, but whereas globalized modernity has dissolved the borders of the nation-states, allowing for the emergence of global mobility of both human and financial capital, it has also turned hope into disillusionment. As Sankaran Krishna argues (2009), postcolonialism raises doubts about the inequalities and injustices of our contemporary liquid global world. Krishna's contention is that the interactions between West and non-West have not been egalitarian in cultural and economic terms, a dissatisfaction that Joseph Stiglitz had already expressed in his Globalization and its Discontent (2002). Pro-globalization policies, Stiglitz claims, can increase vulnerability and poverty when they enhance corruption, rapid change without cultural adaptation, and ethnic conflicts. The complex interaction of globalization, human mobility and cultural commodification can be acknowledged in the transnational turn of early twenty-first century Indian writing. Like a virus, Indian literature has percolated through Anglophone literary spaces. Not only have Rushdie's heirs, or midnight's grandchildren as they have been labelled, disseminated Indian literature. In their works, as Bill Ashcroft contends (2017), \" India itself has put the traditional idea of the nation as imagined community into question \". In the wake of global mobility and spatio-temporal disarray, Indian writing has interrogated the idea of the Nation as it had been embraced in the aftermath of Partition. This year, India is celebrating its seventieth anniversary since independence and contemporary diasporic Indian writers ― Jhumpa Lahiri, Kiran Desai and Hari Kunzru, just to name a few ― still draw upon Rushdie's skepticism of nationalism but, disregarding his epic scale tones, they tend to privilege stories of ordinary displaced people. Hari Kunzru's Transmission (2004), for instance, is a tale of worldwide connections and disconnections, global strollers, neoliberal finance and cyberculture clash. A British writer of","downloadable_attachments":[{"id":54036869,"asset_id":34105191,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":23696200,"first_name":"Angelo","last_name":"Monaco","domain_name":"uniba-it","page_name":"AngeloMonaco","display_name":"Angelo Monaco","profile_url":"https://uniba-it.academia.edu/AngeloMonaco?f_ri=30945","photo":"https://0.academia-photos.com/23696200/6425211/143262698/s65_angelo.monaco.jpg"}],"research_interests":[{"id":1439,"name":"Globalization","url":"https://www.academia.edu/Documents/in/Globalization?f_ri=30945","nofollow":false},{"id":2860,"name":"Postcolonial Studies","url":"https://www.academia.edu/Documents/in/Postcolonial_Studies?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":95431,"name":"Indian Diaspora","url":"https://www.academia.edu/Documents/in/Indian_Diaspora?f_ri=30945","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_73551607" data-work_id="73551607" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/73551607/Cyber_Threats_to_Democratic_Processes">Cyber Threats to Democratic Processes</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The Russian interference in the presidential elections in the United States and in France raises questions about the need and ability of democratic countries to protect their election processes. This article indicates the importance of... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_73551607" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The Russian interference in the presidential elections in the United States and in France raises questions about the need and ability of democratic countries to protect their election processes. This article indicates the importance of relating to elections in a democratic country as both critical infrastructure and as a critical process, and it presents the threats to elections posed by both cyber and cultural developments. This article addresses the reality in which the extensive use of social networks and direct communications channels enables foreign entities to significantly influence the democratic process—without crippling the voting systems—by introducing outside influence into the political discourse. This constitutes a new challenge to democratic countries, which warrants thinking and re-organization.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/73551607" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="b04874dd68ec9f24918be2ee18113441" rel="nofollow" data-download="{"attachment_id":82029569,"asset_id":73551607,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/82029569/download_file?st=MTczMjgyNDYwOCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="59112606" href="https://independent.academia.edu/DudiSimanTov">Dudi Siman Tov</a><script data-card-contents-for-user="59112606" type="text/json">{"id":59112606,"first_name":"Dudi Siman","last_name":"Tov","domain_name":"independent","page_name":"DudiSimanTov","display_name":"Dudi Siman Tov","profile_url":"https://independent.academia.edu/DudiSimanTov?f_ri=30945","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_73551607 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="73551607"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 73551607, container: ".js-paper-rank-work_73551607", }); });</script></li><li class="js-percentile-work_73551607 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 73551607; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_73551607"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_73551607 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="73551607"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 73551607; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=73551607]").text(description); $(".js-view-count-work_73551607").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_73551607").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="73551607"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">6</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1233" href="https://www.academia.edu/Documents/in/Social_Networks">Social Networks</a>, <script data-card-contents-for-ri="1233" type="text/json">{"id":1233,"name":"Social Networks","url":"https://www.academia.edu/Documents/in/Social_Networks?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="18086" href="https://www.academia.edu/Documents/in/Information_operations_IO_">Information operations (IO)</a>, <script data-card-contents-for-ri="18086" type="text/json">{"id":18086,"name":"Information operations (IO)","url":"https://www.academia.edu/Documents/in/Information_operations_IO_?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="20366" href="https://www.academia.edu/Documents/in/Elections">Elections</a>, <script data-card-contents-for-ri="20366" type="text/json">{"id":20366,"name":"Elections","url":"https://www.academia.edu/Documents/in/Elections?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a><script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=73551607]'), work: {"id":73551607,"title":"Cyber Threats to Democratic Processes","created_at":"2022-03-11T09:10:22.259-08:00","url":"https://www.academia.edu/73551607/Cyber_Threats_to_Democratic_Processes?f_ri=30945","dom_id":"work_73551607","summary":"The Russian interference in the presidential elections in the United States and in France raises questions about the need and ability of democratic countries to protect their election processes. This article indicates the importance of relating to elections in a democratic country as both critical infrastructure and as a critical process, and it presents the threats to elections posed by both cyber and cultural developments. This article addresses the reality in which the extensive use of social networks and direct communications channels enables foreign entities to significantly influence the democratic process—without crippling the voting systems—by introducing outside influence into the political discourse. This constitutes a new challenge to democratic countries, which warrants thinking and re-organization.","downloadable_attachments":[{"id":82029569,"asset_id":73551607,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":59112606,"first_name":"Dudi Siman","last_name":"Tov","domain_name":"independent","page_name":"DudiSimanTov","display_name":"Dudi Siman Tov","profile_url":"https://independent.academia.edu/DudiSimanTov?f_ri=30945","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":1233,"name":"Social Networks","url":"https://www.academia.edu/Documents/in/Social_Networks?f_ri=30945","nofollow":false},{"id":18086,"name":"Information operations (IO)","url":"https://www.academia.edu/Documents/in/Information_operations_IO_?f_ri=30945","nofollow":false},{"id":20366,"name":"Elections","url":"https://www.academia.edu/Documents/in/Elections?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":180924,"name":"Critical Infrastructures","url":"https://www.academia.edu/Documents/in/Critical_Infrastructures?f_ri=30945"},{"id":1236241,"name":"Political Subversion","url":"https://www.academia.edu/Documents/in/Political_Subversion?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36468594" data-work_id="36468594" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36468594/RECONCEPTUALIZING_NIGERIAN_COPYRIGHT_LAW_TO_PROTECT_NOLLYWOOD">RECONCEPTUALIZING NIGERIAN COPYRIGHT LAW TO PROTECT NOLLYWOOD</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Intellectual Property, Nollywood, Creative Industry, Nigerian Copyright Laws, Digital Copyright, International Trade & Development, Transactional Negotiation, Animation Rights, Naijacomedy, Folklore, Traditional Cultural Expressions,... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_36468594" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Intellectual Property, Nollywood, Creative Industry, Nigerian Copyright Laws, Digital Copyright, International Trade & Development, Transactional Negotiation, Animation Rights, Naijacomedy, Folklore, Traditional Cultural Expressions, Celebrity Branding, Fashion Design, Trademarks, Cyberspace law, Contract laws, Creative Human Capital, Technology law, Technical Protection Measures, Nigerian Copyright Commission, U.S. Copyright Office, Afrollywood, Afrondise, Technical Protection Measure, Digital Copyright Millennium Act, ECOWAS, WTO, TRIPS, WIPO, Cultural Appropriation, Cultural Anachronism, Fair Use, Fair Dealing, Bollywood, Ghallywood, Hollywood, Kennywood, Jollywood, Joziwood, Vollywood, Piracy, Cinematography, Films, Animation, Fashion design, Folklore, Customary law, Nigerian Legal System, Music, Derivative Rights.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36468594" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="5a15c8cbbc497acbb15cc99d4ab19dca" rel="nofollow" data-download="{"attachment_id":56385924,"asset_id":36468594,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/56385924/download_file?st=MTczMjgyNDYwOCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="44977601" href="https://alyamamah.academia.edu/alyamamahacademiaeduProfSamuelSami%C3%A1iAndrews">Prof. Samuel Samiái Andrews, SJD, LL.M, LL. B (Hons), BL, LL.M</a><script data-card-contents-for-user="44977601" type="text/json">{"id":44977601,"first_name":"Prof. Samuel Samiái","last_name":"Andrews, SJD, LL.M, LL. B (Hons), BL, LL.M","domain_name":"alyamamah","page_name":"alyamamahacademiaeduProfSamuelSamiáiAndrews","display_name":"Prof. Samuel Samiái Andrews, SJD, LL.M, LL. B (Hons), BL, LL.M","profile_url":"https://alyamamah.academia.edu/alyamamahacademiaeduProfSamuelSami%C3%A1iAndrews?f_ri=30945","photo":"https://0.academia-photos.com/44977601/12149977/146715284/s65_prof._samuel_sami_i.andrews.jpeg"}</script></span></span></li><li class="js-paper-rank-work_36468594 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36468594"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36468594, container: ".js-paper-rank-work_36468594", }); });</script></li><li class="js-percentile-work_36468594 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36468594; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36468594"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36468594 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36468594"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36468594; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36468594]").text(description); $(".js-view-count-work_36468594").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36468594").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36468594"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">15</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="379" href="https://www.academia.edu/Documents/in/African_Studies">African Studies</a>, <script data-card-contents-for-ri="379" type="text/json">{"id":379,"name":"African Studies","url":"https://www.academia.edu/Documents/in/African_Studies?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="542" href="https://www.academia.edu/Documents/in/Jurisprudence">Jurisprudence</a>, <script data-card-contents-for-ri="542" type="text/json">{"id":542,"name":"Jurisprudence","url":"https://www.academia.edu/Documents/in/Jurisprudence?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2575" href="https://www.academia.edu/Documents/in/International_Law">International Law</a>, <script data-card-contents-for-ri="2575" type="text/json">{"id":2575,"name":"International Law","url":"https://www.academia.edu/Documents/in/International_Law?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5248" href="https://www.academia.edu/Documents/in/Legal_Theory">Legal Theory</a><script data-card-contents-for-ri="5248" type="text/json">{"id":5248,"name":"Legal Theory","url":"https://www.academia.edu/Documents/in/Legal_Theory?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36468594]'), work: {"id":36468594,"title":"RECONCEPTUALIZING NIGERIAN COPYRIGHT LAW TO PROTECT NOLLYWOOD","created_at":"2018-04-22T09:09:59.459-07:00","url":"https://www.academia.edu/36468594/RECONCEPTUALIZING_NIGERIAN_COPYRIGHT_LAW_TO_PROTECT_NOLLYWOOD?f_ri=30945","dom_id":"work_36468594","summary":"Intellectual Property, Nollywood, Creative Industry, Nigerian Copyright Laws, Digital Copyright, International Trade \u0026 Development, Transactional Negotiation, Animation Rights, Naijacomedy, Folklore, Traditional Cultural Expressions, Celebrity Branding, Fashion Design, Trademarks, Cyberspace law, Contract laws, Creative Human Capital, Technology law, Technical Protection Measures, Nigerian Copyright Commission, U.S. Copyright Office, Afrollywood, Afrondise, Technical Protection Measure, Digital Copyright Millennium Act, ECOWAS, WTO, TRIPS, WIPO, Cultural Appropriation, Cultural Anachronism, Fair Use, Fair Dealing, Bollywood, Ghallywood, Hollywood, Kennywood, Jollywood, Joziwood, Vollywood, Piracy, Cinematography, Films, Animation, Fashion design, Folklore, Customary law, Nigerian Legal System, Music, Derivative Rights.","downloadable_attachments":[{"id":56385924,"asset_id":36468594,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":44977601,"first_name":"Prof. Samuel Samiái","last_name":"Andrews, SJD, LL.M, LL. B (Hons), BL, LL.M","domain_name":"alyamamah","page_name":"alyamamahacademiaeduProfSamuelSamiáiAndrews","display_name":"Prof. Samuel Samiái Andrews, SJD, LL.M, LL. B (Hons), BL, LL.M","profile_url":"https://alyamamah.academia.edu/alyamamahacademiaeduProfSamuelSami%C3%A1iAndrews?f_ri=30945","photo":"https://0.academia-photos.com/44977601/12149977/146715284/s65_prof._samuel_sami_i.andrews.jpeg"}],"research_interests":[{"id":379,"name":"African Studies","url":"https://www.academia.edu/Documents/in/African_Studies?f_ri=30945","nofollow":false},{"id":542,"name":"Jurisprudence","url":"https://www.academia.edu/Documents/in/Jurisprudence?f_ri=30945","nofollow":false},{"id":2575,"name":"International Law","url":"https://www.academia.edu/Documents/in/International_Law?f_ri=30945","nofollow":false},{"id":5248,"name":"Legal Theory","url":"https://www.academia.edu/Documents/in/Legal_Theory?f_ri=30945","nofollow":false},{"id":7683,"name":"Trademarks","url":"https://www.academia.edu/Documents/in/Trademarks?f_ri=30945"},{"id":13151,"name":"Intellectual Property Law","url":"https://www.academia.edu/Documents/in/Intellectual_Property_Law?f_ri=30945"},{"id":18838,"name":"Digital Copyright","url":"https://www.academia.edu/Documents/in/Digital_Copyright?f_ri=30945"},{"id":19287,"name":"International trade law","url":"https://www.academia.edu/Documents/in/International_trade_law?f_ri=30945"},{"id":21421,"name":"Law and culture","url":"https://www.academia.edu/Documents/in/Law_and_culture?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":38769,"name":"Cinematography","url":"https://www.academia.edu/Documents/in/Cinematography?f_ri=30945"},{"id":43314,"name":"Transactional Leadership","url":"https://www.academia.edu/Documents/in/Transactional_Leadership?f_ri=30945"},{"id":80698,"name":"Films","url":"https://www.academia.edu/Documents/in/Films?f_ri=30945"},{"id":90776,"name":"Copyright Law","url":"https://www.academia.edu/Documents/in/Copyright_Law?f_ri=30945"},{"id":526128,"name":"Trademark Law","url":"https://www.academia.edu/Documents/in/Trademark_Law?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_76308930" data-work_id="76308930" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/76308930/Dont_You_Forget_About_Me">Don't You Forget About Me</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/76308930" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="f0b9fb47cfde4056227520070307e3e1" rel="nofollow" data-download="{"attachment_id":84055781,"asset_id":76308930,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/84055781/download_file?st=MTczMjgyNDYwOCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="35086168" href="https://independent.academia.edu/juliakennedy1">julia kennedy</a><script data-card-contents-for-user="35086168" type="text/json">{"id":35086168,"first_name":"julia","last_name":"kennedy","domain_name":"independent","page_name":"juliakennedy1","display_name":"julia kennedy","profile_url":"https://independent.academia.edu/juliakennedy1?f_ri=30945","photo":"https://0.academia-photos.com/35086168/14314629/15255437/s65_julia.kennedy.jpg"}</script></span></span></li><li class="js-paper-rank-work_76308930 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="76308930"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 76308930, container: ".js-paper-rank-work_76308930", }); });</script></li><li class="js-percentile-work_76308930 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 76308930; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_76308930"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_76308930 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="76308930"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 76308930; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=76308930]").text(description); $(".js-view-count-work_76308930").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_76308930").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="76308930"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">12</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="184" href="https://www.academia.edu/Documents/in/Sociology">Sociology</a>, <script data-card-contents-for-ri="184" type="text/json">{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="7685" href="https://www.academia.edu/Documents/in/Copyright">Copyright</a>, <script data-card-contents-for-ri="7685" type="text/json">{"id":7685,"name":"Copyright","url":"https://www.academia.edu/Documents/in/Copyright?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="14186" href="https://www.academia.edu/Documents/in/Fear_of_Crime">Fear of Crime</a>, <script data-card-contents-for-ri="14186" type="text/json">{"id":14186,"name":"Fear of Crime","url":"https://www.academia.edu/Documents/in/Fear_of_Crime?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="22464" href="https://www.academia.edu/Documents/in/Intellectual_Property_Rights">Intellectual Property Rights</a><script data-card-contents-for-ri="22464" type="text/json">{"id":22464,"name":"Intellectual Property Rights","url":"https://www.academia.edu/Documents/in/Intellectual_Property_Rights?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=76308930]'), work: {"id":76308930,"title":"Don't You Forget About Me","created_at":"2022-04-13T02:53:55.651-07:00","url":"https://www.academia.edu/76308930/Dont_You_Forget_About_Me?f_ri=30945","dom_id":"work_76308930","summary":null,"downloadable_attachments":[{"id":84055781,"asset_id":76308930,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":35086168,"first_name":"julia","last_name":"kennedy","domain_name":"independent","page_name":"juliakennedy1","display_name":"julia kennedy","profile_url":"https://independent.academia.edu/juliakennedy1?f_ri=30945","photo":"https://0.academia-photos.com/35086168/14314629/15255437/s65_julia.kennedy.jpg"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=30945","nofollow":false},{"id":7685,"name":"Copyright","url":"https://www.academia.edu/Documents/in/Copyright?f_ri=30945","nofollow":false},{"id":14186,"name":"Fear of Crime","url":"https://www.academia.edu/Documents/in/Fear_of_Crime?f_ri=30945","nofollow":false},{"id":22464,"name":"Intellectual Property Rights","url":"https://www.academia.edu/Documents/in/Intellectual_Property_Rights?f_ri=30945","nofollow":false},{"id":29128,"name":"Cybercultures","url":"https://www.academia.edu/Documents/in/Cybercultures?f_ri=30945"},{"id":29883,"name":"Authorship","url":"https://www.academia.edu/Documents/in/Authorship?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":42350,"name":"Youtube","url":"https://www.academia.edu/Documents/in/Youtube?f_ri=30945"},{"id":54340,"name":"Journalism Studies","url":"https://www.academia.edu/Documents/in/Journalism_Studies?f_ri=30945"},{"id":58842,"name":"Digital Natives","url":"https://www.academia.edu/Documents/in/Digital_Natives?f_ri=30945"},{"id":200398,"name":"Digital Video","url":"https://www.academia.edu/Documents/in/Digital_Video?f_ri=30945"},{"id":395704,"name":"Communication and media Studies","url":"https://www.academia.edu/Documents/in/Communication_and_media_Studies?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_71693531" data-work_id="71693531" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/71693531/A_Critical_Analysis_of_the_Effectiveness_of_Cyber_Security_Defenses_in_UAE_Government_Agencies">A Critical Analysis of the Effectiveness of Cyber Security Defenses in UAE Government Agencies</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Abstract: Cyberspace has become the new frontier for countries to demonstrate power. Nations that have developed defense tools or those that can successfully launch attacks against adversaries will become the next global superpowers [1],... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_71693531" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Abstract: Cyberspace has become the new frontier for countries to demonstrate power. Nations that have developed defense tools or those that can successfully launch attacks against adversaries will become the next global superpowers [1], [2]. While cyber threats and attacks by government agencies are well documented, most widespread attacks are done by individuals or hacking groups for personal gains [3], [4]. The UAE has become a major target for cyber conflicts due to increased economic activity, tourism, technology and rise of the oil and gas industry. Furthermore, the wide spread of internet in the region to the tune of 88 % has exposed it to attackers [3]. Recent attacks against Saudi Arabia’s ARAMCO and Qatar RasGas and the Stuxnet attack on the Iranian nuclear plants are often cited as examples [3], [5]. Previous reports show that the UAE Government is set to double expenditure on homeland security [6]. Therefore, we need to assess whether available cyber-security defenses ar...</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/71693531" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="193042699" href="https://independent.academia.edu/PhilipLutaaya">Philip Lutaaya</a><script data-card-contents-for-user="193042699" type="text/json">{"id":193042699,"first_name":"Philip","last_name":"Lutaaya","domain_name":"independent","page_name":"PhilipLutaaya","display_name":"Philip Lutaaya","profile_url":"https://independent.academia.edu/PhilipLutaaya?f_ri=30945","photo":"https://0.academia-photos.com/193042699/55807990/43994587/s65_philip.lutaaya.png"}</script></span></span></li><li class="js-paper-rank-work_71693531 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="71693531"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 71693531, container: ".js-paper-rank-work_71693531", }); });</script></li><li class="js-percentile-work_71693531 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 71693531; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_71693531"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_71693531 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="71693531"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 71693531; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=71693531]").text(description); $(".js-view-count-work_71693531").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_71693531").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="71693531"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">8</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="491" href="https://www.academia.edu/Documents/in/Information_Technology">Information Technology</a>, <script data-card-contents-for-ri="491" type="text/json">{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a>, <script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="46738" href="https://www.academia.edu/Documents/in/Cybersecurity">Cybersecurity</a><script data-card-contents-for-ri="46738" type="text/json">{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=71693531]'), work: {"id":71693531,"title":"A Critical Analysis of the Effectiveness of Cyber Security Defenses in UAE Government Agencies","created_at":"2022-02-16T09:08:05.023-08:00","url":"https://www.academia.edu/71693531/A_Critical_Analysis_of_the_Effectiveness_of_Cyber_Security_Defenses_in_UAE_Government_Agencies?f_ri=30945","dom_id":"work_71693531","summary":"Abstract: Cyberspace has become the new frontier for countries to demonstrate power. Nations that have developed defense tools or those that can successfully launch attacks against adversaries will become the next global superpowers [1], [2]. While cyber threats and attacks by government agencies are well documented, most widespread attacks are done by individuals or hacking groups for personal gains [3], [4]. The UAE has become a major target for cyber conflicts due to increased economic activity, tourism, technology and rise of the oil and gas industry. Furthermore, the wide spread of internet in the region to the tune of 88 % has exposed it to attackers [3]. Recent attacks against Saudi Arabia’s ARAMCO and Qatar RasGas and the Stuxnet attack on the Iranian nuclear plants are often cited as examples [3], [5]. Previous reports show that the UAE Government is set to double expenditure on homeland security [6]. Therefore, we need to assess whether available cyber-security defenses ar...","downloadable_attachments":[],"ordered_authors":[{"id":193042699,"first_name":"Philip","last_name":"Lutaaya","domain_name":"independent","page_name":"PhilipLutaaya","display_name":"Philip Lutaaya","profile_url":"https://independent.academia.edu/PhilipLutaaya?f_ri=30945","photo":"https://0.academia-photos.com/193042699/55807990/43994587/s65_philip.lutaaya.png"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=30945","nofollow":false},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945","nofollow":false},{"id":52211,"name":"United Arab Emirates","url":"https://www.academia.edu/Documents/in/United_Arab_Emirates?f_ri=30945"},{"id":689759,"name":"Cyber Attacks","url":"https://www.academia.edu/Documents/in/Cyber_Attacks?f_ri=30945"},{"id":1468612,"name":"Security Frameworks","url":"https://www.academia.edu/Documents/in/Security_Frameworks?f_ri=30945"},{"id":3793814,"name":"United Arab Emirates (UAE) Navy","url":"https://www.academia.edu/Documents/in/United_Arab_Emirates_UAE_Navy?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_75681547" data-work_id="75681547" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/75681547/Terrorism_in_Cyberspace_The_Next_Generation">Terrorism in Cyberspace: The Next Generation</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/75681547" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="947280bb5aff9896279b4e781f085816" rel="nofollow" data-download="{"attachment_id":83354858,"asset_id":75681547,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/83354858/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="13222027" href="https://haifa.academia.edu/GabrielWeimann">Gabriel Weimann</a><script data-card-contents-for-user="13222027" type="text/json">{"id":13222027,"first_name":"Gabriel","last_name":"Weimann","domain_name":"haifa","page_name":"GabrielWeimann","display_name":"Gabriel Weimann","profile_url":"https://haifa.academia.edu/GabrielWeimann?f_ri=30945","photo":"https://0.academia-photos.com/13222027/31817824/29038312/s65_gabriel.weimann.jpg"}</script></span></span></li><li class="js-paper-rank-work_75681547 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="75681547"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 75681547, container: ".js-paper-rank-work_75681547", }); });</script></li><li class="js-percentile-work_75681547 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 75681547; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_75681547"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_75681547 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="75681547"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 75681547; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=75681547]").text(description); $(".js-view-count-work_75681547").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_75681547").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="75681547"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">6</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="859" href="https://www.academia.edu/Documents/in/Communication">Communication</a>, <script data-card-contents-for-ri="859" type="text/json">{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1660" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>, <script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4486" href="https://www.academia.edu/Documents/in/Political_Science">Political Science</a>, <script data-card-contents-for-ri="4486" type="text/json">{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a><script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=75681547]'), work: {"id":75681547,"title":"Terrorism in Cyberspace: The Next Generation","created_at":"2022-04-06T22:05:21.359-07:00","url":"https://www.academia.edu/75681547/Terrorism_in_Cyberspace_The_Next_Generation?f_ri=30945","dom_id":"work_75681547","summary":null,"downloadable_attachments":[{"id":83354858,"asset_id":75681547,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":13222027,"first_name":"Gabriel","last_name":"Weimann","domain_name":"haifa","page_name":"GabrielWeimann","display_name":"Gabriel Weimann","profile_url":"https://haifa.academia.edu/GabrielWeimann?f_ri=30945","photo":"https://0.academia-photos.com/13222027/31817824/29038312/s65_gabriel.weimann.jpg"}],"research_interests":[{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication?f_ri=30945","nofollow":false},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=30945","nofollow":false},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=30945"},{"id":395704,"name":"Communication and media Studies","url":"https://www.academia.edu/Documents/in/Communication_and_media_Studies?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_34672269" data-work_id="34672269" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/34672269/Disentangling_the_cyber_politics_cyber_security_nexus_the_new_challenge_of_global_politics">Disentangling the cyber politics-cyber security nexus: the new challenge of global politics</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/34672269" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="f7514ee9517d512b2c4e4a0a54ef890f" rel="nofollow" data-download="{"attachment_id":62472362,"asset_id":34672269,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/62472362/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="2418362" href="https://unico.academia.edu/IoleFontana">Iole Fontana</a><script data-card-contents-for-user="2418362" type="text/json">{"id":2418362,"first_name":"Iole","last_name":"Fontana","domain_name":"unico","page_name":"IoleFontana","display_name":"Iole Fontana","profile_url":"https://unico.academia.edu/IoleFontana?f_ri=30945","photo":"https://0.academia-photos.com/2418362/759147/13065136/s65_iole.fontana.jpg"}</script></span></span></li><li class="js-paper-rank-work_34672269 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="34672269"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 34672269, container: ".js-paper-rank-work_34672269", }); });</script></li><li class="js-percentile-work_34672269 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 34672269; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_34672269"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_34672269 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="34672269"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 34672269; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=34672269]").text(description); $(".js-view-count-work_34672269").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_34672269").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="34672269"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="5709" href="https://www.academia.edu/Documents/in/Politics">Politics</a>, <script data-card-contents-for-ri="5709" type="text/json">{"id":5709,"name":"Politics","url":"https://www.academia.edu/Documents/in/Politics?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="20366" href="https://www.academia.edu/Documents/in/Elections">Elections</a>, <script data-card-contents-for-ri="20366" type="text/json">{"id":20366,"name":"Elections","url":"https://www.academia.edu/Documents/in/Elections?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a>, <script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="36290" href="https://www.academia.edu/Documents/in/Election_Campaigning">Election Campaigning</a><script data-card-contents-for-ri="36290" type="text/json">{"id":36290,"name":"Election Campaigning","url":"https://www.academia.edu/Documents/in/Election_Campaigning?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=34672269]'), work: {"id":34672269,"title":"Disentangling the cyber politics-cyber security nexus: the new challenge of global politics","created_at":"2017-09-25T08:20:09.066-07:00","url":"https://www.academia.edu/34672269/Disentangling_the_cyber_politics_cyber_security_nexus_the_new_challenge_of_global_politics?f_ri=30945","dom_id":"work_34672269","summary":null,"downloadable_attachments":[{"id":62472362,"asset_id":34672269,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":2418362,"first_name":"Iole","last_name":"Fontana","domain_name":"unico","page_name":"IoleFontana","display_name":"Iole Fontana","profile_url":"https://unico.academia.edu/IoleFontana?f_ri=30945","photo":"https://0.academia-photos.com/2418362/759147/13065136/s65_iole.fontana.jpg"}],"research_interests":[{"id":5709,"name":"Politics","url":"https://www.academia.edu/Documents/in/Politics?f_ri=30945","nofollow":false},{"id":20366,"name":"Elections","url":"https://www.academia.edu/Documents/in/Elections?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":36290,"name":"Election Campaigning","url":"https://www.academia.edu/Documents/in/Election_Campaigning?f_ri=30945","nofollow":false},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_21422402" data-work_id="21422402" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/21422402/Las_anticuadas_descripciones_de_las_nuevas_tecnolog%C3%ADas_digitales">Las anticuadas descripciones de las nuevas tecnologías digitales</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">El desarrollo de las nuevas tecnologías de información y comunicación (TIC) no solo se caracteriza por un avance técnico sino también por discursos o descripciones acerca de las mismas tecnologías. Los usos y trayectorias futuras de estas... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_21422402" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">El desarrollo de las nuevas tecnologías de información y comunicación (TIC) no solo se caracteriza por un avance técnico sino también por discursos o descripciones acerca de las mismas tecnologías. Los usos y trayectorias futuras de estas tecnologías dependen de sus descripciones, por lo cual se vuelve relevante indagar respecto de ellas. El presente artículo, basándose en los planteamientos de Niklas Luhmann, se propone redescribir las distinciones que se han dado en particular acerca de las nuevas tecnologías digitales. Para ello revisamos múltiples textos, desde escritos pioneros y técnicos de lo virtual hasta posteriores teorizaciones de filósofos y críticos de estas tecnologías. Al cabo de tal revisión nos encontramos con un cambio de distinciones, pasando desde una que oponía lo virtual a lo real, a una más conciliadora e inclusiva entre lo virtual y lo actual, para luego llegar a una reorientación de las preguntas bajo el concepto de 'lo digital'. Se nos revela, asimismo, que estas distinciones esconden una paradoja aún más básica que quedará siempre sin resolver debido a la propia forma de describirse la realidad.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/21422402" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="be9962674eba09aa97f6b39b9a6e17de" rel="nofollow" data-download="{"attachment_id":41865031,"asset_id":21422402,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/41865031/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="4206683" href="https://warwick.academia.edu/Mat%C3%ADasValderramaBarrag%C3%A1n">Matías Valderrama Barragán</a><script data-card-contents-for-user="4206683" type="text/json">{"id":4206683,"first_name":"Matías","last_name":"Valderrama Barragán","domain_name":"warwick","page_name":"MatíasValderramaBarragán","display_name":"Matías Valderrama Barragán","profile_url":"https://warwick.academia.edu/Mat%C3%ADasValderramaBarrag%C3%A1n?f_ri=30945","photo":"https://0.academia-photos.com/4206683/1653731/118498991/s65_mat_as.valderrama_barrag_n.jpeg"}</script></span></span></li><li class="js-paper-rank-work_21422402 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="21422402"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 21422402, container: ".js-paper-rank-work_21422402", }); });</script></li><li class="js-percentile-work_21422402 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 21422402; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_21422402"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_21422402 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="21422402"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 21422402; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=21422402]").text(description); $(".js-view-count-work_21422402").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_21422402").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="21422402"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">6</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2869" href="https://www.academia.edu/Documents/in/Digital_Media">Digital Media</a>, <script data-card-contents-for-ri="2869" type="text/json">{"id":2869,"name":"Digital Media","url":"https://www.academia.edu/Documents/in/Digital_Media?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="27259" href="https://www.academia.edu/Documents/in/Niklas_Luhmann">Niklas Luhmann</a>, <script data-card-contents-for-ri="27259" type="text/json">{"id":27259,"name":"Niklas Luhmann","url":"https://www.academia.edu/Documents/in/Niklas_Luhmann?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a>, <script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30947" href="https://www.academia.edu/Documents/in/The_Internet">The Internet</a><script data-card-contents-for-ri="30947" type="text/json">{"id":30947,"name":"The Internet","url":"https://www.academia.edu/Documents/in/The_Internet?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=21422402]'), work: {"id":21422402,"title":"Las anticuadas descripciones de las nuevas tecnologías digitales","created_at":"2016-02-01T12:50:07.958-08:00","url":"https://www.academia.edu/21422402/Las_anticuadas_descripciones_de_las_nuevas_tecnolog%C3%ADas_digitales?f_ri=30945","dom_id":"work_21422402","summary":"El desarrollo de las nuevas tecnologías de información y comunicación (TIC) no solo se caracteriza por un avance técnico sino también por discursos o descripciones acerca de las mismas tecnologías. Los usos y trayectorias futuras de estas tecnologías dependen de sus descripciones, por lo cual se vuelve relevante indagar respecto de ellas. El presente artículo, basándose en los planteamientos de Niklas Luhmann, se propone redescribir las distinciones que se han dado en particular acerca de las nuevas tecnologías digitales. Para ello revisamos múltiples textos, desde escritos pioneros y técnicos de lo virtual hasta posteriores teorizaciones de filósofos y críticos de estas tecnologías. Al cabo de tal revisión nos encontramos con un cambio de distinciones, pasando desde una que oponía lo virtual a lo real, a una más conciliadora e inclusiva entre lo virtual y lo actual, para luego llegar a una reorientación de las preguntas bajo el concepto de 'lo digital'. Se nos revela, asimismo, que estas distinciones esconden una paradoja aún más básica que quedará siempre sin resolver debido a la propia forma de describirse la realidad. ","downloadable_attachments":[{"id":41865031,"asset_id":21422402,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":4206683,"first_name":"Matías","last_name":"Valderrama Barragán","domain_name":"warwick","page_name":"MatíasValderramaBarragán","display_name":"Matías Valderrama Barragán","profile_url":"https://warwick.academia.edu/Mat%C3%ADasValderramaBarrag%C3%A1n?f_ri=30945","photo":"https://0.academia-photos.com/4206683/1653731/118498991/s65_mat_as.valderrama_barrag_n.jpeg"}],"research_interests":[{"id":2869,"name":"Digital Media","url":"https://www.academia.edu/Documents/in/Digital_Media?f_ri=30945","nofollow":false},{"id":27259,"name":"Niklas Luhmann","url":"https://www.academia.edu/Documents/in/Niklas_Luhmann?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":30947,"name":"The Internet","url":"https://www.academia.edu/Documents/in/The_Internet?f_ri=30945","nofollow":false},{"id":50642,"name":"Virtual Reality","url":"https://www.academia.edu/Documents/in/Virtual_Reality?f_ri=30945"},{"id":244791,"name":"Medios digitales","url":"https://www.academia.edu/Documents/in/Medios_digitales?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_49128673" data-work_id="49128673" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/49128673/REVIEW_The_fifth_domain_defending_our_country_our_companies_and_ourselves_in_the_age_of_cyber_threats">REVIEW: The fifth domain: defending our country, our companies and ourselves in the age of cyber threats</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The book faces an essential contemporary issue: the definition of the limits of action, protection and use of cyberspace as a fifth operational domain, as well as in the measures to be taken to make this environment more secure. Using the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_49128673" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The book faces an essential contemporary issue: the definition of the limits of action, protection and use of cyberspace as a fifth operational domain, as well as in the measures to be taken to make this environment more secure. Using the term adopted by the US Department of Defense, the authors use practical experience to indicate an agenda that aims to create means to improve the defense of areas such as state security, economics, democracy and privacy.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/49128673" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="92a27f5c9d7a30908097aa413ada47b7" rel="nofollow" data-download="{"attachment_id":67519759,"asset_id":49128673,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/67519759/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="133876238" href="https://ensino.academia.edu/Cole%C3%A7%C3%A3oMeiraMattos">Coleção Meira Mattos</a><script data-card-contents-for-user="133876238" type="text/json">{"id":133876238,"first_name":"Coleção","last_name":"Meira Mattos","domain_name":"ensino","page_name":"ColeçãoMeiraMattos","display_name":"Coleção Meira Mattos","profile_url":"https://ensino.academia.edu/Cole%C3%A7%C3%A3oMeiraMattos?f_ri=30945","photo":"https://0.academia-photos.com/133876238/35175480/30616657/s65_cole_o.meira_mattos.jpg"}</script></span></span></li><li class="js-paper-rank-work_49128673 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="49128673"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 49128673, container: ".js-paper-rank-work_49128673", }); });</script></li><li class="js-percentile-work_49128673 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 49128673; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_49128673"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_49128673 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="49128673"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 49128673; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=49128673]").text(description); $(".js-view-count-work_49128673").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_49128673").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="49128673"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a>, <script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="46738" href="https://www.academia.edu/Documents/in/Cybersecurity">Cybersecurity</a>, <script data-card-contents-for-ri="46738" type="text/json">{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="272158" href="https://www.academia.edu/Documents/in/Cyber_Threats">Cyber Threats</a>, <script data-card-contents-for-ri="272158" type="text/json">{"id":272158,"name":"Cyber Threats","url":"https://www.academia.edu/Documents/in/Cyber_Threats?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="294517" href="https://www.academia.edu/Documents/in/Defense_and_Strategic_Studies">Defense and Strategic Studies</a><script data-card-contents-for-ri="294517" type="text/json">{"id":294517,"name":"Defense and Strategic Studies","url":"https://www.academia.edu/Documents/in/Defense_and_Strategic_Studies?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=49128673]'), work: {"id":49128673,"title":"REVIEW: The fifth domain: defending our country, our companies and ourselves in the age of cyber threats","created_at":"2021-06-04T12:44:16.796-07:00","url":"https://www.academia.edu/49128673/REVIEW_The_fifth_domain_defending_our_country_our_companies_and_ourselves_in_the_age_of_cyber_threats?f_ri=30945","dom_id":"work_49128673","summary":"The book faces an essential contemporary issue: the definition of the limits of action, protection and use of cyberspace as a fifth operational domain, as well as in the measures to be taken to make this environment more secure. Using the term adopted by the US Department of Defense, the authors use practical experience to indicate an agenda that aims to create means to improve the defense of areas such as state security, economics, democracy and privacy.","downloadable_attachments":[{"id":67519759,"asset_id":49128673,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":133876238,"first_name":"Coleção","last_name":"Meira Mattos","domain_name":"ensino","page_name":"ColeçãoMeiraMattos","display_name":"Coleção Meira Mattos","profile_url":"https://ensino.academia.edu/Cole%C3%A7%C3%A3oMeiraMattos?f_ri=30945","photo":"https://0.academia-photos.com/133876238/35175480/30616657/s65_cole_o.meira_mattos.jpg"}],"research_interests":[{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945","nofollow":false},{"id":272158,"name":"Cyber Threats","url":"https://www.academia.edu/Documents/in/Cyber_Threats?f_ri=30945","nofollow":false},{"id":294517,"name":"Defense and Strategic Studies","url":"https://www.academia.edu/Documents/in/Defense_and_Strategic_Studies?f_ri=30945","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_57450404" data-work_id="57450404" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/57450404/A_Review_of_the_Harms_of_Cyberspace_the_Internet_and_Social_Networks_on_Family_Relationships_in_Overseas_Research">A Review of the Harms of Cyberspace, the Internet, and Social Networks on Family Relationships in Overseas Research</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Several studies on the harms of cyberspace, the Internet, and social networks in Iran have been conducted, and different categories have been used for this phenomenon. Still, the harms of these media are less mentioned in foreign... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_57450404" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Several studies on the harms of cyberspace, the Internet, and social networks in Iran have been conducted, and different categories have been used for this phenomenon. Still, the harms of these media are less mentioned in foreign research. The purpose of this study is to review the harms of cyberspace, the Internet, and social networks on family relationships in research abroad and to provide a comprehensive framework in this field. The research method is descriptive-analytical. In this study, the harms of cyberspace, the Internet, and social networks were extracted using library studies (articles, books, magazines, journals, dissertations, and indexes written in this field, etc.). This research is applied in terms of nature and purpose. In this article, while expressing the concept of cyberspace, the Internet, and social networks, their most important harms in research abroad have been pointed out. Finally, all identified factors are organized under a comprehensive framework that is important in this regard. In general, the prevalence of people's activities in cyberspace, the Internet, and social networks usually brings with them harms that can be from psychological problems, behavioral problems, socio-cultural problems, physical problems, moral-religious problems as the main branches of injuries. Family relationships in overseas research mentioned that each has several sub-branches.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/57450404" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="cfd6ae5d0af30b98dbed16cee36dc986" rel="nofollow" data-download="{"attachment_id":72348495,"asset_id":57450404,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/72348495/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="204436666" href="https://independent.academia.edu/foaamfoaam">مطالعات هنر و رسانه Art & Media Studies</a><script data-card-contents-for-user="204436666" type="text/json">{"id":204436666,"first_name":"مطالعات هنر و رسانه","last_name":"Art \u0026 Media Studies","domain_name":"independent","page_name":"foaamfoaam","display_name":"مطالعات هنر و رسانه Art \u0026 Media Studies","profile_url":"https://independent.academia.edu/foaamfoaam?f_ri=30945","photo":"https://0.academia-photos.com/204436666/65201650/54312472/s65__.art_media_studies.jpg"}</script></span></span></li><li class="js-paper-rank-work_57450404 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="57450404"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 57450404, container: ".js-paper-rank-work_57450404", }); });</script></li><li class="js-percentile-work_57450404 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 57450404; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_57450404"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_57450404 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="57450404"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 57450404; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=57450404]").text(description); $(".js-view-count-work_57450404").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_57450404").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="57450404"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1233" href="https://www.academia.edu/Documents/in/Social_Networks">Social Networks</a>, <script data-card-contents-for-ri="1233" type="text/json">{"id":1233,"name":"Social Networks","url":"https://www.academia.edu/Documents/in/Social_Networks?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a>, <script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30947" href="https://www.academia.edu/Documents/in/The_Internet">The Internet</a>, <script data-card-contents-for-ri="30947" type="text/json">{"id":30947,"name":"The Internet","url":"https://www.academia.edu/Documents/in/The_Internet?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="654914" href="https://www.academia.edu/Documents/in/Family_Relationships">Family Relationships</a><script data-card-contents-for-ri="654914" type="text/json">{"id":654914,"name":"Family Relationships","url":"https://www.academia.edu/Documents/in/Family_Relationships?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=57450404]'), work: {"id":57450404,"title":"A Review of the Harms of Cyberspace, the Internet, and Social Networks on Family Relationships in Overseas Research","created_at":"2021-10-13T01:34:24.491-07:00","url":"https://www.academia.edu/57450404/A_Review_of_the_Harms_of_Cyberspace_the_Internet_and_Social_Networks_on_Family_Relationships_in_Overseas_Research?f_ri=30945","dom_id":"work_57450404","summary":"Several studies on the harms of cyberspace, the Internet, and social networks in Iran have been conducted, and different categories have been used for this phenomenon. Still, the harms of these media are less mentioned in foreign research. The purpose of this study is to review the harms of cyberspace, the Internet, and social networks on family relationships in research abroad and to provide a comprehensive framework in this field. The research method is descriptive-analytical. In this study, the harms of cyberspace, the Internet, and social networks were extracted using library studies (articles, books, magazines, journals, dissertations, and indexes written in this field, etc.). This research is applied in terms of nature and purpose. In this article, while expressing the concept of cyberspace, the Internet, and social networks, their most important harms in research abroad have been pointed out. Finally, all identified factors are organized under a comprehensive framework that is important in this regard. In general, the prevalence of people's activities in cyberspace, the Internet, and social networks usually brings with them harms that can be from psychological problems, behavioral problems, socio-cultural problems, physical problems, moral-religious problems as the main branches of injuries. Family relationships in overseas research mentioned that each has several sub-branches.","downloadable_attachments":[{"id":72348495,"asset_id":57450404,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":204436666,"first_name":"مطالعات هنر و رسانه","last_name":"Art \u0026 Media Studies","domain_name":"independent","page_name":"foaamfoaam","display_name":"مطالعات هنر و رسانه Art \u0026 Media Studies","profile_url":"https://independent.academia.edu/foaamfoaam?f_ri=30945","photo":"https://0.academia-photos.com/204436666/65201650/54312472/s65__.art_media_studies.jpg"}],"research_interests":[{"id":1233,"name":"Social Networks","url":"https://www.academia.edu/Documents/in/Social_Networks?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":30947,"name":"The Internet","url":"https://www.academia.edu/Documents/in/The_Internet?f_ri=30945","nofollow":false},{"id":654914,"name":"Family Relationships","url":"https://www.academia.edu/Documents/in/Family_Relationships?f_ri=30945","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_38449781" data-work_id="38449781" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/38449781/Head_Mounted_Display_Technical_Database">Head Mounted Display Technical Database</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">A companion database referenced in my D.Phil thesis, bringing together the known technical specifications of hardware encountered in archival research, and missing from published collections of hardware.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/38449781" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="a735ee703395f7a3f2004ef166399ee9" rel="nofollow" data-download="{"attachment_id":58512586,"asset_id":38449781,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/58512586/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="6319490" href="https://oxford.academia.edu/TobiasBowman">Tobias Bowman</a><script data-card-contents-for-user="6319490" type="text/json">{"id":6319490,"first_name":"Tobias","last_name":"Bowman","domain_name":"oxford","page_name":"TobiasBowman","display_name":"Tobias Bowman","profile_url":"https://oxford.academia.edu/TobiasBowman?f_ri=30945","photo":"https://0.academia-photos.com/6319490/2673365/20329165/s65_tobias.bowman.jpg"}</script></span></span></li><li class="js-paper-rank-work_38449781 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="38449781"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 38449781, container: ".js-paper-rank-work_38449781", }); });</script></li><li class="js-percentile-work_38449781 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 38449781; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_38449781"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_38449781 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="38449781"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 38449781; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=38449781]").text(description); $(".js-view-count-work_38449781").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_38449781").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="38449781"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">6</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="132" href="https://www.academia.edu/Documents/in/History_of_Science_and_Technology">History of Science and Technology</a>, <script data-card-contents-for-ri="132" type="text/json">{"id":132,"name":"History of Science and Technology","url":"https://www.academia.edu/Documents/in/History_of_Science_and_Technology?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3557" href="https://www.academia.edu/Documents/in/History_of_Technology">History of Technology</a>, <script data-card-contents-for-ri="3557" type="text/json">{"id":3557,"name":"History of Technology","url":"https://www.academia.edu/Documents/in/History_of_Technology?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3723" href="https://www.academia.edu/Documents/in/History_of_Science">History of Science</a>, <script data-card-contents-for-ri="3723" type="text/json">{"id":3723,"name":"History of Science","url":"https://www.academia.edu/Documents/in/History_of_Science?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="19609" href="https://www.academia.edu/Documents/in/History_of_Military_Technology">History of Military Technology</a><script data-card-contents-for-ri="19609" type="text/json">{"id":19609,"name":"History of Military Technology","url":"https://www.academia.edu/Documents/in/History_of_Military_Technology?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=38449781]'), work: {"id":38449781,"title":"Head Mounted Display Technical Database","created_at":"2019-02-27T09:10:44.186-08:00","url":"https://www.academia.edu/38449781/Head_Mounted_Display_Technical_Database?f_ri=30945","dom_id":"work_38449781","summary":"A companion database referenced in my D.Phil thesis, bringing together the known technical specifications of hardware encountered in archival research, and missing from published collections of hardware.","downloadable_attachments":[{"id":58512586,"asset_id":38449781,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":6319490,"first_name":"Tobias","last_name":"Bowman","domain_name":"oxford","page_name":"TobiasBowman","display_name":"Tobias Bowman","profile_url":"https://oxford.academia.edu/TobiasBowman?f_ri=30945","photo":"https://0.academia-photos.com/6319490/2673365/20329165/s65_tobias.bowman.jpg"}],"research_interests":[{"id":132,"name":"History of Science and Technology","url":"https://www.academia.edu/Documents/in/History_of_Science_and_Technology?f_ri=30945","nofollow":false},{"id":3557,"name":"History of Technology","url":"https://www.academia.edu/Documents/in/History_of_Technology?f_ri=30945","nofollow":false},{"id":3723,"name":"History of Science","url":"https://www.academia.edu/Documents/in/History_of_Science?f_ri=30945","nofollow":false},{"id":19609,"name":"History of Military Technology","url":"https://www.academia.edu/Documents/in/History_of_Military_Technology?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":50642,"name":"Virtual Reality","url":"https://www.academia.edu/Documents/in/Virtual_Reality?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_37663538" data-work_id="37663538" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/37663538/Wywiad_Chi%C5%84skiej_Republiki_Ludowej_zarys_struktur_i_metod_dzia%C5%82alno%C5%9Bci_The_intelligence_service_of_Peoples_Republic_of_China_an_outline_of_structures_and_methods_of_activity">Wywiad Chińskiej Republiki Ludowej - zarys struktur i metod działalności / The intelligence service of People's Republic of China - an outline of structures and methods of activity</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Studying Chinese intelligence service brings researchers and their readers together to identify the specific ways in which the state achieves its goals internationally. Intelligence is deeply rooted in the Chinese understanding of... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_37663538" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Studying Chinese intelligence service brings researchers and their readers together to identify the specific ways in which the state achieves its goals internationally. Intelligence is deeply rooted in the Chinese understanding of interstate competition, and its essential effect, ie knowledge, is a key element in rational decision-making in foreign and security policy. Intelligence is also an important tool for reducing the technological gap between the PRC and Western countries. Years of tradition, size and international status make the intelligence service of the People's Republic of China have certain characteristics that characterize its operation. Their description may help to understand the philosophy underlying the intelligence work on Chinese characteristics, the role of these institutions in foreign policy and their methodology of action. Authors decided to focus on two aspects: the structures responsible for the interview and the specificity of the approach to collecting information. The main reason for adopting such a perspective is the desire to outline the main differences in Chinese intelligence work in relation to Western countries of cultural or even Russian. A look at the structure of the intelligence and its place in the system brings us closer to understanding what role the Chinese attribute and what they expect from the institutions called to collect information.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/37663538" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="491ad1b0ea3860903782e44a1a5c4509" rel="nofollow" data-download="{"attachment_id":57651466,"asset_id":37663538,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/57651466/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="43976891" href="https://uni-wroc.academia.edu/MarcinAdamczyk">Marcin Adamczyk</a><script data-card-contents-for-user="43976891" type="text/json">{"id":43976891,"first_name":"Marcin","last_name":"Adamczyk","domain_name":"uni-wroc","page_name":"MarcinAdamczyk","display_name":"Marcin Adamczyk","profile_url":"https://uni-wroc.academia.edu/MarcinAdamczyk?f_ri=30945","photo":"https://0.academia-photos.com/43976891/11728642/148938207/s65_marcin.adamczyk.jpg"}</script></span></span></li><li class="js-paper-rank-work_37663538 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="37663538"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 37663538, container: ".js-paper-rank-work_37663538", }); });</script></li><li class="js-percentile-work_37663538 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37663538; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_37663538"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_37663538 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="37663538"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37663538; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37663538]").text(description); $(".js-view-count-work_37663538").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_37663538").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="37663538"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">12</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="2190" href="https://www.academia.edu/Documents/in/Chinese_Studies">Chinese Studies</a>, <script data-card-contents-for-ri="2190" type="text/json">{"id":2190,"name":"Chinese Studies","url":"https://www.academia.edu/Documents/in/Chinese_Studies?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2674" href="https://www.academia.edu/Documents/in/Intelligence">Intelligence</a>, <script data-card-contents-for-ri="2674" type="text/json">{"id":2674,"name":"Intelligence","url":"https://www.academia.edu/Documents/in/Intelligence?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="9801" href="https://www.academia.edu/Documents/in/Chinese_Language_and_Culture">Chinese Language and Culture</a>, <script data-card-contents-for-ri="9801" type="text/json">{"id":9801,"name":"Chinese Language and Culture","url":"https://www.academia.edu/Documents/in/Chinese_Language_and_Culture?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="12108" href="https://www.academia.edu/Documents/in/China">China</a><script data-card-contents-for-ri="12108" type="text/json">{"id":12108,"name":"China","url":"https://www.academia.edu/Documents/in/China?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=37663538]'), work: {"id":37663538,"title":"Wywiad Chińskiej Republiki Ludowej - zarys struktur i metod działalności / The intelligence service of People's Republic of China - an outline of structures and methods of activity","created_at":"2018-10-28T09:34:07.273-07:00","url":"https://www.academia.edu/37663538/Wywiad_Chi%C5%84skiej_Republiki_Ludowej_zarys_struktur_i_metod_dzia%C5%82alno%C5%9Bci_The_intelligence_service_of_Peoples_Republic_of_China_an_outline_of_structures_and_methods_of_activity?f_ri=30945","dom_id":"work_37663538","summary":"Studying Chinese intelligence service brings researchers and their readers together to identify the specific ways in which the state achieves its goals internationally. Intelligence is deeply rooted in the Chinese understanding of interstate competition, and its essential effect, ie knowledge, is a key element in rational decision-making in foreign and security policy. Intelligence is also an important tool for reducing the technological gap between the PRC and Western countries. Years of tradition, size and international status make the intelligence service of the People's Republic of China have certain characteristics that characterize its operation. Their description may help to understand the philosophy underlying the intelligence work on Chinese characteristics, the role of these institutions in foreign policy and their methodology of action. Authors decided to focus on two aspects: the structures responsible for the interview and the specificity of the approach to collecting information. The main reason for adopting such a perspective is the desire to outline the main differences in Chinese intelligence work in relation to Western countries of cultural or even Russian. A look at the structure of the intelligence and its place in the system brings us closer to understanding what role the Chinese attribute and what they expect from the institutions called to collect information.","downloadable_attachments":[{"id":57651466,"asset_id":37663538,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":43976891,"first_name":"Marcin","last_name":"Adamczyk","domain_name":"uni-wroc","page_name":"MarcinAdamczyk","display_name":"Marcin Adamczyk","profile_url":"https://uni-wroc.academia.edu/MarcinAdamczyk?f_ri=30945","photo":"https://0.academia-photos.com/43976891/11728642/148938207/s65_marcin.adamczyk.jpg"}],"research_interests":[{"id":2190,"name":"Chinese Studies","url":"https://www.academia.edu/Documents/in/Chinese_Studies?f_ri=30945","nofollow":false},{"id":2674,"name":"Intelligence","url":"https://www.academia.edu/Documents/in/Intelligence?f_ri=30945","nofollow":false},{"id":9801,"name":"Chinese Language and Culture","url":"https://www.academia.edu/Documents/in/Chinese_Language_and_Culture?f_ri=30945","nofollow":false},{"id":12108,"name":"China","url":"https://www.academia.edu/Documents/in/China?f_ri=30945","nofollow":false},{"id":20602,"name":"China studies","url":"https://www.academia.edu/Documents/in/China_studies?f_ri=30945"},{"id":24550,"name":"Contemporary China","url":"https://www.academia.edu/Documents/in/Contemporary_China?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":38204,"name":"China's foreign policy","url":"https://www.academia.edu/Documents/in/Chinas_foreign_policy?f_ri=30945"},{"id":61443,"name":"Spying and Intelligence","url":"https://www.academia.edu/Documents/in/Spying_and_Intelligence?f_ri=30945"},{"id":98134,"name":"United States","url":"https://www.academia.edu/Documents/in/United_States?f_ri=30945"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=30945"},{"id":526060,"name":"Cyber security / cyber warfare","url":"https://www.academia.edu/Documents/in/Cyber_security_cyber_warfare?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_2902099" data-work_id="2902099" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/2902099/cyberPRINT_Hacia_una_Arquitectura_del_Ser">cyberPRINT: Hacia una Arquitectura del Ser</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Este proyecto incluye el diseño, construcción y puesta en escena de una “arquitectura del ser” que expresa a un individuo en el espacio virtual y en tiempo real usando: (1) datos fisiológicos como material de construcción, (2) el diseño... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_2902099" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Este proyecto incluye el diseño, construcción y puesta en escena de una “arquitectura del ser” que expresa a un individuo en el espacio virtual y en tiempo real usando: (1) datos fisiológicos como material de construcción, (2) el diseño arquitectónico como intención expresiva, (3) el espacio digital como medio plástico, (4) proyecciones de pantalla como técnica de visualización e inmersión, (5) la interactividad y performance del usuario como socio, y (6) colaboraciones interdisciplinarias entre la Arquitectura, Coreografía, Danza Moderna, Música, Bioengeniería, Medicina y las Ciencias de la Computación como su contexto creativo y técnico. <br /> <br />La ponencia presenta la implementación de la cyberPRINT durante un espectáculo tecno-mediático en el Rose Wagner Performing Art Center en Salt Lake City, EEUU en mayo de 2000. Este trabajo es el primero de su tipo en el mundo. La cyberPRINT establece una nueva area de investigación arquitectónica en colaboración con las Artes y las Ciencias.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/2902099" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="69516ff632c314b90fe0c96c440729df" rel="nofollow" data-download="{"attachment_id":30829647,"asset_id":2902099,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/30829647/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="690377" href="https://cua.academia.edu/JulioBermudez">Julio Bermudez</a><script data-card-contents-for-user="690377" type="text/json">{"id":690377,"first_name":"Julio","last_name":"Bermudez","domain_name":"cua","page_name":"JulioBermudez","display_name":"Julio Bermudez","profile_url":"https://cua.academia.edu/JulioBermudez?f_ri=30945","photo":"https://0.academia-photos.com/690377/626169/17338093/s65_julio.bermudez.jpg"}</script></span></span></li><li class="js-paper-rank-work_2902099 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="2902099"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 2902099, container: ".js-paper-rank-work_2902099", }); });</script></li><li class="js-percentile-work_2902099 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 2902099; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_2902099"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_2902099 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="2902099"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 2902099; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=2902099]").text(description); $(".js-view-count-work_2902099").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_2902099").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="2902099"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">25</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a>, <script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="49836" href="https://www.academia.edu/Documents/in/Arquitectura">Arquitectura</a>, <script data-card-contents-for-ri="49836" type="text/json">{"id":49836,"name":"Arquitectura","url":"https://www.academia.edu/Documents/in/Arquitectura?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="59651" href="https://www.academia.edu/Documents/in/Ontolog%C3%ADa">Ontología</a>, <script data-card-contents-for-ri="59651" type="text/json">{"id":59651,"name":"Ontología","url":"https://www.academia.edu/Documents/in/Ontolog%C3%ADa?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="68523" href="https://www.academia.edu/Documents/in/Identidad">Identidad</a><script data-card-contents-for-ri="68523" type="text/json">{"id":68523,"name":"Identidad","url":"https://www.academia.edu/Documents/in/Identidad?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=2902099]'), work: {"id":2902099,"title":"cyberPRINT: Hacia una Arquitectura del Ser","created_at":"2013-03-04T05:56:49.961-08:00","url":"https://www.academia.edu/2902099/cyberPRINT_Hacia_una_Arquitectura_del_Ser?f_ri=30945","dom_id":"work_2902099","summary":"Este proyecto incluye el diseño, construcción y puesta en escena de una “arquitectura del ser” que expresa a un individuo en el espacio virtual y en tiempo real usando: (1) datos fisiológicos como material de construcción, (2) el diseño arquitectónico como intención expresiva, (3) el espacio digital como medio plástico, (4) proyecciones de pantalla como técnica de visualización e inmersión, (5) la interactividad y performance del usuario como socio, y (6) colaboraciones interdisciplinarias entre la Arquitectura, Coreografía, Danza Moderna, Música, Bioengeniería, Medicina y las Ciencias de la Computación como su contexto creativo y técnico.\r\n\r\nLa ponencia presenta la implementación de la cyberPRINT durante un espectáculo tecno-mediático en el Rose Wagner Performing Art Center en Salt Lake City, EEUU en mayo de 2000. Este trabajo es el primero de su tipo en el mundo. La cyberPRINT establece una nueva area de investigación arquitectónica en colaboración con las Artes y las Ciencias.","downloadable_attachments":[{"id":30829647,"asset_id":2902099,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":690377,"first_name":"Julio","last_name":"Bermudez","domain_name":"cua","page_name":"JulioBermudez","display_name":"Julio Bermudez","profile_url":"https://cua.academia.edu/JulioBermudez?f_ri=30945","photo":"https://0.academia-photos.com/690377/626169/17338093/s65_julio.bermudez.jpg"}],"research_interests":[{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":49836,"name":"Arquitectura","url":"https://www.academia.edu/Documents/in/Arquitectura?f_ri=30945","nofollow":false},{"id":59651,"name":"Ontología","url":"https://www.academia.edu/Documents/in/Ontolog%C3%ADa?f_ri=30945","nofollow":false},{"id":68523,"name":"Identidad","url":"https://www.academia.edu/Documents/in/Identidad?f_ri=30945","nofollow":false},{"id":140915,"name":"Poética","url":"https://www.academia.edu/Documents/in/Po%C3%A9tica?f_ri=30945"},{"id":164098,"name":"Auto-retrato","url":"https://www.academia.edu/Documents/in/Auto-retrato?f_ri=30945"},{"id":188886,"name":"Infografia","url":"https://www.academia.edu/Documents/in/Infografia?f_ri=30945"},{"id":215862,"name":"Interactividad","url":"https://www.academia.edu/Documents/in/Interactividad?f_ri=30945"},{"id":241799,"name":"Historia y Teoria del Arte y la Arquitectura","url":"https://www.academia.edu/Documents/in/Historia_y_Teoria_del_Arte_y_la_Arquitectura?f_ri=30945"},{"id":244791,"name":"Medios digitales","url":"https://www.academia.edu/Documents/in/Medios_digitales?f_ri=30945"},{"id":415471,"name":"Realidad Virtual","url":"https://www.academia.edu/Documents/in/Realidad_Virtual?f_ri=30945"},{"id":446205,"name":"Representacion","url":"https://www.academia.edu/Documents/in/Representacion?f_ri=30945"},{"id":570580,"name":"Ciberespacio","url":"https://www.academia.edu/Documents/in/Ciberespacio?f_ri=30945"},{"id":570580,"name":"Ciberespacio","url":"https://www.academia.edu/Documents/in/Ciberespacio?f_ri=30945"},{"id":577795,"name":"Danza Contemporanea","url":"https://www.academia.edu/Documents/in/Danza_Contemporanea?f_ri=30945"},{"id":583570,"name":"Retrato","url":"https://www.academia.edu/Documents/in/Retrato?f_ri=30945"},{"id":682469,"name":"Infografica","url":"https://www.academia.edu/Documents/in/Infografica?f_ri=30945"},{"id":873001,"name":"Visualización De Datos","url":"https://www.academia.edu/Documents/in/Visualizaci%C3%B3n_De_Datos?f_ri=30945"},{"id":898195,"name":"Interdisciplinaridad","url":"https://www.academia.edu/Documents/in/Interdisciplinaridad?f_ri=30945"},{"id":898238,"name":"Espacio Digital","url":"https://www.academia.edu/Documents/in/Espacio_Digital?f_ri=30945"},{"id":898375,"name":"Performance Artística","url":"https://www.academia.edu/Documents/in/Performance_Artistica?f_ri=30945"},{"id":1154829,"name":"Arte Experimental","url":"https://www.academia.edu/Documents/in/Arte_Experimental?f_ri=30945"},{"id":1196760,"name":"Ambiente Digital","url":"https://www.academia.edu/Documents/in/Ambiente_Digital?f_ri=30945"},{"id":1201401,"name":"Arquitectura Digital","url":"https://www.academia.edu/Documents/in/Arquitectura_Digital?f_ri=30945"},{"id":1201402,"name":"Arte Interactivo","url":"https://www.academia.edu/Documents/in/Arte_Interactivo?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_41503546" data-work_id="41503546" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/41503546/Giuseppe_Maiello_Ond%C5%99ej_Roubal_M%C3%89DIA_A_KULTURA">Giuseppe Maiello - Ondřej Roubal MÉDIA A KULTURA</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The monograph Media and Culture (<a href="https://eshop.vsfs.cz/mainform.aspx?rowfilter=true&search=Maiello&page=1" rel="nofollow">https://eshop.vsfs.cz/mainform.aspx?rowfilter=true&search=Maiello&page=1</a>) deal with the development of human communication – from the simply interpersonal communication up to the digital systems of the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_41503546" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The monograph Media and Culture (<a href="https://eshop.vsfs.cz/mainform.aspx?rowfilter=true&search=Maiello&page=1" rel="nofollow">https://eshop.vsfs.cz/mainform.aspx?rowfilter=true&search=Maiello&page=1</a>) deal with the development of human communication – from the simply interpersonal communication up to the digital systems of the<br />late modernity age. The first part of the monograph is presented in a diachronic form<br />and follows communication and media development as defined by the Toronto School<br />of communication theory.<br />It extends into ten chapters dedicated to the primary oral cultures; to the age of ideograms and letters; the age of printed media; the age of electricity; the age of television;<br />and the digital age. The first part also deals with the themes of changes in the human<br />psyche derived from the circulation of printed books; with the world view served by the<br />media; with their influence on the process of socialization and with the concept of global<br />culture. The second part, divided into seven chapters, is conceived as a synchronic analysis of the technetronic society. The technetronic society is analyzed considering other<br />contemporary social theories that arise in parallel with the emergence of new technological processes aimed at the development of newer and newer media. The second part<br />is completed by other chapters dealing with the digital age and globalization; the difference between slow and fast time; the relationship between work and entertainment;<br />between self-confidence and self-image; with the virtual collectivity of digital worlds and<br />with the construction of identities in the actor-network theory.<br />The book is methodologically built on a theoretical platform of reflections, insights,<br />critical views, opinions and a series of original questions and hypotheses – initiating further research into the deepening of media culture discourse.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/41503546" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="8f20ef0b13d2bf4907b36d1300793793" rel="nofollow" data-download="{"attachment_id":61673764,"asset_id":41503546,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/61673764/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="984078" href="https://vsfs.academia.edu/GiuseppeMaiello">Giuseppe Maiello</a><script data-card-contents-for-user="984078" type="text/json">{"id":984078,"first_name":"Giuseppe","last_name":"Maiello","domain_name":"vsfs","page_name":"GiuseppeMaiello","display_name":"Giuseppe Maiello","profile_url":"https://vsfs.academia.edu/GiuseppeMaiello?f_ri=30945","photo":"https://0.academia-photos.com/984078/444973/999973/s65_giuseppe.maiello.jpg"}</script></span></span></li><li class="js-paper-rank-work_41503546 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="41503546"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 41503546, container: ".js-paper-rank-work_41503546", }); });</script></li><li class="js-percentile-work_41503546 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 41503546; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_41503546"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_41503546 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="41503546"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 41503546; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=41503546]").text(description); $(".js-view-count-work_41503546").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_41503546").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="41503546"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="928" href="https://www.academia.edu/Documents/in/Media_Studies">Media Studies</a>, <script data-card-contents-for-ri="928" type="text/json">{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1439" href="https://www.academia.edu/Documents/in/Globalization">Globalization</a>, <script data-card-contents-for-ri="1439" type="text/json">{"id":1439,"name":"Globalization","url":"https://www.academia.edu/Documents/in/Globalization?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="24608" href="https://www.academia.edu/Documents/in/Marshall_McLuhan">Marshall McLuhan</a>, <script data-card-contents-for-ri="24608" type="text/json">{"id":24608,"name":"Marshall McLuhan","url":"https://www.academia.edu/Documents/in/Marshall_McLuhan?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a><script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=41503546]'), work: {"id":41503546,"title":"Giuseppe Maiello - Ondřej Roubal MÉDIA A KULTURA","created_at":"2020-01-03T14:26:10.633-08:00","url":"https://www.academia.edu/41503546/Giuseppe_Maiello_Ond%C5%99ej_Roubal_M%C3%89DIA_A_KULTURA?f_ri=30945","dom_id":"work_41503546","summary":"The monograph Media and Culture (https://eshop.vsfs.cz/mainform.aspx?rowfilter=true\u0026search=Maiello\u0026page=1) deal with the development of human communication – from the simply interpersonal communication up to the digital systems of the\nlate modernity age. The first part of the monograph is presented in a diachronic form\nand follows communication and media development as defined by the Toronto School\nof communication theory.\nIt extends into ten chapters dedicated to the primary oral cultures; to the age of ideograms and letters; the age of printed media; the age of electricity; the age of television;\nand the digital age. The first part also deals with the themes of changes in the human\npsyche derived from the circulation of printed books; with the world view served by the\nmedia; with their influence on the process of socialization and with the concept of global\nculture. The second part, divided into seven chapters, is conceived as a synchronic analysis of the technetronic society. The technetronic society is analyzed considering other\ncontemporary social theories that arise in parallel with the emergence of new technological processes aimed at the development of newer and newer media. The second part\nis completed by other chapters dealing with the digital age and globalization; the difference between slow and fast time; the relationship between work and entertainment;\nbetween self-confidence and self-image; with the virtual collectivity of digital worlds and\nwith the construction of identities in the actor-network theory.\nThe book is methodologically built on a theoretical platform of reflections, insights,\ncritical views, opinions and a series of original questions and hypotheses – initiating further research into the deepening of media culture discourse.\n","downloadable_attachments":[{"id":61673764,"asset_id":41503546,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":984078,"first_name":"Giuseppe","last_name":"Maiello","domain_name":"vsfs","page_name":"GiuseppeMaiello","display_name":"Giuseppe Maiello","profile_url":"https://vsfs.academia.edu/GiuseppeMaiello?f_ri=30945","photo":"https://0.academia-photos.com/984078/444973/999973/s65_giuseppe.maiello.jpg"}],"research_interests":[{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=30945","nofollow":false},{"id":1439,"name":"Globalization","url":"https://www.academia.edu/Documents/in/Globalization?f_ri=30945","nofollow":false},{"id":24608,"name":"Marshall McLuhan","url":"https://www.academia.edu/Documents/in/Marshall_McLuhan?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_78340381" data-work_id="78340381" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/78340381/The_Implications_of_Transnational_Cyber_Threats_in_International_Humanitarian_Law_Analysing_the_Distinction_between_Cybercrime_Cyber_Attack_and_Cyber_Warfare_in_the_21st_Century">The Implications of Transnational Cyber Threats in International Humanitarian Law: Analysing the Distinction between Cybercrime, Cyber Attack, and Cyber Warfare in the 21st Century</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_78340381" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals from acts of belligerents using cyberspace. The paper considers the implications of transnational cyber threats in international humanitarian law (IHL) with a particular focus on cyber-attacks by non-state actors, the principles of state responsibility, and the implications of targeting non-state perpetrators under IHL. It concludes that current international law constructs are inadequate to address the implications of transnational cyber threats; the author recommends consequential amendments to the laws of war in order to address the challenges posed by transnational cyber threats.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/78340381" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="0266fcf87d451158368aa8683864ddfd" rel="nofollow" data-download="{"attachment_id":85421754,"asset_id":78340381,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/85421754/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="366867" href="https://ebsu.academia.edu/HemenFaga">Hemen Faga</a><script data-card-contents-for-user="366867" type="text/json">{"id":366867,"first_name":"Hemen","last_name":"Faga","domain_name":"ebsu","page_name":"HemenFaga","display_name":"Hemen Faga","profile_url":"https://ebsu.academia.edu/HemenFaga?f_ri=30945","photo":"https://0.academia-photos.com/366867/112598/132363/s65_hemen.faga.jpg"}</script></span></span></li><li class="js-paper-rank-work_78340381 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="78340381"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 78340381, container: ".js-paper-rank-work_78340381", }); });</script></li><li class="js-percentile-work_78340381 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78340381; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_78340381"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_78340381 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="78340381"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78340381; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78340381]").text(description); $(".js-view-count-work_78340381").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_78340381").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="78340381"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">6</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="4486" href="https://www.academia.edu/Documents/in/Political_Science">Political Science</a>, <script data-card-contents-for-ri="4486" type="text/json">{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a>, <script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a>, <script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="41862" href="https://www.academia.edu/Documents/in/Cyberwarfare">Cyberwarfare</a><script data-card-contents-for-ri="41862" type="text/json">{"id":41862,"name":"Cyberwarfare","url":"https://www.academia.edu/Documents/in/Cyberwarfare?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=78340381]'), work: {"id":78340381,"title":"The Implications of Transnational Cyber Threats in International Humanitarian Law: Analysing the Distinction between Cybercrime, Cyber Attack, and Cyber Warfare in the 21st Century","created_at":"2022-05-03T08:36:11.867-07:00","url":"https://www.academia.edu/78340381/The_Implications_of_Transnational_Cyber_Threats_in_International_Humanitarian_Law_Analysing_the_Distinction_between_Cybercrime_Cyber_Attack_and_Cyber_Warfare_in_the_21st_Century?f_ri=30945","dom_id":"work_78340381","summary":"This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals from acts of belligerents using cyberspace. The paper considers the implications of transnational cyber threats in international humanitarian law (IHL) with a particular focus on cyber-attacks by non-state actors, the principles of state responsibility, and the implications of targeting non-state perpetrators under IHL. It concludes that current international law constructs are inadequate to address the implications of transnational cyber threats; the author recommends consequential amendments to the laws of war in order to address the challenges posed by transnational cyber threats.","downloadable_attachments":[{"id":85421754,"asset_id":78340381,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":366867,"first_name":"Hemen","last_name":"Faga","domain_name":"ebsu","page_name":"HemenFaga","display_name":"Hemen Faga","profile_url":"https://ebsu.academia.edu/HemenFaga?f_ri=30945","photo":"https://0.academia-photos.com/366867/112598/132363/s65_hemen.faga.jpg"}],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=30945","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":41862,"name":"Cyberwarfare","url":"https://www.academia.edu/Documents/in/Cyberwarfare?f_ri=30945","nofollow":false},{"id":89751,"name":"Cybercrime","url":"https://www.academia.edu/Documents/in/Cybercrime?f_ri=30945"},{"id":536297,"name":"Cyber Attack","url":"https://www.academia.edu/Documents/in/Cyber_Attack?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_41213724" data-work_id="41213724" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/41213724/Cyber_Crime_An_Analytical_Study_of_Cyber_Crime_Cases_at_the_Most_Vulnerable_States_and_Cities_in_India">Cyber Crime: An Analytical Study of Cyber Crime Cases at the Most Vulnerable States and Cities in India</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">In this age of information and technology, Internet plays the pivotal role for the exchange of huge amount of information. It influences not only all spheres of human life but also all age groups of man. Even if the internet has changed... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_41213724" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">In this age of information and technology, Internet plays the pivotal role for the exchange of huge amount of information. It influences not only all spheres of human life but also all age groups of man. Even if the internet has changed our society fundamentally, the information over internet is not free from any illegal access or harm. Thus the security and safety of information has become the major challenge of the present time. With the rapid growth of users, the cyber crime cases are also increasing and are not restricted by any geographical limitations or national boundaries in the world. Over the past few years India has witnessed many cyber crime cases. And it is a matter of great concern as it has direct negative impact on economic and social lives of people. Our research work is based on the quantitative analysis of cyber crime cases under the IT Act and Indian Penal Code in top vulnerable states and cities in India. Further the cyber crime cases committed by the people of different age group have been analyzed. And along with the description of different motives of cyber crime activities and the offences, the important remedial measures have been suggested that need to be taken to minimize the cyber crime cases.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/41213724" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="4530db5f17fac88bb59a1bfd4d2328d0" rel="nofollow" data-download="{"attachment_id":61449072,"asset_id":41213724,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/61449072/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="95417338" href="https://independent.academia.edu/IJRISATjournal">Chief E D I T O R IJRISAT</a><script data-card-contents-for-user="95417338" type="text/json">{"id":95417338,"first_name":"Chief","last_name":"IJRISAT","domain_name":"independent","page_name":"IJRISATjournal","display_name":"Chief E D I T O R IJRISAT","profile_url":"https://independent.academia.edu/IJRISATjournal?f_ri=30945","photo":"https://0.academia-photos.com/95417338/20865319/20399463/s65_chiefeditor.ijrisat.jpg"}</script></span></span></li><li class="js-paper-rank-work_41213724 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="41213724"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 41213724, container: ".js-paper-rank-work_41213724", }); });</script></li><li class="js-percentile-work_41213724 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 41213724; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_41213724"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_41213724 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="41213724"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 41213724; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=41213724]").text(description); $(".js-view-count-work_41213724").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_41213724").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="41213724"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">12</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="859" href="https://www.academia.edu/Documents/in/Communication">Communication</a>, <script data-card-contents-for-ri="859" type="text/json">{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2009" href="https://www.academia.edu/Documents/in/Data_Mining">Data Mining</a>, <script data-card-contents-for-ri="2009" type="text/json">{"id":2009,"name":"Data Mining","url":"https://www.academia.edu/Documents/in/Data_Mining?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2345" href="https://www.academia.edu/Documents/in/Wireless_Communications">Wireless Communications</a><script data-card-contents-for-ri="2345" type="text/json">{"id":2345,"name":"Wireless Communications","url":"https://www.academia.edu/Documents/in/Wireless_Communications?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=41213724]'), work: {"id":41213724,"title":"Cyber Crime: An Analytical Study of Cyber Crime Cases at the Most Vulnerable States and Cities in India","created_at":"2019-12-07T05:26:44.342-08:00","url":"https://www.academia.edu/41213724/Cyber_Crime_An_Analytical_Study_of_Cyber_Crime_Cases_at_the_Most_Vulnerable_States_and_Cities_in_India?f_ri=30945","dom_id":"work_41213724","summary":"In this age of information and technology, Internet plays the pivotal role for the exchange of huge amount of information. It influences not only all spheres of human life but also all age groups of man. Even if the internet has changed our society fundamentally, the information over internet is not free from any illegal access or harm. Thus the security and safety of information has become the major challenge of the present time. With the rapid growth of users, the cyber crime cases are also increasing and are not restricted by any geographical limitations or national boundaries in the world. Over the past few years India has witnessed many cyber crime cases. And it is a matter of great concern as it has direct negative impact on economic and social lives of people. Our research work is based on the quantitative analysis of cyber crime cases under the IT Act and Indian Penal Code in top vulnerable states and cities in India. Further the cyber crime cases committed by the people of different age group have been analyzed. And along with the description of different motives of cyber crime activities and the offences, the important remedial measures have been suggested that need to be taken to minimize the cyber crime cases.","downloadable_attachments":[{"id":61449072,"asset_id":41213724,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":95417338,"first_name":"Chief","last_name":"IJRISAT","domain_name":"independent","page_name":"IJRISATjournal","display_name":"Chief E D I T O R IJRISAT","profile_url":"https://independent.academia.edu/IJRISATjournal?f_ri=30945","photo":"https://0.academia-photos.com/95417338/20865319/20399463/s65_chiefeditor.ijrisat.jpg"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=30945","nofollow":false},{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication?f_ri=30945","nofollow":false},{"id":2009,"name":"Data Mining","url":"https://www.academia.edu/Documents/in/Data_Mining?f_ri=30945","nofollow":false},{"id":2345,"name":"Wireless Communications","url":"https://www.academia.edu/Documents/in/Wireless_Communications?f_ri=30945","nofollow":false},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=30945"},{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=30945"},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks?f_ri=30945"},{"id":9136,"name":"Wireless Sensor Networks","url":"https://www.academia.edu/Documents/in/Wireless_Sensor_Networks?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":96546,"name":"Cyber Law","url":"https://www.academia.edu/Documents/in/Cyber_Law?f_ri=30945"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=30945"},{"id":126300,"name":"Big Data","url":"https://www.academia.edu/Documents/in/Big_Data?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_43993884" data-work_id="43993884" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/43993884/The_Global_Causes_of_Cybercrime_and_State_Responsibilities_Towards_an_Integrated_Interdisciplinary_Theory">The Global Causes of Cybercrime and State Responsibilities. Towards an Integrated Interdisciplinary Theory</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Information and communication technologies provide immediate means, motivations and opportunities for cybercrime. However, deeper cultural, social and psychological developments triggered by globalisation are the root causes of such... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_43993884" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Information and communication technologies provide immediate means, motivations and opportunities for cybercrime. However, deeper cultural, social and psychological developments triggered by globalisation are the root causes of such motivations and opportunities. Successful strategies to prevent cybercrime cannot focus only on technological or infrastructural defences but must address these global developments. While scientific understanding and political awareness of such causes are still limited, studies from different disciplines, including sociology, criminology and psychology, allow to detect some global criminogenic patterns and to identify the state responsibilities of national governments for failing to address them adequately. This article integrates the findings of these studies to provide a preliminary interdisciplinary theory of the global causes of cybercrime and assess what national governments can do to mitigate them.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/43993884" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="a6d8ca2ec2513d15f8ddfeb65c171f77" rel="nofollow" data-download="{"attachment_id":64325589,"asset_id":43993884,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/64325589/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="727715" href="https://ucl.academia.edu/LorenzoPasculli">Lorenzo Pasculli</a><script data-card-contents-for-user="727715" type="text/json">{"id":727715,"first_name":"Lorenzo","last_name":"Pasculli","domain_name":"ucl","page_name":"LorenzoPasculli","display_name":"Lorenzo Pasculli","profile_url":"https://ucl.academia.edu/LorenzoPasculli?f_ri=30945","photo":"https://0.academia-photos.com/727715/248749/36184731/s65_lorenzo.pasculli.jpg"}</script></span></span></li><li class="js-paper-rank-work_43993884 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="43993884"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 43993884, container: ".js-paper-rank-work_43993884", }); });</script></li><li class="js-percentile-work_43993884 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 43993884; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_43993884"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_43993884 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="43993884"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 43993884; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=43993884]").text(description); $(".js-view-count-work_43993884").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_43993884").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="43993884"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">9</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="189" href="https://www.academia.edu/Documents/in/Criminology">Criminology</a>, <script data-card-contents-for-ri="189" type="text/json">{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1439" href="https://www.academia.edu/Documents/in/Globalization">Globalization</a>, <script data-card-contents-for-ri="1439" type="text/json">{"id":1439,"name":"Globalization","url":"https://www.academia.edu/Documents/in/Globalization?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a>, <script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="46738" href="https://www.academia.edu/Documents/in/Cybersecurity">Cybersecurity</a><script data-card-contents-for-ri="46738" type="text/json">{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=43993884]'), work: {"id":43993884,"title":"The Global Causes of Cybercrime and State Responsibilities. Towards an Integrated Interdisciplinary Theory","created_at":"2020-09-01T03:40:29.429-07:00","url":"https://www.academia.edu/43993884/The_Global_Causes_of_Cybercrime_and_State_Responsibilities_Towards_an_Integrated_Interdisciplinary_Theory?f_ri=30945","dom_id":"work_43993884","summary":"Information and communication technologies provide immediate means, motivations and opportunities for cybercrime. However, deeper cultural, social and psychological developments triggered by globalisation are the root causes of such motivations and opportunities. Successful strategies to prevent cybercrime cannot focus only on technological or infrastructural defences but must address these global developments. While scientific understanding and political awareness of such causes are still limited, studies from different disciplines, including sociology, criminology and psychology, allow to detect some global criminogenic patterns and to identify the state responsibilities of national governments for failing to address them adequately. This article integrates the findings of these studies to provide a preliminary interdisciplinary theory of the global causes of cybercrime and assess what national governments can do to mitigate them.","downloadable_attachments":[{"id":64325589,"asset_id":43993884,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":727715,"first_name":"Lorenzo","last_name":"Pasculli","domain_name":"ucl","page_name":"LorenzoPasculli","display_name":"Lorenzo Pasculli","profile_url":"https://ucl.academia.edu/LorenzoPasculli?f_ri=30945","photo":"https://0.academia-photos.com/727715/248749/36184731/s65_lorenzo.pasculli.jpg"}],"research_interests":[{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=30945","nofollow":false},{"id":1439,"name":"Globalization","url":"https://www.academia.edu/Documents/in/Globalization?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945","nofollow":false},{"id":89751,"name":"Cybercrime","url":"https://www.academia.edu/Documents/in/Cybercrime?f_ri=30945"},{"id":214256,"name":"Anomie","url":"https://www.academia.edu/Documents/in/Anomie?f_ri=30945"},{"id":278686,"name":"Cybersecurity Law","url":"https://www.academia.edu/Documents/in/Cybersecurity_Law?f_ri=30945"},{"id":645484,"name":"Anomie Theory","url":"https://www.academia.edu/Documents/in/Anomie_Theory?f_ri=30945"},{"id":831496,"name":"Cybersecurity policy","url":"https://www.academia.edu/Documents/in/Cybersecurity_policy?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_77198321" data-work_id="77198321" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/77198321/The_Digital_Skills_Crisis_Engendering_Technology_Empowering_Women_in_Cyberspace">The Digital Skills Crisis: Engendering Technology–Empowering Women in Cyberspace</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This paper examines the latest research on the digital skills crisis, focusing on the factors that contribute to digital exclusion. Through an extensive analysis of current literature on the digital divide, the authors discuss digital... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_77198321" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This paper examines the latest research on the digital skills crisis, focusing on the factors that contribute to digital exclusion. Through an extensive analysis of current literature on the digital divide, the authors discuss digital skills gaps, namely the exclusion of a sizeable part of the workforce from the digital market economy—and women in particular. Studies indicate that exclusion from the digital market is augmented and reinforced when combining the gender dimension with other exclusionary factors such as disability, age, race and socioeconomic background. Research confirms that the gender imbalance in ICT and related sectors persists today, despite decades of equal opportunity policies, legislation and government initiatives. Women are still underrepresented and digitally excluded and efforts to attract, recruit and retain girls and women in ICT and STEM seem to be failing, reinforcing the gender gaps: participation gap, pay gap, and leadership gap, a result of the deep-...</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/77198321" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="1af09dcbcc8fde6e9e2668b03d56bdcf" rel="nofollow" data-download="{"attachment_id":84645008,"asset_id":77198321,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/84645008/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="33245553" href="https://europa.academia.edu/NancyPascall">Nancy Pascall</a><script data-card-contents-for-user="33245553" type="text/json">{"id":33245553,"first_name":"Nancy","last_name":"Pascall","domain_name":"europa","page_name":"NancyPascall","display_name":"Nancy Pascall","profile_url":"https://europa.academia.edu/NancyPascall?f_ri=30945","photo":"https://0.academia-photos.com/33245553/9850088/10978621/s65_nancy.pascall.jpg_oh_3e06d74ae1de7f63bffe11be85b2dfd4_oe_565bb90a___gda___1444608838_5a59bda40005fd7f4a298bc53ae05fcc"}</script></span></span></li><li class="js-paper-rank-work_77198321 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="77198321"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 77198321, container: ".js-paper-rank-work_77198321", }); });</script></li><li class="js-percentile-work_77198321 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 77198321; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_77198321"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_77198321 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="77198321"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 77198321; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=77198321]").text(description); $(".js-view-count-work_77198321").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_77198321").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="77198321"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">14</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="27" href="https://www.academia.edu/Documents/in/Entrepreneurship">Entrepreneurship</a>, <script data-card-contents-for-ri="27" type="text/json">{"id":27,"name":"Entrepreneurship","url":"https://www.academia.edu/Documents/in/Entrepreneurship?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="491" href="https://www.academia.edu/Documents/in/Information_Technology">Information Technology</a>, <script data-card-contents-for-ri="491" type="text/json">{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="696" href="https://www.academia.edu/Documents/in/Gender_Studies">Gender Studies</a>, <script data-card-contents-for-ri="696" type="text/json">{"id":696,"name":"Gender Studies","url":"https://www.academia.edu/Documents/in/Gender_Studies?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="861" href="https://www.academia.edu/Documents/in/Digital_Divide">Digital Divide</a><script data-card-contents-for-ri="861" type="text/json">{"id":861,"name":"Digital Divide","url":"https://www.academia.edu/Documents/in/Digital_Divide?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=77198321]'), work: {"id":77198321,"title":"The Digital Skills Crisis: Engendering Technology–Empowering Women in Cyberspace","created_at":"2022-04-21T09:34:46.488-07:00","url":"https://www.academia.edu/77198321/The_Digital_Skills_Crisis_Engendering_Technology_Empowering_Women_in_Cyberspace?f_ri=30945","dom_id":"work_77198321","summary":"This paper examines the latest research on the digital skills crisis, focusing on the factors that contribute to digital exclusion. Through an extensive analysis of current literature on the digital divide, the authors discuss digital skills gaps, namely the exclusion of a sizeable part of the workforce from the digital market economy—and women in particular. Studies indicate that exclusion from the digital market is augmented and reinforced when combining the gender dimension with other exclusionary factors such as disability, age, race and socioeconomic background. Research confirms that the gender imbalance in ICT and related sectors persists today, despite decades of equal opportunity policies, legislation and government initiatives. Women are still underrepresented and digitally excluded and efforts to attract, recruit and retain girls and women in ICT and STEM seem to be failing, reinforcing the gender gaps: participation gap, pay gap, and leadership gap, a result of the deep-...","downloadable_attachments":[{"id":84645008,"asset_id":77198321,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":33245553,"first_name":"Nancy","last_name":"Pascall","domain_name":"europa","page_name":"NancyPascall","display_name":"Nancy Pascall","profile_url":"https://europa.academia.edu/NancyPascall?f_ri=30945","photo":"https://0.academia-photos.com/33245553/9850088/10978621/s65_nancy.pascall.jpg_oh_3e06d74ae1de7f63bffe11be85b2dfd4_oe_565bb90a___gda___1444608838_5a59bda40005fd7f4a298bc53ae05fcc"}],"research_interests":[{"id":27,"name":"Entrepreneurship","url":"https://www.academia.edu/Documents/in/Entrepreneurship?f_ri=30945","nofollow":false},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=30945","nofollow":false},{"id":696,"name":"Gender Studies","url":"https://www.academia.edu/Documents/in/Gender_Studies?f_ri=30945","nofollow":false},{"id":861,"name":"Digital Divide","url":"https://www.academia.edu/Documents/in/Digital_Divide?f_ri=30945","nofollow":false},{"id":923,"name":"Technology","url":"https://www.academia.edu/Documents/in/Technology?f_ri=30945"},{"id":2260,"name":"Disability Studies","url":"https://www.academia.edu/Documents/in/Disability_Studies?f_ri=30945"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=30945"},{"id":28493,"name":"STEM Education","url":"https://www.academia.edu/Documents/in/STEM_Education?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":86015,"name":"Gender Wage Gap","url":"https://www.academia.edu/Documents/in/Gender_Wage_Gap?f_ri=30945"},{"id":95163,"name":"Soft Skills","url":"https://www.academia.edu/Documents/in/Soft_Skills?f_ri=30945"},{"id":97424,"name":"Bridging Digital Divide","url":"https://www.academia.edu/Documents/in/Bridging_Digital_Divide?f_ri=30945"},{"id":139479,"name":"Disability Digital divide","url":"https://www.academia.edu/Documents/in/Disability_Digital_divide?f_ri=30945"},{"id":1023369,"name":"Women and Minority In STEM Fields","url":"https://www.academia.edu/Documents/in/Women_and_Minority_In_STEM_Fields?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_78029852" data-work_id="78029852" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/78029852/The_European_Union_Cyber_Security_and_Protection_of_Human_Rights">The European Union Cyber Security and Protection of Human Rights</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">The paper is about the Cyber Security Policy of the European Union and the Protection of Human Rights.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/78029852" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="26377377" href="https://independent.academia.edu/NurlanKarimov">Nurlan Karimov</a><script data-card-contents-for-user="26377377" type="text/json">{"id":26377377,"first_name":"Nurlan","last_name":"Karimov","domain_name":"independent","page_name":"NurlanKarimov","display_name":"Nurlan Karimov","profile_url":"https://independent.academia.edu/NurlanKarimov?f_ri=30945","photo":"https://0.academia-photos.com/26377377/7748510/8686780/s65_nurlan.karimov.jpg"}</script></span></span></li><li class="js-paper-rank-work_78029852 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="78029852"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 78029852, container: ".js-paper-rank-work_78029852", }); });</script></li><li class="js-percentile-work_78029852 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78029852; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_78029852"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_78029852 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="78029852"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78029852; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78029852]").text(description); $(".js-view-count-work_78029852").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_78029852").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="78029852"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">8</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2511" href="https://www.academia.edu/Documents/in/Cybercrimes">Cybercrimes</a>, <script data-card-contents-for-ri="2511" type="text/json">{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2592" href="https://www.academia.edu/Documents/in/Human_Rights">Human Rights</a>, <script data-card-contents-for-ri="2592" type="text/json">{"id":2592,"name":"Human Rights","url":"https://www.academia.edu/Documents/in/Human_Rights?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="10347" href="https://www.academia.edu/Documents/in/European_Union">European Union</a>, <script data-card-contents-for-ri="10347" type="text/json">{"id":10347,"name":"European Union","url":"https://www.academia.edu/Documents/in/European_Union?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="20594" href="https://www.academia.edu/Documents/in/Cyber_crime">Cyber crime</a><script data-card-contents-for-ri="20594" type="text/json">{"id":20594,"name":"Cyber crime","url":"https://www.academia.edu/Documents/in/Cyber_crime?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=78029852]'), work: {"id":78029852,"title":"The European Union Cyber Security and Protection of Human Rights","created_at":"2022-04-30T03:15:31.202-07:00","url":"https://www.academia.edu/78029852/The_European_Union_Cyber_Security_and_Protection_of_Human_Rights?f_ri=30945","dom_id":"work_78029852","summary":"The paper is about the Cyber Security Policy of the European Union and the Protection of Human Rights.","downloadable_attachments":[],"ordered_authors":[{"id":26377377,"first_name":"Nurlan","last_name":"Karimov","domain_name":"independent","page_name":"NurlanKarimov","display_name":"Nurlan Karimov","profile_url":"https://independent.academia.edu/NurlanKarimov?f_ri=30945","photo":"https://0.academia-photos.com/26377377/7748510/8686780/s65_nurlan.karimov.jpg"}],"research_interests":[{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=30945","nofollow":false},{"id":2592,"name":"Human Rights","url":"https://www.academia.edu/Documents/in/Human_Rights?f_ri=30945","nofollow":false},{"id":10347,"name":"European Union","url":"https://www.academia.edu/Documents/in/European_Union?f_ri=30945","nofollow":false},{"id":20594,"name":"Cyber crime","url":"https://www.academia.edu/Documents/in/Cyber_crime?f_ri=30945","nofollow":false},{"id":27137,"name":"European Union Politics","url":"https://www.academia.edu/Documents/in/European_Union_Politics?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":96546,"name":"Cyber Law","url":"https://www.academia.edu/Documents/in/Cyber_Law?f_ri=30945"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_74467198" data-work_id="74467198" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/74467198/CYBER_PEACE_A_KEY_TO_ACHIEVE_SUSTAIBALE_DEVELOPMENT_GOALS_2030_Author_JOSHUA_OGBONNA_UCHENNA_Founder_CEO_Cyber_Peace_Advocacy_Publisher_Empowering_Your_Soul_eYs_Magazine_Summer_2021">CYBER PEACE A KEY TO ACHIEVE SUSTAIBALE DEVELOPMENT GOALS (2030) Author: JOSHUA OGBONNA UCHENNA Founder/CEO, Cyber Peace Advocacy Publisher: Empowering Your Soul (eYs) Magazine Summer 2021</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The role of cyber space in achieving Sustainable Development Goals is worth giving full attention as ICT has become an important fabric in different sectors of world economy. The world is a sea of economic opportunities in virtually... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_74467198" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The role of cyber space in achieving Sustainable Development Goals is worth giving full attention as ICT has become an important fabric in different sectors of world economy. <br />The world is a sea of economic opportunities in virtually every sector, and the continents’ youthful population has an enormous opportunity in this digital era and hence the need for the world to make digitally enabled socio-economic development a high priority.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/74467198" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="f30bbac2de3ec21e5cdfe53c8d5a6bca" rel="nofollow" data-download="{"attachment_id":82610373,"asset_id":74467198,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/82610373/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="151802692" href="https://funai.academia.edu/JoshuaOgbonna">Joshua Ogbonna Uchenna</a><script data-card-contents-for-user="151802692" type="text/json">{"id":151802692,"first_name":"Joshua","last_name":"Ogbonna Uchenna","domain_name":"funai","page_name":"JoshuaOgbonna","display_name":"Joshua Ogbonna Uchenna","profile_url":"https://funai.academia.edu/JoshuaOgbonna?f_ri=30945","photo":"https://0.academia-photos.com/151802692/42344084/157023221/s65_joshua.ogbonna_uchenna.jpg"}</script></span></span></li><li class="js-paper-rank-work_74467198 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="74467198"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 74467198, container: ".js-paper-rank-work_74467198", }); });</script></li><li class="js-percentile-work_74467198 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 74467198; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_74467198"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_74467198 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="74467198"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 74467198; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=74467198]").text(description); $(".js-view-count-work_74467198").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_74467198").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="74467198"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="982" href="https://www.academia.edu/Documents/in/Cyberlaw">Cyberlaw</a>, <script data-card-contents-for-ri="982" type="text/json">{"id":982,"name":"Cyberlaw","url":"https://www.academia.edu/Documents/in/Cyberlaw?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a>, <script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="45559" href="https://www.academia.edu/Documents/in/Peace">Peace</a>, <script data-card-contents-for-ri="45559" type="text/json">{"id":45559,"name":"Peace","url":"https://www.academia.edu/Documents/in/Peace?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="162629" href="https://www.academia.edu/Documents/in/Cyber_Laws_and_Cyber_Crime">Cyber Laws and Cyber Crime</a><script data-card-contents-for-ri="162629" type="text/json">{"id":162629,"name":"Cyber Laws and Cyber Crime","url":"https://www.academia.edu/Documents/in/Cyber_Laws_and_Cyber_Crime?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=74467198]'), work: {"id":74467198,"title":"CYBER PEACE A KEY TO ACHIEVE SUSTAIBALE DEVELOPMENT GOALS (2030) Author: JOSHUA OGBONNA UCHENNA Founder/CEO, Cyber Peace Advocacy Publisher: Empowering Your Soul (eYs) Magazine Summer 2021","created_at":"2022-03-24T07:28:41.542-07:00","url":"https://www.academia.edu/74467198/CYBER_PEACE_A_KEY_TO_ACHIEVE_SUSTAIBALE_DEVELOPMENT_GOALS_2030_Author_JOSHUA_OGBONNA_UCHENNA_Founder_CEO_Cyber_Peace_Advocacy_Publisher_Empowering_Your_Soul_eYs_Magazine_Summer_2021?f_ri=30945","dom_id":"work_74467198","summary":"The role of cyber space in achieving Sustainable Development Goals is worth giving full attention as ICT has become an important fabric in different sectors of world economy. \nThe world is a sea of economic opportunities in virtually every sector, and the continents’ youthful population has an enormous opportunity in this digital era and hence the need for the world to make digitally enabled socio-economic development a high priority. \n","downloadable_attachments":[{"id":82610373,"asset_id":74467198,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":151802692,"first_name":"Joshua","last_name":"Ogbonna Uchenna","domain_name":"funai","page_name":"JoshuaOgbonna","display_name":"Joshua Ogbonna Uchenna","profile_url":"https://funai.academia.edu/JoshuaOgbonna?f_ri=30945","photo":"https://0.academia-photos.com/151802692/42344084/157023221/s65_joshua.ogbonna_uchenna.jpg"}],"research_interests":[{"id":982,"name":"Cyberlaw","url":"https://www.academia.edu/Documents/in/Cyberlaw?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":45559,"name":"Peace","url":"https://www.academia.edu/Documents/in/Peace?f_ri=30945","nofollow":false},{"id":162629,"name":"Cyber Laws and Cyber Crime","url":"https://www.academia.edu/Documents/in/Cyber_Laws_and_Cyber_Crime?f_ri=30945","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_41360731" data-work_id="41360731" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/41360731/La_nouvelle_Alg%C3%A9rie_pour_quel_futur_num%C3%A9rique_Les_%C3%A9tudiants_se_posent_la_question">La nouvelle Algérie, pour quel futur numérique ? Les étudiants se posent la question</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Pour la première fois de son histoire, le Club scientifique de l’Université des Sciences et Technologies Houari Boumedienne, a organisé une série de conférences sur le futur numérique et comment l’envisager. Comment s’harnacher utilement... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_41360731" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Pour la première fois de son histoire, le Club scientifique de l’Université des Sciences et Technologies Houari Boumedienne, a organisé une série de conférences sur le futur numérique et comment l’envisager. Comment s’harnacher utilement à ces technologies? <br /><br />Elles bouleversent notre quotidien et notre espace de travail. Elles remettent en question nos fondamentaux et bousculent un certain nombre de nos croyances contemporaines. Elles sont incontournables, désormais indispensables à toute économie et indissociables de nos vies.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/41360731" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="aac2e499216a5d1a959f1b59a53cc509" rel="nofollow" data-download="{"attachment_id":61559062,"asset_id":41360731,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/61559062/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="123404051" href="https://brunel.academia.edu/AliKahlane">Ali KAHLANE</a><script data-card-contents-for-user="123404051" type="text/json">{"id":123404051,"first_name":"Ali","last_name":"KAHLANE","domain_name":"brunel","page_name":"AliKahlane","display_name":"Ali KAHLANE","profile_url":"https://brunel.academia.edu/AliKahlane?f_ri=30945","photo":"https://0.academia-photos.com/123404051/31154204/31724604/s65_ali.kahlane.jpg"}</script></span></span></li><li class="js-paper-rank-work_41360731 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="41360731"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 41360731, container: ".js-paper-rank-work_41360731", }); });</script></li><li class="js-percentile-work_41360731 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 41360731; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_41360731"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_41360731 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="41360731"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 41360731; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=41360731]").text(description); $(".js-view-count-work_41360731").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_41360731").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="41360731"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">12</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="465" href="https://www.academia.edu/Documents/in/Artificial_Intelligence">Artificial Intelligence</a>, <script data-card-contents-for-ri="465" type="text/json">{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4252" href="https://www.academia.edu/Documents/in/Computer_Networks">Computer Networks</a>, <script data-card-contents-for-ri="4252" type="text/json">{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a><script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=41360731]'), work: {"id":41360731,"title":"La nouvelle Algérie, pour quel futur numérique ? Les étudiants se posent la question","created_at":"2019-12-19T03:22:10.341-08:00","url":"https://www.academia.edu/41360731/La_nouvelle_Alg%C3%A9rie_pour_quel_futur_num%C3%A9rique_Les_%C3%A9tudiants_se_posent_la_question?f_ri=30945","dom_id":"work_41360731","summary":"Pour la première fois de son histoire, le Club scientifique de l’Université des Sciences et Technologies Houari Boumedienne, a organisé une série de conférences sur le futur numérique et comment l’envisager. Comment s’harnacher utilement à ces technologies? \n\nElles bouleversent notre quotidien et notre espace de travail. Elles remettent en question nos fondamentaux et bousculent un certain nombre de nos croyances contemporaines. Elles sont incontournables, désormais indispensables à toute économie et indissociables de nos vies.","downloadable_attachments":[{"id":61559062,"asset_id":41360731,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":123404051,"first_name":"Ali","last_name":"KAHLANE","domain_name":"brunel","page_name":"AliKahlane","display_name":"Ali KAHLANE","profile_url":"https://brunel.academia.edu/AliKahlane?f_ri=30945","photo":"https://0.academia-photos.com/123404051/31154204/31724604/s65_ali.kahlane.jpg"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=30945","nofollow":false},{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence?f_ri=30945","nofollow":false},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks?f_ri=30945","nofollow":false},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=30945","nofollow":false},{"id":23284,"name":"Wireless Networks (Computer Science)","url":"https://www.academia.edu/Documents/in/Wireless_Networks_Computer_Science_?f_ri=30945"},{"id":26860,"name":"Cloud Computing","url":"https://www.academia.edu/Documents/in/Cloud_Computing?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":30947,"name":"The Internet","url":"https://www.academia.edu/Documents/in/The_Internet?f_ri=30945"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=30945"},{"id":216941,"name":"Data Center","url":"https://www.academia.edu/Documents/in/Data_Center?f_ri=30945"},{"id":231134,"name":"Security in Cloud Computing","url":"https://www.academia.edu/Documents/in/Security_in_Cloud_Computing?f_ri=30945"},{"id":247799,"name":"Internet of Things (IoT)","url":"https://www.academia.edu/Documents/in/Internet_of_Things_IoT_?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_27601428" data-work_id="27601428" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/27601428/Codes_of_Ethics_for_Virtual_Space">Codes of Ethics for Virtual Space</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/27601428" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="45716f29d5ae29b427bbe80379cdbeca" rel="nofollow" data-download="{"attachment_id":47864785,"asset_id":27601428,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/47864785/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="15447839" href="https://ayatollahy.academia.edu/HamidrezaAyatollahy">Hamidreza Ayatollahy</a><script data-card-contents-for-user="15447839" type="text/json">{"id":15447839,"first_name":"Hamidreza","last_name":"Ayatollahy","domain_name":"ayatollahy","page_name":"HamidrezaAyatollahy","display_name":"Hamidreza Ayatollahy","profile_url":"https://ayatollahy.academia.edu/HamidrezaAyatollahy?f_ri=30945","photo":"https://0.academia-photos.com/15447839/4171242/153637011/s65_hamidreza.ayatollahy.png"}</script></span></span></li><li class="js-paper-rank-work_27601428 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="27601428"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 27601428, container: ".js-paper-rank-work_27601428", }); });</script></li><li class="js-percentile-work_27601428 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 27601428; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_27601428"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_27601428 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="27601428"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 27601428; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=27601428]").text(description); $(".js-view-count-work_27601428").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_27601428").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="27601428"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="7040" href="https://www.academia.edu/Documents/in/Ethic_Codes">Ethic Codes</a>, <script data-card-contents-for-ri="7040" type="text/json">{"id":7040,"name":"Ethic Codes","url":"https://www.academia.edu/Documents/in/Ethic_Codes?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="21842" href="https://www.academia.edu/Documents/in/Virtual_Worlds">Virtual Worlds</a>, <script data-card-contents-for-ri="21842" type="text/json">{"id":21842,"name":"Virtual Worlds","url":"https://www.academia.edu/Documents/in/Virtual_Worlds?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a>, <script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="396310" href="https://www.academia.edu/Documents/in/Codes_of_Ethics">Codes of Ethics</a><script data-card-contents-for-ri="396310" type="text/json">{"id":396310,"name":"Codes of Ethics","url":"https://www.academia.edu/Documents/in/Codes_of_Ethics?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=27601428]'), work: {"id":27601428,"title":"Codes of Ethics for Virtual Space","created_at":"2016-08-07T11:20:16.829-07:00","url":"https://www.academia.edu/27601428/Codes_of_Ethics_for_Virtual_Space?f_ri=30945","dom_id":"work_27601428","summary":null,"downloadable_attachments":[{"id":47864785,"asset_id":27601428,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":15447839,"first_name":"Hamidreza","last_name":"Ayatollahy","domain_name":"ayatollahy","page_name":"HamidrezaAyatollahy","display_name":"Hamidreza Ayatollahy","profile_url":"https://ayatollahy.academia.edu/HamidrezaAyatollahy?f_ri=30945","photo":"https://0.academia-photos.com/15447839/4171242/153637011/s65_hamidreza.ayatollahy.png"}],"research_interests":[{"id":7040,"name":"Ethic Codes","url":"https://www.academia.edu/Documents/in/Ethic_Codes?f_ri=30945","nofollow":false},{"id":21842,"name":"Virtual Worlds","url":"https://www.academia.edu/Documents/in/Virtual_Worlds?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":396310,"name":"Codes of Ethics","url":"https://www.academia.edu/Documents/in/Codes_of_Ethics?f_ri=30945","nofollow":false},{"id":712135,"name":"Codes of Professional Ethics","url":"https://www.academia.edu/Documents/in/Codes_of_Professional_Ethics?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_20044696" data-work_id="20044696" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/20044696/User_Rights_for_the_Internet_Age_Communications_Policy_According_to_Netizens_">User Rights for the Internet Age: Communications Policy According to “Netizens”</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/20044696" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="253e4880d37d510e673645dc15308b3e" rel="nofollow" data-download="{"attachment_id":40974028,"asset_id":20044696,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/40974028/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="74955" href="https://uva.academia.edu/StefaniaMilan">Stefania Milan</a><script data-card-contents-for-user="74955" type="text/json">{"id":74955,"first_name":"Stefania","last_name":"Milan","domain_name":"uva","page_name":"StefaniaMilan","display_name":"Stefania Milan","profile_url":"https://uva.academia.edu/StefaniaMilan?f_ri=30945","photo":"https://0.academia-photos.com/74955/20675/6420112/s65_stefania.milan.jpg"}</script></span></span></li><li class="js-paper-rank-work_20044696 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="20044696"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 20044696, container: ".js-paper-rank-work_20044696", }); });</script></li><li class="js-percentile-work_20044696 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 20044696; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_20044696"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_20044696 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="20044696"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 20044696; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=20044696]").text(description); $(".js-view-count-work_20044696").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_20044696").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="20044696"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">9</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="208" href="https://www.academia.edu/Documents/in/Social_Movements">Social Movements</a>, <script data-card-contents-for-ri="208" type="text/json">{"id":208,"name":"Social Movements","url":"https://www.academia.edu/Documents/in/Social_Movements?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="7822" href="https://www.academia.edu/Documents/in/Internet_Governance">Internet Governance</a>, <script data-card-contents-for-ri="7822" type="text/json">{"id":7822,"name":"Internet Governance","url":"https://www.academia.edu/Documents/in/Internet_Governance?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a>, <script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="46738" href="https://www.academia.edu/Documents/in/Cybersecurity">Cybersecurity</a><script data-card-contents-for-ri="46738" type="text/json">{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=20044696]'), work: {"id":20044696,"title":"User Rights for the Internet Age: Communications Policy According to “Netizens”","created_at":"2016-01-05T13:10:48.332-08:00","url":"https://www.academia.edu/20044696/User_Rights_for_the_Internet_Age_Communications_Policy_According_to_Netizens_?f_ri=30945","dom_id":"work_20044696","summary":null,"downloadable_attachments":[{"id":40974028,"asset_id":20044696,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":74955,"first_name":"Stefania","last_name":"Milan","domain_name":"uva","page_name":"StefaniaMilan","display_name":"Stefania Milan","profile_url":"https://uva.academia.edu/StefaniaMilan?f_ri=30945","photo":"https://0.academia-photos.com/74955/20675/6420112/s65_stefania.milan.jpg"}],"research_interests":[{"id":208,"name":"Social Movements","url":"https://www.academia.edu/Documents/in/Social_Movements?f_ri=30945","nofollow":false},{"id":7822,"name":"Internet Governance","url":"https://www.academia.edu/Documents/in/Internet_Governance?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945","nofollow":false},{"id":72338,"name":"Hackers","url":"https://www.academia.edu/Documents/in/Hackers?f_ri=30945"},{"id":165597,"name":"Digital Rights","url":"https://www.academia.edu/Documents/in/Digital_Rights?f_ri=30945"},{"id":574265,"name":"Hacker Culture","url":"https://www.academia.edu/Documents/in/Hacker_Culture?f_ri=30945"},{"id":1234207,"name":"Digital Rights and Privacy","url":"https://www.academia.edu/Documents/in/Digital_Rights_and_Privacy?f_ri=30945"},{"id":1723635,"name":"Public Policy","url":"https://www.academia.edu/Documents/in/Public_Policy?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_39628590 coauthored" data-work_id="39628590" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/39628590/Explainer_what_is_hybrid_warfare_and_what_is_meant_by_the_grey_zone_A_UK_AUS_explainer">Explainer: what is 'hybrid warfare' and what is meant by the 'grey zone'? A UK - AUS explainer</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">At a conference last week, Australia’s defence minister Linda Reynolds and Defence Force chief Angus Campbell referred to national security risks using two terms that may not be familiar to many. In her speech, Senator Reynolds said:... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_39628590" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">At a conference last week, Australia’s defence minister Linda Reynolds and Defence Force chief Angus Campbell referred to national security risks using two terms that may not be familiar to many. In her speech, Senator Reynolds said:<br /><br />What is clear now, is that the character of warfare is changing, with more options for pursuing strategic ends just below the threshold of traditional armed conflict – what some experts like to call grey-zone tactics or hybrid warfare.<br /><br />The concepts of “hybrid warfare” and the “grey zone” arguably build on longstanding military strategies. What is relatively new is adversaries exploiting information technology vulnerabilities to achieve an outcome.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/39628590" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="3090c563d54a32292e12fd3b2e7c67e0" rel="nofollow" data-download="{"attachment_id":59795845,"asset_id":39628590,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/59795845/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="43607" href="https://canberra.academia.edu/SaschaDOVBachmann">Professor Sascha-Dominik Dov Bachmann</a><script data-card-contents-for-user="43607" type="text/json">{"id":43607,"first_name":"Professor Sascha-Dominik Dov","last_name":"Bachmann","domain_name":"canberra","page_name":"SaschaDOVBachmann","display_name":"Professor Sascha-Dominik Dov Bachmann","profile_url":"https://canberra.academia.edu/SaschaDOVBachmann?f_ri=30945","photo":"https://0.academia-photos.com/43607/62077/19916660/s65_sascha_dov.bachmann.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text"> and <span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-39628590">+1</span><div class="hidden js-additional-users-39628590"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://independent.academia.edu/AndrewDowse">Andrew Dowse</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-39628590'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-39628590').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_39628590 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="39628590"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 39628590, container: ".js-paper-rank-work_39628590", }); });</script></li><li class="js-percentile-work_39628590 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 39628590; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_39628590"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_39628590 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="39628590"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 39628590; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=39628590]").text(description); $(".js-view-count-work_39628590").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_39628590").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="39628590"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">11</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="813" href="https://www.academia.edu/Documents/in/Political_Philosophy">Political Philosophy</a>, <script data-card-contents-for-ri="813" type="text/json">{"id":813,"name":"Political Philosophy","url":"https://www.academia.edu/Documents/in/Political_Philosophy?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1198" href="https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies">Peace and Conflict Studies</a>, <script data-card-contents-for-ri="1198" type="text/json">{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3872" href="https://www.academia.edu/Documents/in/War_Studies">War Studies</a>, <script data-card-contents-for-ri="3872" type="text/json">{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="6697" href="https://www.academia.edu/Documents/in/Australia">Australia</a><script data-card-contents-for-ri="6697" type="text/json">{"id":6697,"name":"Australia","url":"https://www.academia.edu/Documents/in/Australia?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=39628590]'), work: {"id":39628590,"title":"Explainer: what is 'hybrid warfare' and what is meant by the 'grey zone'? A UK - AUS explainer","created_at":"2019-06-18T12:20:05.177-07:00","url":"https://www.academia.edu/39628590/Explainer_what_is_hybrid_warfare_and_what_is_meant_by_the_grey_zone_A_UK_AUS_explainer?f_ri=30945","dom_id":"work_39628590","summary":"At a conference last week, Australia’s defence minister Linda Reynolds and Defence Force chief Angus Campbell referred to national security risks using two terms that may not be familiar to many. In her speech, Senator Reynolds said:\n\nWhat is clear now, is that the character of warfare is changing, with more options for pursuing strategic ends just below the threshold of traditional armed conflict – what some experts like to call grey-zone tactics or hybrid warfare.\n\nThe concepts of “hybrid warfare” and the “grey zone” arguably build on longstanding military strategies. What is relatively new is adversaries exploiting information technology vulnerabilities to achieve an outcome.","downloadable_attachments":[{"id":59795845,"asset_id":39628590,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":43607,"first_name":"Professor Sascha-Dominik Dov","last_name":"Bachmann","domain_name":"canberra","page_name":"SaschaDOVBachmann","display_name":"Professor Sascha-Dominik Dov Bachmann","profile_url":"https://canberra.academia.edu/SaschaDOVBachmann?f_ri=30945","photo":"https://0.academia-photos.com/43607/62077/19916660/s65_sascha_dov.bachmann.jpg"},{"id":118384529,"first_name":"Andrew","last_name":"Dowse","domain_name":"independent","page_name":"AndrewDowse","display_name":"Andrew Dowse","profile_url":"https://independent.academia.edu/AndrewDowse?f_ri=30945","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":813,"name":"Political Philosophy","url":"https://www.academia.edu/Documents/in/Political_Philosophy?f_ri=30945","nofollow":false},{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=30945","nofollow":false},{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=30945","nofollow":false},{"id":6697,"name":"Australia","url":"https://www.academia.edu/Documents/in/Australia?f_ri=30945","nofollow":false},{"id":12108,"name":"China","url":"https://www.academia.edu/Documents/in/China?f_ri=30945"},{"id":18086,"name":"Information operations (IO)","url":"https://www.academia.edu/Documents/in/Information_operations_IO_?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":41863,"name":"Russia","url":"https://www.academia.edu/Documents/in/Russia?f_ri=30945"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=30945"},{"id":559844,"name":"Cyberspace Operations","url":"https://www.academia.edu/Documents/in/Cyberspace_Operations?f_ri=30945"},{"id":1328172,"name":"Hybrid Warfare","url":"https://www.academia.edu/Documents/in/Hybrid_Warfare?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_37536271" data-work_id="37536271" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/37536271/RECENZJA_Marek_G%C3%B3rka_red_Cyberbezpiecze%C5%84stwo_dzieci_i_m%C5%82odzie%C5%BCy_Realny_i_wirtualny_problem_polityki_bezpiecze%C5%84stwa_Wydawnictwo_Difin_Warszawa_2017">RECENZJA: Marek Górka (red.), Cyberbezpieczeństwo dzieci i młodzieży. Realny i wirtualny problem polityki bezpieczeństwa, Wydawnictwo Difin, Warszawa 2017</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/37536271" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="3ccbf8f727ece368b42e579293caffe3" rel="nofollow" data-download="{"attachment_id":57510281,"asset_id":37536271,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/57510281/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="43976891" href="https://uni-wroc.academia.edu/MarcinAdamczyk">Marcin Adamczyk</a><script data-card-contents-for-user="43976891" type="text/json">{"id":43976891,"first_name":"Marcin","last_name":"Adamczyk","domain_name":"uni-wroc","page_name":"MarcinAdamczyk","display_name":"Marcin Adamczyk","profile_url":"https://uni-wroc.academia.edu/MarcinAdamczyk?f_ri=30945","photo":"https://0.academia-photos.com/43976891/11728642/148938207/s65_marcin.adamczyk.jpg"}</script></span></span></li><li class="js-paper-rank-work_37536271 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="37536271"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 37536271, container: ".js-paper-rank-work_37536271", }); });</script></li><li class="js-percentile-work_37536271 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37536271; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_37536271"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_37536271 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="37536271"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37536271; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37536271]").text(description); $(".js-view-count-work_37536271").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_37536271").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="37536271"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">14</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>, <script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2511" href="https://www.academia.edu/Documents/in/Cybercrimes">Cybercrimes</a>, <script data-card-contents-for-ri="2511" type="text/json">{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="9491" href="https://www.academia.edu/Documents/in/Pedagogy">Pedagogy</a>, <script data-card-contents-for-ri="9491" type="text/json">{"id":9491,"name":"Pedagogy","url":"https://www.academia.edu/Documents/in/Pedagogy?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="12756" href="https://www.academia.edu/Documents/in/Cyberbullying">Cyberbullying</a><script data-card-contents-for-ri="12756" type="text/json">{"id":12756,"name":"Cyberbullying","url":"https://www.academia.edu/Documents/in/Cyberbullying?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=37536271]'), work: {"id":37536271,"title":"RECENZJA: Marek Górka (red.), Cyberbezpieczeństwo dzieci i młodzieży. Realny i wirtualny problem polityki bezpieczeństwa, Wydawnictwo Difin, Warszawa 2017","created_at":"2018-10-05T08:32:34.587-07:00","url":"https://www.academia.edu/37536271/RECENZJA_Marek_G%C3%B3rka_red_Cyberbezpiecze%C5%84stwo_dzieci_i_m%C5%82odzie%C5%BCy_Realny_i_wirtualny_problem_polityki_bezpiecze%C5%84stwa_Wydawnictwo_Difin_Warszawa_2017?f_ri=30945","dom_id":"work_37536271","summary":null,"downloadable_attachments":[{"id":57510281,"asset_id":37536271,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":43976891,"first_name":"Marcin","last_name":"Adamczyk","domain_name":"uni-wroc","page_name":"MarcinAdamczyk","display_name":"Marcin Adamczyk","profile_url":"https://uni-wroc.academia.edu/MarcinAdamczyk?f_ri=30945","photo":"https://0.academia-photos.com/43976891/11728642/148938207/s65_marcin.adamczyk.jpg"}],"research_interests":[{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=30945","nofollow":false},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=30945","nofollow":false},{"id":9491,"name":"Pedagogy","url":"https://www.academia.edu/Documents/in/Pedagogy?f_ri=30945","nofollow":false},{"id":12756,"name":"Cyberbullying","url":"https://www.academia.edu/Documents/in/Cyberbullying?f_ri=30945","nofollow":false},{"id":20594,"name":"Cyber crime","url":"https://www.academia.edu/Documents/in/Cyber_crime?f_ri=30945"},{"id":29128,"name":"Cybercultures","url":"https://www.academia.edu/Documents/in/Cybercultures?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945"},{"id":48523,"name":"Book Reviews","url":"https://www.academia.edu/Documents/in/Book_Reviews?f_ri=30945"},{"id":96546,"name":"Cyber Law","url":"https://www.academia.edu/Documents/in/Cyber_Law?f_ri=30945"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=30945"},{"id":147412,"name":"Pedagogia","url":"https://www.academia.edu/Documents/in/Pedagogia?f_ri=30945"},{"id":1036283,"name":"School Bullying and Cyberbullying Among Adolescents","url":"https://www.academia.edu/Documents/in/School_Bullying_and_Cyberbullying_Among_Adolescents?f_ri=30945"},{"id":2420447,"name":"Cyberbezpieczeństwo","url":"https://www.academia.edu/Documents/in/Cyberbezpiecze%C5%84stwo?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_44675451 coauthored" data-work_id="44675451" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/44675451/Cyber_Awareness_Trends_in_Avionics">Cyber Awareness Trends in Avionics</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Recent examples driving an increased need for cyber awareness include unmanned aerial vehicles (UAVs) in the airspace, development of the Automatic dependent surveillance-broadcast (ADS-B), and the risk of cyber intrusion. The incident of... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_44675451" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Recent examples driving an increased need for cyber awareness include unmanned aerial vehicles (UAVs) in the airspace, development of the Automatic dependent surveillance-broadcast (ADS-B), and the risk of cyber intrusion. The incident of a civilian UAV disrupting a major airport, is one example of many incidents raising questions on the future of airspace security. While a civilian hobbyist might be ignorant of the impending harm, the situation could pose a threat to the air operations. Using this incident and others like it, ideas on the future trends in cyber awareness applied to avionics are considered. Three general ideas are incorporated: (1) mandates for new rules for airspace restrictions (e.g., geofence), (2) advanced display analytics to support the airport staff and pilots with visual displays, such as collision avoidance, and (3) electronics to support the mitigation of electronic cyber effects posed by the obtrusive aircraft. With a variety of opinions posed, the summary is intended to foster a discussion on research, industry, and commercial directions for the avionics community to consider with respect to cyber awareness.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/44675451" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="6e1e86acfedad6e74b3f9f88fdf1c4d7" rel="nofollow" data-download="{"attachment_id":65148403,"asset_id":44675451,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/65148403/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="9093041" href="https://khalifa.academia.edu/RobertoSabatini">Roberto Sabatini</a><script data-card-contents-for-user="9093041" type="text/json">{"id":9093041,"first_name":"Roberto","last_name":"Sabatini","domain_name":"khalifa","page_name":"RobertoSabatini","display_name":"Roberto Sabatini","profile_url":"https://khalifa.academia.edu/RobertoSabatini?f_ri=30945","photo":"https://0.academia-photos.com/9093041/4660850/17407129/s65_roberto.sabatini.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text"> and <span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-44675451">+2</span><div class="hidden js-additional-users-44675451"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://independent.academia.edu/AlokeRoy10">Aloke Roy</a></span></div><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://independent.academia.edu/GeorgeAndrew21">George Andrew</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-44675451'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-44675451').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_44675451 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="44675451"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 44675451, container: ".js-paper-rank-work_44675451", }); });</script></li><li class="js-percentile-work_44675451 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 44675451; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_44675451"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_44675451 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="44675451"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 44675451; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=44675451]").text(description); $(".js-view-count-work_44675451").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_44675451").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="44675451"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">18</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="77" href="https://www.academia.edu/Documents/in/Robotics">Robotics</a>, <script data-card-contents-for-ri="77" type="text/json">{"id":77,"name":"Robotics","url":"https://www.academia.edu/Documents/in/Robotics?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="88" href="https://www.academia.edu/Documents/in/Aerospace_Engineering">Aerospace Engineering</a>, <script data-card-contents-for-ri="88" type="text/json">{"id":88,"name":"Aerospace Engineering","url":"https://www.academia.edu/Documents/in/Aerospace_Engineering?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="465" href="https://www.academia.edu/Documents/in/Artificial_Intelligence">Artificial Intelligence</a>, <script data-card-contents-for-ri="465" type="text/json">{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2043" href="https://www.academia.edu/Documents/in/Mobile_Robotics">Mobile Robotics</a><script data-card-contents-for-ri="2043" type="text/json">{"id":2043,"name":"Mobile Robotics","url":"https://www.academia.edu/Documents/in/Mobile_Robotics?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=44675451]'), work: {"id":44675451,"title":"Cyber Awareness Trends in Avionics","created_at":"2020-12-10T06:19:53.668-08:00","url":"https://www.academia.edu/44675451/Cyber_Awareness_Trends_in_Avionics?f_ri=30945","dom_id":"work_44675451","summary":"Recent examples driving an increased need for cyber awareness include unmanned aerial vehicles (UAVs) in the airspace, development of the Automatic dependent surveillance-broadcast (ADS-B), and the risk of cyber intrusion. The incident of a civilian UAV disrupting a major airport, is one example of many incidents raising questions on the future of airspace security. While a civilian hobbyist might be ignorant of the impending harm, the situation could pose a threat to the air operations. Using this incident and others like it, ideas on the future trends in cyber awareness applied to avionics are considered. Three general ideas are incorporated: (1) mandates for new rules for airspace restrictions (e.g., geofence), (2) advanced display analytics to support the airport staff and pilots with visual displays, such as collision avoidance, and (3) electronics to support the mitigation of electronic cyber effects posed by the obtrusive aircraft. With a variety of opinions posed, the summary is intended to foster a discussion on research, industry, and commercial directions for the avionics community to consider with respect to cyber awareness.","downloadable_attachments":[{"id":65148403,"asset_id":44675451,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":9093041,"first_name":"Roberto","last_name":"Sabatini","domain_name":"khalifa","page_name":"RobertoSabatini","display_name":"Roberto Sabatini","profile_url":"https://khalifa.academia.edu/RobertoSabatini?f_ri=30945","photo":"https://0.academia-photos.com/9093041/4660850/17407129/s65_roberto.sabatini.jpg"},{"id":181600033,"first_name":"Aloke","last_name":"Roy","domain_name":"independent","page_name":"AlokeRoy10","display_name":"Aloke Roy","profile_url":"https://independent.academia.edu/AlokeRoy10?f_ri=30945","photo":"https://0.academia-photos.com/181600033/66230513/54579604/s65_aloke.roy.jpg"},{"id":181598888,"first_name":"George","last_name":"Andrew","domain_name":"independent","page_name":"GeorgeAndrew21","display_name":"George Andrew","profile_url":"https://independent.academia.edu/GeorgeAndrew21?f_ri=30945","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":77,"name":"Robotics","url":"https://www.academia.edu/Documents/in/Robotics?f_ri=30945","nofollow":false},{"id":88,"name":"Aerospace Engineering","url":"https://www.academia.edu/Documents/in/Aerospace_Engineering?f_ri=30945","nofollow":false},{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence?f_ri=30945","nofollow":false},{"id":2043,"name":"Mobile Robotics","url":"https://www.academia.edu/Documents/in/Mobile_Robotics?f_ri=30945","nofollow":false},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=30945"},{"id":3641,"name":"Aeronautical Engineering","url":"https://www.academia.edu/Documents/in/Aeronautical_Engineering?f_ri=30945"},{"id":4892,"name":"Autonomous Robotics","url":"https://www.academia.edu/Documents/in/Autonomous_Robotics?f_ri=30945"},{"id":5476,"name":"Cyber-Physical Systems","url":"https://www.academia.edu/Documents/in/Cyber-Physical_Systems?f_ri=30945"},{"id":9589,"name":"Intelligent Transportation Systems","url":"https://www.academia.edu/Documents/in/Intelligent_Transportation_Systems?f_ri=30945"},{"id":10977,"name":"Intelligent Systems","url":"https://www.academia.edu/Documents/in/Intelligent_Systems?f_ri=30945"},{"id":12100,"name":"Aviation","url":"https://www.academia.edu/Documents/in/Aviation?f_ri=30945"},{"id":14668,"name":"Aerospace","url":"https://www.academia.edu/Documents/in/Aerospace?f_ri=30945"},{"id":28413,"name":"Air Traffic Management","url":"https://www.academia.edu/Documents/in/Air_Traffic_Management?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":55293,"name":"Air traffic control","url":"https://www.academia.edu/Documents/in/Air_traffic_control?f_ri=30945"},{"id":62386,"name":"Avionics","url":"https://www.academia.edu/Documents/in/Avionics?f_ri=30945"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=30945"},{"id":133350,"name":"Avionics Engineering","url":"https://www.academia.edu/Documents/in/Avionics_Engineering?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_19607711" data-work_id="19607711" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/19607711/Governing_Our_Digital_Waters_Can_the_International_Law_on_the_High_Seas_and_Piracy_Enshrined_in_Part_VII_of_the_United_Nations_Convention_on_the_Law_of_the_Sea_Be_Replicated_for_Security_Governance_of_the_Internet">Governing Our Digital Waters: Can the International Law on the High Seas and Piracy Enshrined in Part VII of the United Nations Convention on the Law of the Sea Be Replicated for Security Governance of the Internet?</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The United Nations Convention on the Law of the Sea (UNCLOS) has been, since 1994, the only globally recognised codification of rights and responsibilities of nations in the international waters, also known as the high seas. For the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_19607711" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The United Nations Convention on the Law of the Sea (UNCLOS) has been, since<br /><br />1994, the only globally recognised codification of rights and responsibilities of nations in <br /><br />the international waters, also known as the high seas. For the purpose of this essay we <br /><br />shall only consider Part VII (High Seas) of UNCLOS, as the international cyberspace is in <br /><br />many ways comparable to the international waters, and their security regulations, as we <br /><br />will see throughout the essay, pose many similar challenges. Within Part VII of UNCLOS <br /><br />the following two relevant themes arise (clustered by author): inclusive and safe usage and <br /><br />navigation of the high seas (Art. 87-94, 97) and suppression of piracy and other criminal <br /><br />acts in the high seas (Art. 100-109, 111)<br /><br />purposes of relevant concepts (free navigation, illegal acts, aggression, etc.) as well as to <br /><br />consider the rights and responsibilities of the nation states between those applicable in<br /><br />international waters and in cyberspace.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/19607711" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="cfe320e6a32418ac1a9cb145b3475f24" rel="nofollow" data-download="{"attachment_id":40729226,"asset_id":19607711,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/40729226/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="2537260" href="https://united-nations.academia.edu/1">Angel Versetti</a><script data-card-contents-for-user="2537260" type="text/json">{"id":2537260,"first_name":"Angel","last_name":"Versetti","domain_name":"united-nations","page_name":"1","display_name":"Angel Versetti","profile_url":"https://united-nations.academia.edu/1?f_ri=30945","photo":"https://0.academia-photos.com/2537260/790370/1138986/s65_angel.versetti.jpg"}</script></span></span></li><li class="js-paper-rank-work_19607711 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="19607711"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 19607711, container: ".js-paper-rank-work_19607711", }); });</script></li><li class="js-percentile-work_19607711 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 19607711; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_19607711"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_19607711 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="19607711"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 19607711; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=19607711]").text(description); $(".js-view-count-work_19607711").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_19607711").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="19607711"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">32</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="465" href="https://www.academia.edu/Documents/in/Artificial_Intelligence">Artificial Intelligence</a>, <script data-card-contents-for-ri="465" type="text/json">{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="861" href="https://www.academia.edu/Documents/in/Digital_Divide">Digital Divide</a>, <script data-card-contents-for-ri="861" type="text/json">{"id":861,"name":"Digital Divide","url":"https://www.academia.edu/Documents/in/Digital_Divide?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1759" href="https://www.academia.edu/Documents/in/Internet_Studies">Internet Studies</a><script data-card-contents-for-ri="1759" type="text/json">{"id":1759,"name":"Internet Studies","url":"https://www.academia.edu/Documents/in/Internet_Studies?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=19607711]'), work: {"id":19607711,"title":"Governing Our Digital Waters: Can the International Law on the High Seas and Piracy Enshrined in Part VII of the United Nations Convention on the Law of the Sea Be Replicated for Security Governance of the Internet?","created_at":"2015-12-11T06:03:30.366-08:00","url":"https://www.academia.edu/19607711/Governing_Our_Digital_Waters_Can_the_International_Law_on_the_High_Seas_and_Piracy_Enshrined_in_Part_VII_of_the_United_Nations_Convention_on_the_Law_of_the_Sea_Be_Replicated_for_Security_Governance_of_the_Internet?f_ri=30945","dom_id":"work_19607711","summary":"The United Nations Convention on the Law of the Sea (UNCLOS) has been, since\n\n1994, the only globally recognised codification of rights and responsibilities of nations in \n\nthe international waters, also known as the high seas. For the purpose of this essay we \n\nshall only consider Part VII (High Seas) of UNCLOS, as the international cyberspace is in \n\nmany ways comparable to the international waters, and their security regulations, as we \n\nwill see throughout the essay, pose many similar challenges. Within Part VII of UNCLOS \n\nthe following two relevant themes arise (clustered by author): inclusive and safe usage and \n\nnavigation of the high seas (Art. 87-94, 97) and suppression of piracy and other criminal \n\nacts in the high seas (Art. 100-109, 111)\n\npurposes of relevant concepts (free navigation, illegal acts, aggression, etc.) as well as to \n\nconsider the rights and responsibilities of the nation states between those applicable in\n\ninternational waters and in cyberspace.","downloadable_attachments":[{"id":40729226,"asset_id":19607711,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":2537260,"first_name":"Angel","last_name":"Versetti","domain_name":"united-nations","page_name":"1","display_name":"Angel Versetti","profile_url":"https://united-nations.academia.edu/1?f_ri=30945","photo":"https://0.academia-photos.com/2537260/790370/1138986/s65_angel.versetti.jpg"}],"research_interests":[{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence?f_ri=30945","nofollow":false},{"id":861,"name":"Digital Divide","url":"https://www.academia.edu/Documents/in/Digital_Divide?f_ri=30945","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=30945","nofollow":false},{"id":1759,"name":"Internet Studies","url":"https://www.academia.edu/Documents/in/Internet_Studies?f_ri=30945","nofollow":false},{"id":2575,"name":"International Law","url":"https://www.academia.edu/Documents/in/International_Law?f_ri=30945"},{"id":3974,"name":"Telecommunications","url":"https://www.academia.edu/Documents/in/Telecommunications?f_ri=30945"},{"id":6617,"name":"United Nations","url":"https://www.academia.edu/Documents/in/United_Nations?f_ri=30945"},{"id":7057,"name":"Cyberstudies","url":"https://www.academia.edu/Documents/in/Cyberstudies?f_ri=30945"},{"id":7074,"name":"Internet Law","url":"https://www.academia.edu/Documents/in/Internet_Law?f_ri=30945"},{"id":8869,"name":"Law of the Sea","url":"https://www.academia.edu/Documents/in/Law_of_the_Sea?f_ri=30945"},{"id":11569,"name":"Satellite Communications","url":"https://www.academia.edu/Documents/in/Satellite_Communications?f_ri=30945"},{"id":21395,"name":"Telecommunication","url":"https://www.academia.edu/Documents/in/Telecommunication?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":30947,"name":"The Internet","url":"https://www.academia.edu/Documents/in/The_Internet?f_ri=30945"},{"id":34980,"name":"Net Neutrality","url":"https://www.academia.edu/Documents/in/Net_Neutrality?f_ri=30945"},{"id":43687,"name":"International Dispute Settlement","url":"https://www.academia.edu/Documents/in/International_Dispute_Settlement?f_ri=30945"},{"id":43689,"name":"WTO Dispute Settlement","url":"https://www.academia.edu/Documents/in/WTO_Dispute_Settlement?f_ri=30945"},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945"},{"id":71565,"name":"Marine Insurance Law","url":"https://www.academia.edu/Documents/in/Marine_Insurance_Law?f_ri=30945"},{"id":96546,"name":"Cyber Law","url":"https://www.academia.edu/Documents/in/Cyber_Law?f_ri=30945"},{"id":97424,"name":"Bridging Digital Divide","url":"https://www.academia.edu/Documents/in/Bridging_Digital_Divide?f_ri=30945"},{"id":97976,"name":"Data Security","url":"https://www.academia.edu/Documents/in/Data_Security?f_ri=30945"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=30945"},{"id":183920,"name":"Mediation in Cross Border Disputes","url":"https://www.academia.edu/Documents/in/Mediation_in_Cross_Border_Disputes?f_ri=30945"},{"id":265674,"name":"Submarine Cable","url":"https://www.academia.edu/Documents/in/Submarine_Cable?f_ri=30945"},{"id":536678,"name":"International Law of the Sea","url":"https://www.academia.edu/Documents/in/International_Law_of_the_Sea?f_ri=30945"},{"id":599588,"name":"Angel Versetti","url":"https://www.academia.edu/Documents/in/Angel_Versetti?f_ri=30945"},{"id":662700,"name":"UNCLOS","url":"https://www.academia.edu/Documents/in/UNCLOS?f_ri=30945"},{"id":683781,"name":"Ocean Law and Policy","url":"https://www.academia.edu/Documents/in/Ocean_Law_and_Policy?f_ri=30945"},{"id":877345,"name":"Big Data Security","url":"https://www.academia.edu/Documents/in/Big_Data_Security?f_ri=30945"},{"id":974457,"name":"Unclos 1982","url":"https://www.academia.edu/Documents/in/Unclos_1982?f_ri=30945"},{"id":1191356,"name":"Internet","url":"https://www.academia.edu/Documents/in/Internet?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_43575462" data-work_id="43575462" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/43575462/European_Cyberspace_the_potentiality_of_Cyberdiplomacy_for_Cyberconflicts_Mitigation_">European Cyberspace: the potentiality of Cyberdiplomacy for Cyberconflicts Mitigation"</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">It´s no secret that in the 21st-century politics is not only part of our physical reality, but also that of cyberspace. Lately, fake news, rigged elections or cyberattacks are new and threats states and non-state actors have to deal with.... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_43575462" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">It´s no secret that in the 21st-century politics is not only part of our physical reality, but also that of cyberspace. Lately, fake news, rigged elections or cyberattacks are new and threats states and non-state actors have to deal with. As diplomacy has been doing for the physical world, cyberdiplomacy is to make an action in the international scenario and serve as a political tool for conflict mitigation in the digital reality.<br /><br />The main objective of this paper is to understand why cyberdiplomacy is an appropriate tool for cyber conflicts mitigation between the different actors in European Union, be it states, individuals, institutions NGOs or any actor that takes part in cyberspace. To do so the European cybersecurity realm will be studied and the concept cyberdiplomacy analysed. It will then be compared with other more aggressive and technical, as well as other political paths for mitigating conflicts in or throughout cyberspace. Cybersecurity must combine technical and political tools for cyber conflicts to be effectively mitigated.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/43575462" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="9274196cc1c8a49d8beed613a2239e0a" rel="nofollow" data-download="{"attachment_id":63880878,"asset_id":43575462,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/63880878/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="57244996" href="https://independent.academia.edu/JavierOlaechea">Javier Olaechea</a><script data-card-contents-for-user="57244996" type="text/json">{"id":57244996,"first_name":"Javier","last_name":"Olaechea","domain_name":"independent","page_name":"JavierOlaechea","display_name":"Javier Olaechea","profile_url":"https://independent.academia.edu/JavierOlaechea?f_ri=30945","photo":"https://0.academia-photos.com/57244996/15247264/15917760/s65_javier.olaechea.jpg"}</script></span></span></li><li class="js-paper-rank-work_43575462 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="43575462"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 43575462, container: ".js-paper-rank-work_43575462", }); });</script></li><li class="js-percentile-work_43575462 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 43575462; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_43575462"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_43575462 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="43575462"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 43575462; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=43575462]").text(description); $(".js-view-count-work_43575462").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_43575462").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="43575462"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">6</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="9707" href="https://www.academia.edu/Documents/in/Diplomacy">Diplomacy</a>, <script data-card-contents-for-ri="9707" type="text/json">{"id":9707,"name":"Diplomacy","url":"https://www.academia.edu/Documents/in/Diplomacy?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="16928" href="https://www.academia.edu/Documents/in/European_Union_International_Studies_">European Union (International Studies)</a>, <script data-card-contents-for-ri="16928" type="text/json">{"id":16928,"name":"European Union (International Studies)","url":"https://www.academia.edu/Documents/in/European_Union_International_Studies_?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a>, <script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="46738" href="https://www.academia.edu/Documents/in/Cybersecurity">Cybersecurity</a><script data-card-contents-for-ri="46738" type="text/json">{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=43575462]'), work: {"id":43575462,"title":"European Cyberspace: the potentiality of Cyberdiplomacy for Cyberconflicts Mitigation\"","created_at":"2020-07-10T03:03:01.479-07:00","url":"https://www.academia.edu/43575462/European_Cyberspace_the_potentiality_of_Cyberdiplomacy_for_Cyberconflicts_Mitigation_?f_ri=30945","dom_id":"work_43575462","summary":"It´s no secret that in the 21st-century politics is not only part of our physical reality, but also that of cyberspace. Lately, fake news, rigged elections or cyberattacks are new and threats states and non-state actors have to deal with. As diplomacy has been doing for the physical world, cyberdiplomacy is to make an action in the international scenario and serve as a political tool for conflict mitigation in the digital reality.\n\nThe main objective of this paper is to understand why cyberdiplomacy is an appropriate tool for cyber conflicts mitigation between the different actors in European Union, be it states, individuals, institutions NGOs or any actor that takes part in cyberspace. To do so the European cybersecurity realm will be studied and the concept cyberdiplomacy analysed. It will then be compared with other more aggressive and technical, as well as other political paths for mitigating conflicts in or throughout cyberspace. Cybersecurity must combine technical and political tools for cyber conflicts to be effectively mitigated.\n","downloadable_attachments":[{"id":63880878,"asset_id":43575462,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":57244996,"first_name":"Javier","last_name":"Olaechea","domain_name":"independent","page_name":"JavierOlaechea","display_name":"Javier Olaechea","profile_url":"https://independent.academia.edu/JavierOlaechea?f_ri=30945","photo":"https://0.academia-photos.com/57244996/15247264/15917760/s65_javier.olaechea.jpg"}],"research_interests":[{"id":9707,"name":"Diplomacy","url":"https://www.academia.edu/Documents/in/Diplomacy?f_ri=30945","nofollow":false},{"id":16928,"name":"European Union (International Studies)","url":"https://www.academia.edu/Documents/in/European_Union_International_Studies_?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945","nofollow":false},{"id":73816,"name":"Digital Diplomacy","url":"https://www.academia.edu/Documents/in/Digital_Diplomacy?f_ri=30945"},{"id":143716,"name":"International Relations and European Studies","url":"https://www.academia.edu/Documents/in/International_Relations_and_European_Studies?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_42127539" data-work_id="42127539" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/42127539/TOWARDS_THE_ESTABLISHMENT_OF_THE_DIOCESE_OF_THE_INTERNET_AND_ALL_SOCIAL_MEDIA_A_GENERAL_OVERVIEW_OF_A_PIONEERING_PROJECT_PROPOSAL">TOWARDS THE ESTABLISHMENT OF THE 'DIOCESE OF THE INTERNET AND ALL SOCIAL MEDIA': A GENERAL OVERVIEW OF A PIONEERING PROJECT PROPOSAL</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/42127539" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="6a3cd7773aec2ae82fe3d2ad0ce31dee" rel="nofollow" data-download="{"attachment_id":62262452,"asset_id":42127539,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/62262452/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="1201330" href="https://haigazian.academia.edu/BergeTraboulsi">Berge Traboulsi</a><script data-card-contents-for-user="1201330" type="text/json">{"id":1201330,"first_name":"Berge","last_name":"Traboulsi","domain_name":"haigazian","page_name":"BergeTraboulsi","display_name":"Berge Traboulsi","profile_url":"https://haigazian.academia.edu/BergeTraboulsi?f_ri=30945","photo":"https://0.academia-photos.com/1201330/609219/44790414/s65_berge.traboulsi.jpg"}</script></span></span></li><li class="js-paper-rank-work_42127539 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="42127539"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 42127539, container: ".js-paper-rank-work_42127539", }); });</script></li><li class="js-percentile-work_42127539 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 42127539; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_42127539"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_42127539 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="42127539"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 42127539; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=42127539]").text(description); $(".js-view-count-work_42127539").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_42127539").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="42127539"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">20</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="923" href="https://www.academia.edu/Documents/in/Technology">Technology</a>, <script data-card-contents-for-ri="923" type="text/json">{"id":923,"name":"Technology","url":"https://www.academia.edu/Documents/in/Technology?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1759" href="https://www.academia.edu/Documents/in/Internet_Studies">Internet Studies</a>, <script data-card-contents-for-ri="1759" type="text/json">{"id":1759,"name":"Internet Studies","url":"https://www.academia.edu/Documents/in/Internet_Studies?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2969" href="https://www.academia.edu/Documents/in/Leadership">Leadership</a>, <script data-card-contents-for-ri="2969" type="text/json">{"id":2969,"name":"Leadership","url":"https://www.academia.edu/Documents/in/Leadership?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="9246" href="https://www.academia.edu/Documents/in/Social_Media">Social Media</a><script data-card-contents-for-ri="9246" type="text/json">{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=42127539]'), work: {"id":42127539,"title":"TOWARDS THE ESTABLISHMENT OF THE 'DIOCESE OF THE INTERNET AND ALL SOCIAL MEDIA': A GENERAL OVERVIEW OF A PIONEERING PROJECT PROPOSAL","created_at":"2020-03-03T07:23:47.199-08:00","url":"https://www.academia.edu/42127539/TOWARDS_THE_ESTABLISHMENT_OF_THE_DIOCESE_OF_THE_INTERNET_AND_ALL_SOCIAL_MEDIA_A_GENERAL_OVERVIEW_OF_A_PIONEERING_PROJECT_PROPOSAL?f_ri=30945","dom_id":"work_42127539","summary":null,"downloadable_attachments":[{"id":62262452,"asset_id":42127539,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":1201330,"first_name":"Berge","last_name":"Traboulsi","domain_name":"haigazian","page_name":"BergeTraboulsi","display_name":"Berge Traboulsi","profile_url":"https://haigazian.academia.edu/BergeTraboulsi?f_ri=30945","photo":"https://0.academia-photos.com/1201330/609219/44790414/s65_berge.traboulsi.jpg"}],"research_interests":[{"id":923,"name":"Technology","url":"https://www.academia.edu/Documents/in/Technology?f_ri=30945","nofollow":false},{"id":1759,"name":"Internet Studies","url":"https://www.academia.edu/Documents/in/Internet_Studies?f_ri=30945","nofollow":false},{"id":2969,"name":"Leadership","url":"https://www.academia.edu/Documents/in/Leadership?f_ri=30945","nofollow":false},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=30945","nofollow":false},{"id":17403,"name":"Pastoral Theology","url":"https://www.academia.edu/Documents/in/Pastoral_Theology?f_ri=30945"},{"id":17679,"name":"Online social networks","url":"https://www.academia.edu/Documents/in/Online_social_networks?f_ri=30945"},{"id":29128,"name":"Cybercultures","url":"https://www.academia.edu/Documents/in/Cybercultures?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":30947,"name":"The Internet","url":"https://www.academia.edu/Documents/in/The_Internet?f_ri=30945"},{"id":58308,"name":"Pastoral Care and Counselling","url":"https://www.academia.edu/Documents/in/Pastoral_Care_and_Counselling?f_ri=30945"},{"id":63660,"name":"Religion online","url":"https://www.academia.edu/Documents/in/Religion_online?f_ri=30945"},{"id":90710,"name":"Orthodox Church","url":"https://www.academia.edu/Documents/in/Orthodox_Church?f_ri=30945"},{"id":178221,"name":"Digital religion","url":"https://www.academia.edu/Documents/in/Digital_religion?f_ri=30945"},{"id":233616,"name":"Eastern Orthodoxy","url":"https://www.academia.edu/Documents/in/Eastern_Orthodoxy?f_ri=30945"},{"id":245652,"name":"LEADING INNOVATION AND CHANGE","url":"https://www.academia.edu/Documents/in/LEADING_INNOVATION_AND_CHANGE?f_ri=30945"},{"id":255908,"name":"Church Leadership \u0026 Ministry","url":"https://www.academia.edu/Documents/in/Church_Leadership_and_Ministry?f_ri=30945"},{"id":447118,"name":"Leadership and change management","url":"https://www.academia.edu/Documents/in/Leadership_and_change_management?f_ri=30945"},{"id":613759,"name":"Pastoral Ministry","url":"https://www.academia.edu/Documents/in/Pastoral_Ministry?f_ri=30945"},{"id":1001059,"name":"Religion Online; Christianity In Cyberspace","url":"https://www.academia.edu/Documents/in/Religion_Online_Christianity_In_Cyberspace?f_ri=30945"},{"id":1031640,"name":"Theology and Pastoral Care","url":"https://www.academia.edu/Documents/in/Theology_and_Pastoral_Care?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_26989948" data-work_id="26989948" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/26989948/Lino_Santos_and_Armando_Marques_Guedes_2015_Breves_reflex%C3%B5es_sobre_o_poder_e_o_ciberespa%C3%A7o_Brief_Thoughts_on_Power_and_Cyberspace">Lino Santos & Armando Marques Guedes, 2015, Breves reflexões sobre o poder e o ciberespaço. Brief Thoughts on Power and Cyberspace</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Resumo: Num Estado de Direito, a luta política entre os vários grupos, que defendem ou atacam interesses de classe, económicos, profissionais, geracionais, de género, ou outros, embora regulada, é uma constante. Governos, empresas e... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_26989948" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Resumo: Num Estado de Direito, a luta política entre os vários grupos, que defendem ou atacam interesses de classe, económicos, profissionais, geracionais, de género, ou outros, embora regulada, é uma constante. Governos, empresas e cidadãos, individulamente ou em grupo, lutam pelos seus objectivos estabelecendo relações de poder. Os media sempre tiveram um papel instrumental neste contexto e o novo media do séc. XXI – o ciberespaço – não é excepção. As características estruturais e funcionais deste instrumento criaram novas condições para a mobi-lização e participação políticas, reavivando a crença na acção libertadora da téc-nica. Por outro lado, nenhuma outra tecnologia promoveu tanta concentração de poder nas grandes empresas da indústria digital, ou criou semelhantes condições para a vigilância activa dos cidadãos por parte dos Estados. Este artigo reune algumas reflexões sobre a importância do ciberespaço como dimensão de poder. Abstract: The political struggle among groups defending or attacking class, economic, professional, generational, gender or any other interests, although regulated, is a constant. Governments, businesses and citizens, individually or as a group, fight for their porpuses by establishing relations of power between them, the media had always played an instrumental role with this regard and the new media of the 21st century – the cyberspace – is no exception. The structural and 1 Entregue: 2.3.2015; aprovado: 30.5.2015.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/26989948" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="4878697e7794fa83fada1d0da49ee008" rel="nofollow" data-download="{"attachment_id":47249814,"asset_id":26989948,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/47249814/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="134181" href="https://cria.academia.edu/ArmandoMarquesGuedes">Armando Marques-Guedes</a><script data-card-contents-for-user="134181" type="text/json">{"id":134181,"first_name":"Armando","last_name":"Marques-Guedes","domain_name":"cria","page_name":"ArmandoMarquesGuedes","display_name":"Armando Marques-Guedes","profile_url":"https://cria.academia.edu/ArmandoMarquesGuedes?f_ri=30945","photo":"https://0.academia-photos.com/134181/3401094/148494125/s65_armando.marques-guedes.png"}</script></span></span></li><li class="js-paper-rank-work_26989948 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="26989948"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 26989948, container: ".js-paper-rank-work_26989948", }); });</script></li><li class="js-percentile-work_26989948 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 26989948; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_26989948"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_26989948 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="26989948"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 26989948; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=26989948]").text(description); $(".js-view-count-work_26989948").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_26989948").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="26989948"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">110</a> </div><span class="InlineList-item-text u-textTruncate u-pl11x"><a class="InlineList-item-text" data-has-card-for-ri="32" href="https://www.academia.edu/Documents/in/Organizational_Behavior">Organizational Behavior</a>, <script data-card-contents-for-ri="32" type="text/json">{"id":32,"name":"Organizational Behavior","url":"https://www.academia.edu/Documents/in/Organizational_Behavior?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="98" href="https://www.academia.edu/Documents/in/Semiotics">Semiotics</a>, <script data-card-contents-for-ri="98" type="text/json">{"id":98,"name":"Semiotics","url":"https://www.academia.edu/Documents/in/Semiotics?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="106" href="https://www.academia.edu/Documents/in/Religion">Religion</a>, <script data-card-contents-for-ri="106" type="text/json">{"id":106,"name":"Religion","url":"https://www.academia.edu/Documents/in/Religion?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="128" href="https://www.academia.edu/Documents/in/History">History</a><script data-card-contents-for-ri="128" type="text/json">{"id":128,"name":"History","url":"https://www.academia.edu/Documents/in/History?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=26989948]'), work: {"id":26989948,"title":"Lino Santos \u0026 Armando Marques Guedes, 2015, Breves reflexões sobre o poder e o ciberespaço. Brief Thoughts on Power and Cyberspace","created_at":"2016-07-14T12:03:05.876-07:00","url":"https://www.academia.edu/26989948/Lino_Santos_and_Armando_Marques_Guedes_2015_Breves_reflex%C3%B5es_sobre_o_poder_e_o_ciberespa%C3%A7o_Brief_Thoughts_on_Power_and_Cyberspace?f_ri=30945","dom_id":"work_26989948","summary":"Resumo: Num Estado de Direito, a luta política entre os vários grupos, que defendem ou atacam interesses de classe, económicos, profissionais, geracionais, de género, ou outros, embora regulada, é uma constante. Governos, empresas e cidadãos, individulamente ou em grupo, lutam pelos seus objectivos estabelecendo relações de poder. Os media sempre tiveram um papel instrumental neste contexto e o novo media do séc. XXI – o ciberespaço – não é excepção. As características estruturais e funcionais deste instrumento criaram novas condições para a mobi-lização e participação políticas, reavivando a crença na acção libertadora da téc-nica. Por outro lado, nenhuma outra tecnologia promoveu tanta concentração de poder nas grandes empresas da indústria digital, ou criou semelhantes condições para a vigilância activa dos cidadãos por parte dos Estados. Este artigo reune algumas reflexões sobre a importância do ciberespaço como dimensão de poder. Abstract: The political struggle among groups defending or attacking class, economic, professional, generational, gender or any other interests, although regulated, is a constant. Governments, businesses and citizens, individually or as a group, fight for their porpuses by establishing relations of power between them, the media had always played an instrumental role with this regard and the new media of the 21st century – the cyberspace – is no exception. The structural and 1 Entregue: 2.3.2015; aprovado: 30.5.2015.","downloadable_attachments":[{"id":47249814,"asset_id":26989948,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":134181,"first_name":"Armando","last_name":"Marques-Guedes","domain_name":"cria","page_name":"ArmandoMarquesGuedes","display_name":"Armando Marques-Guedes","profile_url":"https://cria.academia.edu/ArmandoMarquesGuedes?f_ri=30945","photo":"https://0.academia-photos.com/134181/3401094/148494125/s65_armando.marques-guedes.png"}],"research_interests":[{"id":32,"name":"Organizational Behavior","url":"https://www.academia.edu/Documents/in/Organizational_Behavior?f_ri=30945","nofollow":false},{"id":98,"name":"Semiotics","url":"https://www.academia.edu/Documents/in/Semiotics?f_ri=30945","nofollow":false},{"id":106,"name":"Religion","url":"https://www.academia.edu/Documents/in/Religion?f_ri=30945","nofollow":false},{"id":128,"name":"History","url":"https://www.academia.edu/Documents/in/History?f_ri=30945","nofollow":false},{"id":136,"name":"Cultural History","url":"https://www.academia.edu/Documents/in/Cultural_History?f_ri=30945"},{"id":137,"name":"Economic History","url":"https://www.academia.edu/Documents/in/Economic_History?f_ri=30945"},{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=30945"},{"id":188,"name":"Cultural Studies","url":"https://www.academia.edu/Documents/in/Cultural_Studies?f_ri=30945"},{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=30945"},{"id":208,"name":"Social Movements","url":"https://www.academia.edu/Documents/in/Social_Movements?f_ri=30945"},{"id":209,"name":"Social Theory","url":"https://www.academia.edu/Documents/in/Social_Theory?f_ri=30945"},{"id":300,"name":"Mathematics","url":"https://www.academia.edu/Documents/in/Mathematics?f_ri=30945"},{"id":389,"name":"Russian Studies","url":"https://www.academia.edu/Documents/in/Russian_Studies?f_ri=30945"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=30945"},{"id":498,"name":"Physics","url":"https://www.academia.edu/Documents/in/Physics?f_ri=30945"},{"id":700,"name":"Space Sciences","url":"https://www.academia.edu/Documents/in/Space_Sciences?f_ri=30945"},{"id":724,"name":"Economics","url":"https://www.academia.edu/Documents/in/Economics?f_ri=30945"},{"id":727,"name":"Development Economics","url":"https://www.academia.edu/Documents/in/Development_Economics?f_ri=30945"},{"id":735,"name":"International Economics","url":"https://www.academia.edu/Documents/in/International_Economics?f_ri=30945"},{"id":767,"name":"Anthropology","url":"https://www.academia.edu/Documents/in/Anthropology?f_ri=30945"},{"id":796,"name":"Comparative Politics","url":"https://www.academia.edu/Documents/in/Comparative_Politics?f_ri=30945"},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=30945"},{"id":799,"name":"Public Administration","url":"https://www.academia.edu/Documents/in/Public_Administration?f_ri=30945"},{"id":802,"name":"Political Economy","url":"https://www.academia.edu/Documents/in/Political_Economy?f_ri=30945"},{"id":803,"name":"Philosophy","url":"https://www.academia.edu/Documents/in/Philosophy?f_ri=30945"},{"id":813,"name":"Political Philosophy","url":"https://www.academia.edu/Documents/in/Political_Philosophy?f_ri=30945"},{"id":821,"name":"Philosophy of Science","url":"https://www.academia.edu/Documents/in/Philosophy_of_Science?f_ri=30945"},{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication?f_ri=30945"},{"id":922,"name":"Education","url":"https://www.academia.edu/Documents/in/Education?f_ri=30945"},{"id":954,"name":"Social Anthropology","url":"https://www.academia.edu/Documents/in/Social_Anthropology?f_ri=30945"},{"id":957,"name":"Cultural Sociology","url":"https://www.academia.edu/Documents/in/Cultural_Sociology?f_ri=30945"},{"id":974,"name":"Sociology of Education","url":"https://www.academia.edu/Documents/in/Sociology_of_Education?f_ri=30945"},{"id":1003,"name":"Educational Technology","url":"https://www.academia.edu/Documents/in/Educational_Technology?f_ri=30945"},{"id":1166,"name":"International Relations Theory","url":"https://www.academia.edu/Documents/in/International_Relations_Theory?f_ri=30945"},{"id":1200,"name":"Languages and Linguistics","url":"https://www.academia.edu/Documents/in/Languages_and_Linguistics?f_ri=30945"},{"id":1233,"name":"Social Networks","url":"https://www.academia.edu/Documents/in/Social_Networks?f_ri=30945"},{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=30945"},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=30945"},{"id":1362,"name":"Spatial Analysis","url":"https://www.academia.edu/Documents/in/Spatial_Analysis?f_ri=30945"},{"id":1363,"name":"Spatial Modeling","url":"https://www.academia.edu/Documents/in/Spatial_Modeling?f_ri=30945"},{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering?f_ri=30945"},{"id":1483,"name":"Foreign Policy Analysis","url":"https://www.academia.edu/Documents/in/Foreign_Policy_Analysis?f_ri=30945"},{"id":1601,"name":"Teacher Education","url":"https://www.academia.edu/Documents/in/Teacher_Education?f_ri=30945"},{"id":1696,"name":"Political Theory","url":"https://www.academia.edu/Documents/in/Political_Theory?f_ri=30945"},{"id":1736,"name":"Science Education","url":"https://www.academia.edu/Documents/in/Science_Education?f_ri=30945"},{"id":1911,"name":"International Studies","url":"https://www.academia.edu/Documents/in/International_Studies?f_ri=30945"},{"id":2084,"name":"History of Mathematics","url":"https://www.academia.edu/Documents/in/History_of_Mathematics?f_ri=30945"},{"id":2345,"name":"Wireless Communications","url":"https://www.academia.edu/Documents/in/Wireless_Communications?f_ri=30945"},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=30945"},{"id":2553,"name":"Social Networking","url":"https://www.academia.edu/Documents/in/Social_Networking?f_ri=30945"},{"id":2582,"name":"Interdisciplinarity","url":"https://www.academia.edu/Documents/in/Interdisciplinarity?f_ri=30945"},{"id":2731,"name":"Mathematics Education","url":"https://www.academia.edu/Documents/in/Mathematics_Education?f_ri=30945"},{"id":2973,"name":"Spatial cognition","url":"https://www.academia.edu/Documents/in/Spatial_cognition?f_ri=30945"},{"id":2993,"name":"Sociology of Knowledge","url":"https://www.academia.edu/Documents/in/Sociology_of_Knowledge?f_ri=30945"},{"id":3116,"name":"Space and Place","url":"https://www.academia.edu/Documents/in/Space_and_Place?f_ri=30945"},{"id":3287,"name":"Regulation And Governance","url":"https://www.academia.edu/Documents/in/Regulation_And_Governance?f_ri=30945"},{"id":3499,"name":"Social and Cultural Anthropology","url":"https://www.academia.edu/Documents/in/Social_and_Cultural_Anthropology?f_ri=30945"},{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=30945"},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=30945"},{"id":3723,"name":"History of Science","url":"https://www.academia.edu/Documents/in/History_of_Science?f_ri=30945"},{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=30945"},{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=30945"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=30945"},{"id":4498,"name":"Utopian Studies","url":"https://www.academia.edu/Documents/in/Utopian_Studies?f_ri=30945"},{"id":5321,"name":"International Human Rights Law","url":"https://www.academia.edu/Documents/in/International_Human_Rights_Law?f_ri=30945"},{"id":5420,"name":"Anthropology of space","url":"https://www.academia.edu/Documents/in/Anthropology_of_space?f_ri=30945"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=30945"},{"id":5709,"name":"Politics","url":"https://www.academia.edu/Documents/in/Politics?f_ri=30945"},{"id":5748,"name":"Power System","url":"https://www.academia.edu/Documents/in/Power_System?f_ri=30945"},{"id":5799,"name":"Transdisciplinarity","url":"https://www.academia.edu/Documents/in/Transdisciplinarity?f_ri=30945"},{"id":6276,"name":"International Political Economy","url":"https://www.academia.edu/Documents/in/International_Political_Economy?f_ri=30945"},{"id":7369,"name":"Political communication","url":"https://www.academia.edu/Documents/in/Political_communication?f_ri=30945"},{"id":9846,"name":"Ecology","url":"https://www.academia.edu/Documents/in/Ecology?f_ri=30945"},{"id":10314,"name":"Social Movements (Political Science)","url":"https://www.academia.edu/Documents/in/Social_Movements_Political_Science_?f_ri=30945"},{"id":10389,"name":"Philosophy of Mathematics Education","url":"https://www.academia.edu/Documents/in/Philosophy_of_Mathematics_Education?f_ri=30945"},{"id":11395,"name":"Economic Development","url":"https://www.academia.edu/Documents/in/Economic_Development?f_ri=30945"},{"id":11927,"name":"Michel Foucault","url":"https://www.academia.edu/Documents/in/Michel_Foucault?f_ri=30945"},{"id":12108,"name":"China","url":"https://www.academia.edu/Documents/in/China?f_ri=30945"},{"id":15074,"name":"New Communication Technologies","url":"https://www.academia.edu/Documents/in/New_Communication_Technologies?f_ri=30945"},{"id":15588,"name":"Social History","url":"https://www.academia.edu/Documents/in/Social_History?f_ri=30945"},{"id":17097,"name":"Philosophy of Computer Science","url":"https://www.academia.edu/Documents/in/Philosophy_of_Computer_Science?f_ri=30945"},{"id":23342,"name":"Cultural Anthropology","url":"https://www.academia.edu/Documents/in/Cultural_Anthropology?f_ri=30945"},{"id":25618,"name":"Phenomenology of Space and Place","url":"https://www.academia.edu/Documents/in/Phenomenology_of_Space_and_Place?f_ri=30945"},{"id":27305,"name":"Computational Mathematics","url":"https://www.academia.edu/Documents/in/Computational_Mathematics?f_ri=30945"},{"id":28235,"name":"Multidisciplinary","url":"https://www.academia.edu/Documents/in/Multidisciplinary?f_ri=30945"},{"id":30632,"name":"Public Space","url":"https://www.academia.edu/Documents/in/Public_Space?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":41804,"name":"Epistemology of the Social Sciences","url":"https://www.academia.edu/Documents/in/Epistemology_of_the_Social_Sciences?f_ri=30945"},{"id":46429,"name":"Economy","url":"https://www.academia.edu/Documents/in/Economy?f_ri=30945"},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945"},{"id":49062,"name":"Cibercultura","url":"https://www.academia.edu/Documents/in/Cibercultura?f_ri=30945"},{"id":49565,"name":"Filosofía Política","url":"https://www.academia.edu/Documents/in/Filosof%C3%ADa_Pol%C3%ADtica?f_ri=30945"},{"id":49837,"name":"Historia","url":"https://www.academia.edu/Documents/in/Historia?f_ri=30945"},{"id":51360,"name":"Economia","url":"https://www.academia.edu/Documents/in/Economia?f_ri=30945"},{"id":51625,"name":"Educación","url":"https://www.academia.edu/Documents/in/Educaci%C3%B3n?f_ri=30945"},{"id":52480,"name":"Sociologia","url":"https://www.academia.edu/Documents/in/Sociologia?f_ri=30945"},{"id":53166,"name":"Power","url":"https://www.academia.edu/Documents/in/Power?f_ri=30945"},{"id":68297,"name":"Metodología y Teoría de la Investigación Social","url":"https://www.academia.edu/Documents/in/Metodolog%C3%ADa_y_Teor%C3%ADa_de_la_Investigaci%C3%B3n_Social?f_ri=30945"},{"id":88935,"name":"Sociología","url":"https://www.academia.edu/Documents/in/Sociolog%C3%ADa?f_ri=30945"},{"id":92517,"name":"Antropología","url":"https://www.academia.edu/Documents/in/Antropolog%C3%ADa?f_ri=30945"},{"id":92776,"name":"Ciencias Sociales","url":"https://www.academia.edu/Documents/in/Ciencias_Sociales?f_ri=30945"},{"id":98134,"name":"United States","url":"https://www.academia.edu/Documents/in/United_States?f_ri=30945"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=30945"},{"id":124140,"name":"Contested public spaces","url":"https://www.academia.edu/Documents/in/Contested_public_spaces?f_ri=30945"},{"id":127895,"name":"Non-Traditional Security","url":"https://www.academia.edu/Documents/in/Non-Traditional_Security?f_ri=30945"},{"id":186662,"name":"Ciberespaço","url":"https://www.academia.edu/Documents/in/Ciberespaco?f_ri=30945"},{"id":187277,"name":"Understanding Architectural Space","url":"https://www.academia.edu/Documents/in/Understanding_Architectural_Space?f_ri=30945"},{"id":225206,"name":"Cibernética","url":"https://www.academia.edu/Documents/in/Cibern%C3%A9tica?f_ri=30945"},{"id":599334,"name":"Architecture and Public Spaces","url":"https://www.academia.edu/Documents/in/Architecture_and_Public_Spaces?f_ri=30945"},{"id":620285,"name":"History of Philosophy","url":"https://www.academia.edu/Documents/in/History_of_Philosophy?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36547730" data-work_id="36547730" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36547730/CYBERSPACE_REGULATION_THE_NEED_OF_THE_HOUR">CYBERSPACE REGULATION: THE NEED OF THE HOUR</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">It is observed that the biggest problem or complication that the cyber world is facing at present is not of its being a universal domain but being a domain which is still highly unregulated. For a domain which is clearly three decades... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_36547730" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">It is observed that the biggest problem or complication that the cyber world is facing at present is not of its being a universal domain but being a domain which is still highly unregulated. For a domain which is clearly three decades old, the existing regulations are clearly not sufficient. Cyber space is replete with conflicts, and threatened by a variety of threats caused by different players like unethical hackers/crackers, terrorists and non-state actors, and also by the use of covert cyber capabilities by nation states. However, the global cyber community is more focussed on enhancing and upgrading the technology in use, rather than taking coherent measures to stabilise and secure the domain, in spite of awareness about the growing threat perceptions. This is evident from the fact that new advances and further upgradation in technology are taking place daily and, as a result, new threats are emerging, while safety and security related developments are put on the back burner, and are not so often in the news. Hence, there is an urgent need to rectify this scenario and a pragmatic solution has to be found to regulate cyber space to the extent possible.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36547730" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="2c4302788e4a216e9dbfe5a74cd6a372" rel="nofollow" data-download="{"attachment_id":56472159,"asset_id":36547730,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/56472159/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3365740" href="https://independent.academia.edu/EDilipraj">Dr. E. Dilipraj</a><script data-card-contents-for-user="3365740" type="text/json">{"id":3365740,"first_name":"Dr. E.","last_name":"Dilipraj","domain_name":"independent","page_name":"EDilipraj","display_name":"Dr. E. Dilipraj","profile_url":"https://independent.academia.edu/EDilipraj?f_ri=30945","photo":"https://0.academia-photos.com/3365740/4053894/18469204/s65_e.dilipraj.jpg"}</script></span></span></li><li class="js-paper-rank-work_36547730 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36547730"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36547730, container: ".js-paper-rank-work_36547730", }); });</script></li><li class="js-percentile-work_36547730 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36547730; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36547730"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36547730 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36547730"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36547730; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36547730]").text(description); $(".js-view-count-work_36547730").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36547730").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36547730"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">38</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="491" href="https://www.academia.edu/Documents/in/Information_Technology">Information Technology</a>, <script data-card-contents-for-ri="491" type="text/json">{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>, <script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1237" href="https://www.academia.edu/Documents/in/Social_Sciences">Social Sciences</a><script data-card-contents-for-ri="1237" type="text/json">{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36547730]'), work: {"id":36547730,"title":"CYBERSPACE REGULATION: THE NEED OF THE HOUR","created_at":"2018-05-02T00:23:03.905-07:00","url":"https://www.academia.edu/36547730/CYBERSPACE_REGULATION_THE_NEED_OF_THE_HOUR?f_ri=30945","dom_id":"work_36547730","summary":"It is observed that the biggest problem or complication that the cyber world is facing at present is not of its being a universal domain but being a domain which is still highly unregulated. For a domain which is clearly three decades old, the existing regulations are clearly not sufficient. Cyber space is replete with conflicts, and threatened by a variety of threats caused by different players like unethical hackers/crackers, terrorists and non-state actors, and also by the use of covert cyber capabilities by nation states. However, the global cyber community is more focussed on enhancing and upgrading the technology in use, rather than taking coherent measures to stabilise and secure the domain, in spite of awareness about the growing threat perceptions. This is evident from the fact that new advances and further upgradation in technology are taking place daily and, as a result, new threats are emerging, while safety and security related developments are put on the back burner, and are not so often in the news. Hence, there is an urgent need to rectify this scenario and a pragmatic solution has to be found to regulate cyber space to the extent possible. ","downloadable_attachments":[{"id":56472159,"asset_id":36547730,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3365740,"first_name":"Dr. E.","last_name":"Dilipraj","domain_name":"independent","page_name":"EDilipraj","display_name":"Dr. E. Dilipraj","profile_url":"https://independent.academia.edu/EDilipraj?f_ri=30945","photo":"https://0.academia-photos.com/3365740/4053894/18469204/s65_e.dilipraj.jpg"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=30945","nofollow":false},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=30945","nofollow":false},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=30945","nofollow":false},{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=30945","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=30945"},{"id":1911,"name":"International Studies","url":"https://www.academia.edu/Documents/in/International_Studies?f_ri=30945"},{"id":2553,"name":"Social Networking","url":"https://www.academia.edu/Documents/in/Social_Networking?f_ri=30945"},{"id":3389,"name":"Indian studies","url":"https://www.academia.edu/Documents/in/Indian_studies?f_ri=30945"},{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=30945"},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=30945"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=30945"},{"id":5167,"name":"Governance","url":"https://www.academia.edu/Documents/in/Governance?f_ri=30945"},{"id":7454,"name":"Information Communication Technology","url":"https://www.academia.edu/Documents/in/Information_Communication_Technology?f_ri=30945"},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=30945"},{"id":10058,"name":"Cyberspace Regulation","url":"https://www.academia.edu/Documents/in/Cyberspace_Regulation?f_ri=30945"},{"id":11584,"name":"ICT for Development","url":"https://www.academia.edu/Documents/in/ICT_for_Development?f_ri=30945"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=30945"},{"id":18814,"name":"Information and Communication technology","url":"https://www.academia.edu/Documents/in/Information_and_Communication_technology-1?f_ri=30945"},{"id":20694,"name":"Internet politics","url":"https://www.academia.edu/Documents/in/Internet_politics?f_ri=30945"},{"id":27886,"name":"Social study of ICT","url":"https://www.academia.edu/Documents/in/Social_study_of_ICT?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":30947,"name":"The Internet","url":"https://www.academia.edu/Documents/in/The_Internet?f_ri=30945"},{"id":43838,"name":"India","url":"https://www.academia.edu/Documents/in/India?f_ri=30945"},{"id":53441,"name":"Defence","url":"https://www.academia.edu/Documents/in/Defence?f_ri=30945"},{"id":57845,"name":"Defence and Security","url":"https://www.academia.edu/Documents/in/Defence_and_Security?f_ri=30945"},{"id":61968,"name":"IT Governance","url":"https://www.academia.edu/Documents/in/IT_Governance?f_ri=30945"},{"id":62551,"name":"Internet and politics","url":"https://www.academia.edu/Documents/in/Internet_and_politics?f_ri=30945"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=30945"},{"id":131971,"name":"Global Politics","url":"https://www.academia.edu/Documents/in/Global_Politics?f_ri=30945"},{"id":160948,"name":"Global Security","url":"https://www.academia.edu/Documents/in/Global_Security?f_ri=30945"},{"id":174704,"name":"Defence and Strategic Studies","url":"https://www.academia.edu/Documents/in/Defence_and_Strategic_Studies?f_ri=30945"},{"id":215782,"name":"Security and Defence Studies","url":"https://www.academia.edu/Documents/in/Security_and_Defence_Studies?f_ri=30945"},{"id":270411,"name":"Social Media, Internet, Democracy and Politics","url":"https://www.academia.edu/Documents/in/Social_Media_Internet_Democracy_and_Politics?f_ri=30945"},{"id":559844,"name":"Cyberspace Operations","url":"https://www.academia.edu/Documents/in/Cyberspace_Operations?f_ri=30945"},{"id":617394,"name":"Cyber Crimes in India","url":"https://www.academia.edu/Documents/in/Cyber_Crimes_in_India?f_ri=30945"},{"id":1437103,"name":"India's Cyber Security","url":"https://www.academia.edu/Documents/in/Indias_Cyber_Security?f_ri=30945"},{"id":1830239,"name":"Cyber Governance","url":"https://www.academia.edu/Documents/in/Cyber_Governance?f_ri=30945"},{"id":2207442,"name":"Cyberspace Governance","url":"https://www.academia.edu/Documents/in/Cyberspace_Governance?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_76869964" data-work_id="76869964" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/76869964/Cyberspace_and_International_Relations_Theory_Prospects_and_Challenges">Cyberspace and International Relations: Theory, Prospects and Challenges</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Cyberspace is everywhere in todays world and has significant implications not only for global economic activity, but also for international politics and transnational social relations. This compilation addresses for the first time the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_76869964" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Cyberspace is everywhere in todays world and has significant implications not only for global economic activity, but also for international politics and transnational social relations. This compilation addresses for the first time the cyberization of international relations - the growing dependence of actors in IR on the infrastructure and instruments of the internet, and the penetration of cyberspace into all fields of their activities. The volume approaches this topical issue in a comprehensive and interdisciplinary fashion, bringing together scholars from disciplines such as IR, security studies, ICT studies and philosophy as well as experts from everyday cyber-practice. In the first part, concepts and theories are presented to shed light on the relationship between cyberspace and international relations, discussing implications for the discipline and presenting fresh and innovative theoretical approaches. Contributions in the second part focus on specific empirical fields of act...</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/76869964" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="1be1d955edd289f81f1bfc61767f7bb7" rel="nofollow" data-download="{"attachment_id":84420845,"asset_id":76869964,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/84420845/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="13148792" href="https://uff.academia.edu/MarcialSuarez">Marcial Suarez</a><script data-card-contents-for-user="13148792" type="text/json">{"id":13148792,"first_name":"Marcial","last_name":"Suarez","domain_name":"uff","page_name":"MarcialSuarez","display_name":"Marcial Suarez","profile_url":"https://uff.academia.edu/MarcialSuarez?f_ri=30945","photo":"https://0.academia-photos.com/13148792/4271008/4967295/s65_marcial.suarez.jpg"}</script></span></span></li><li class="js-paper-rank-work_76869964 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="76869964"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 76869964, container: ".js-paper-rank-work_76869964", }); });</script></li><li class="js-percentile-work_76869964 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 76869964; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_76869964"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_76869964 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="76869964"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 76869964; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=76869964]").text(description); $(".js-view-count-work_76869964").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_76869964").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="76869964"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">16</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="128" href="https://www.academia.edu/Documents/in/History">History</a>, <script data-card-contents-for-ri="128" type="text/json">{"id":128,"name":"History","url":"https://www.academia.edu/Documents/in/History?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="133" href="https://www.academia.edu/Documents/in/Military_History">Military History</a>, <script data-card-contents-for-ri="133" type="text/json">{"id":133,"name":"Military History","url":"https://www.academia.edu/Documents/in/Military_History?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="221" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>, <script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a><script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=76869964]'), work: {"id":76869964,"title":"Cyberspace and International Relations: Theory, Prospects and Challenges","created_at":"2022-04-18T14:18:23.484-07:00","url":"https://www.academia.edu/76869964/Cyberspace_and_International_Relations_Theory_Prospects_and_Challenges?f_ri=30945","dom_id":"work_76869964","summary":"Cyberspace is everywhere in todays world and has significant implications not only for global economic activity, but also for international politics and transnational social relations. This compilation addresses for the first time the cyberization of international relations - the growing dependence of actors in IR on the infrastructure and instruments of the internet, and the penetration of cyberspace into all fields of their activities. The volume approaches this topical issue in a comprehensive and interdisciplinary fashion, bringing together scholars from disciplines such as IR, security studies, ICT studies and philosophy as well as experts from everyday cyber-practice. In the first part, concepts and theories are presented to shed light on the relationship between cyberspace and international relations, discussing implications for the discipline and presenting fresh and innovative theoretical approaches. Contributions in the second part focus on specific empirical fields of act...","downloadable_attachments":[{"id":84420845,"asset_id":76869964,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":13148792,"first_name":"Marcial","last_name":"Suarez","domain_name":"uff","page_name":"MarcialSuarez","display_name":"Marcial Suarez","profile_url":"https://uff.academia.edu/MarcialSuarez?f_ri=30945","photo":"https://0.academia-photos.com/13148792/4271008/4967295/s65_marcial.suarez.jpg"}],"research_interests":[{"id":128,"name":"History","url":"https://www.academia.edu/Documents/in/History?f_ri=30945","nofollow":false},{"id":133,"name":"Military History","url":"https://www.academia.edu/Documents/in/Military_History?f_ri=30945","nofollow":false},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=30945","nofollow":false},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=30945","nofollow":false},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=30945"},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=30945"},{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=30945"},{"id":1696,"name":"Political Theory","url":"https://www.academia.edu/Documents/in/Political_Theory?f_ri=30945"},{"id":1911,"name":"International Studies","url":"https://www.academia.edu/Documents/in/International_Studies?f_ri=30945"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=30945"},{"id":11337,"name":"Cyber Warfare","url":"https://www.academia.edu/Documents/in/Cyber_Warfare?f_ri=30945"},{"id":19087,"name":"Military and Politics","url":"https://www.academia.edu/Documents/in/Military_and_Politics?f_ri=30945"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945"},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=30945"},{"id":1572643,"name":"Strategy military science","url":"https://www.academia.edu/Documents/in/Strategy_military_science?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_6086798" data-work_id="6086798" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/6086798/CIBERMODA_E_SUAS_INFLU%C3%8ANCIAS_NA_CIBERCULTURA">CIBERMODA E SUAS INFLUÊNCIAS NA CIBERCULTURA</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/6086798" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="02371f858b1510d919b134b19868daeb" rel="nofollow" data-download="{"attachment_id":33002602,"asset_id":6086798,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/33002602/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="9174003" href="https://independent.academia.edu/GabrielaAntoniassi">Gabriela Antoniassi</a><script data-card-contents-for-user="9174003" type="text/json">{"id":9174003,"first_name":"Gabriela","last_name":"Antoniassi","domain_name":"independent","page_name":"GabrielaAntoniassi","display_name":"Gabriela Antoniassi","profile_url":"https://independent.academia.edu/GabrielaAntoniassi?f_ri=30945","photo":"https://gravatar.com/avatar/448bf39aaf4fa818daf0bc90e7104ac2?s=65"}</script></span></span></li><li class="js-paper-rank-work_6086798 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="6086798"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 6086798, container: ".js-paper-rank-work_6086798", }); });</script></li><li class="js-percentile-work_6086798 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 6086798; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_6086798"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_6086798 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="6086798"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 6086798; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=6086798]").text(description); $(".js-view-count-work_6086798").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_6086798").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="6086798"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">3</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="4289" href="https://www.academia.edu/Documents/in/Cyberpunk">Cyberpunk</a>, <script data-card-contents-for-ri="4289" type="text/json">{"id":4289,"name":"Cyberpunk","url":"https://www.academia.edu/Documents/in/Cyberpunk?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="11470" href="https://www.academia.edu/Documents/in/Cyberculture">Cyberculture</a>, <script data-card-contents-for-ri="11470" type="text/json">{"id":11470,"name":"Cyberculture","url":"https://www.academia.edu/Documents/in/Cyberculture?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a><script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=6086798]'), work: {"id":6086798,"title":"CIBERMODA E SUAS INFLUÊNCIAS NA CIBERCULTURA","created_at":"2014-02-15T08:41:18.738-08:00","url":"https://www.academia.edu/6086798/CIBERMODA_E_SUAS_INFLU%C3%8ANCIAS_NA_CIBERCULTURA?f_ri=30945","dom_id":"work_6086798","summary":null,"downloadable_attachments":[{"id":33002602,"asset_id":6086798,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":9174003,"first_name":"Gabriela","last_name":"Antoniassi","domain_name":"independent","page_name":"GabrielaAntoniassi","display_name":"Gabriela Antoniassi","profile_url":"https://independent.academia.edu/GabrielaAntoniassi?f_ri=30945","photo":"https://gravatar.com/avatar/448bf39aaf4fa818daf0bc90e7104ac2?s=65"}],"research_interests":[{"id":4289,"name":"Cyberpunk","url":"https://www.academia.edu/Documents/in/Cyberpunk?f_ri=30945","nofollow":false},{"id":11470,"name":"Cyberculture","url":"https://www.academia.edu/Documents/in/Cyberculture?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_61598361" data-work_id="61598361" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/61598361/Cyber_Legalism_Why_It_Fails_and_What_to_Do_about_It">Cyber Legalism: Why It Fails and What to Do about It</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Western nations face a glaring punishment problem in the cyber domain. Repeatedly, other nations assail their political and economic interests. Repeatedly, Western leaders warn about the gravity of such actions. And yet repeatedly, the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_61598361" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Western nations face a glaring punishment problem in the cyber domain. Repeatedly, other nations assail their political and economic interests. Repeatedly, Western leaders warn about the gravity of such actions. And yet repeatedly, the victims failed to punish to deter the offenders. This article examines why and how this situation arose and what to do about it. The Western approach to cyber conflict prevention emphasizes the centrality of existing international law and norms. The legal and normative framework is not adequate for this purpose, however, because it does not provide sufficient grounds to credibly respond to actions falling short of war. Consequently, the Western approach has failed spectacularly. It fails to grasp a central truth about contemporary security affairs: much of modern interstate rivalry fits neither the destructive criteria of war nor the acceptable boundaries of peaceful rivalry. Rather, it is unpeace, or mid-spectrum rivalry that is more damaging than traditional peacetime activity, but not physically violent like war. Nations use cyberspace to achieve some of the political and strategic objectives of war without firing a single gun. The lack of an effective Western response betrays not tolerance of aggression but a failure to devise a response strategy commensurate with the legal and doctrinal ambiguities of unpeace. Existing law and norms are a source of the problem, not its solution. An interim solution must be found instead in the development of new doctrine-in a consequentialist strategy that affects adversaries' material interests to deter actions which international law and security strategy do not ordinarily recognize as deserving a strong response.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/61598361" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="148d3be04748489a514946ec64ead245" rel="nofollow" data-download="{"attachment_id":74582205,"asset_id":61598361,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/74582205/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="36768270" href="https://oxford.academia.edu/lucaskello">Lucas Kello</a><script data-card-contents-for-user="36768270" type="text/json">{"id":36768270,"first_name":"Lucas","last_name":"Kello","domain_name":"oxford","page_name":"lucaskello","display_name":"Lucas Kello","profile_url":"https://oxford.academia.edu/lucaskello?f_ri=30945","photo":"https://0.academia-photos.com/36768270/68245845/56624466/s65_lucas.kello.jpg"}</script></span></span></li><li class="js-paper-rank-work_61598361 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="61598361"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 61598361, container: ".js-paper-rank-work_61598361", }); });</script></li><li class="js-percentile-work_61598361 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 61598361; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_61598361"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_61598361 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="61598361"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 61598361; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=61598361]").text(description); $(".js-view-count-work_61598361").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_61598361").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="61598361"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">6</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a>, <script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="41862" href="https://www.academia.edu/Documents/in/Cyberwarfare">Cyberwarfare</a>, <script data-card-contents-for-ri="41862" type="text/json">{"id":41862,"name":"Cyberwarfare","url":"https://www.academia.edu/Documents/in/Cyberwarfare?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="46738" href="https://www.academia.edu/Documents/in/Cybersecurity">Cybersecurity</a>, <script data-card-contents-for-ri="46738" type="text/json">{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="526060" href="https://www.academia.edu/Documents/in/Cyber_security_cyber_warfare">Cyber security / cyber warfare</a><script data-card-contents-for-ri="526060" type="text/json">{"id":526060,"name":"Cyber security / cyber warfare","url":"https://www.academia.edu/Documents/in/Cyber_security_cyber_warfare?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=61598361]'), work: {"id":61598361,"title":"Cyber Legalism: Why It Fails and What to Do about It","created_at":"2021-11-12T07:27:05.810-08:00","url":"https://www.academia.edu/61598361/Cyber_Legalism_Why_It_Fails_and_What_to_Do_about_It?f_ri=30945","dom_id":"work_61598361","summary":"Western nations face a glaring punishment problem in the cyber domain. Repeatedly, other nations assail their political and economic interests. Repeatedly, Western leaders warn about the gravity of such actions. And yet repeatedly, the victims failed to punish to deter the offenders. This article examines why and how this situation arose and what to do about it. The Western approach to cyber conflict prevention emphasizes the centrality of existing international law and norms. The legal and normative framework is not adequate for this purpose, however, because it does not provide sufficient grounds to credibly respond to actions falling short of war. Consequently, the Western approach has failed spectacularly. It fails to grasp a central truth about contemporary security affairs: much of modern interstate rivalry fits neither the destructive criteria of war nor the acceptable boundaries of peaceful rivalry. Rather, it is unpeace, or mid-spectrum rivalry that is more damaging than traditional peacetime activity, but not physically violent like war. Nations use cyberspace to achieve some of the political and strategic objectives of war without firing a single gun. The lack of an effective Western response betrays not tolerance of aggression but a failure to devise a response strategy commensurate with the legal and doctrinal ambiguities of unpeace. Existing law and norms are a source of the problem, not its solution. An interim solution must be found instead in the development of new doctrine-in a consequentialist strategy that affects adversaries' material interests to deter actions which international law and security strategy do not ordinarily recognize as deserving a strong response.","downloadable_attachments":[{"id":74582205,"asset_id":61598361,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":36768270,"first_name":"Lucas","last_name":"Kello","domain_name":"oxford","page_name":"lucaskello","display_name":"Lucas Kello","profile_url":"https://oxford.academia.edu/lucaskello?f_ri=30945","photo":"https://0.academia-photos.com/36768270/68245845/56624466/s65_lucas.kello.jpg"}],"research_interests":[{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":41862,"name":"Cyberwarfare","url":"https://www.academia.edu/Documents/in/Cyberwarfare?f_ri=30945","nofollow":false},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945","nofollow":false},{"id":526060,"name":"Cyber security / cyber warfare","url":"https://www.academia.edu/Documents/in/Cyber_security_cyber_warfare?f_ri=30945","nofollow":false},{"id":643245,"name":"Cyber International Relations","url":"https://www.academia.edu/Documents/in/Cyber_International_Relations?f_ri=30945"},{"id":661487,"name":"Cyber Warfare and International Law","url":"https://www.academia.edu/Documents/in/Cyber_Warfare_and_International_Law?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_48996668" data-work_id="48996668" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/48996668/Il_Cyberspace_Caratteri_e_riflessi_sulla_Comunit%C3%A0_Internazionale">Il Cyberspace. Caratteri e riflessi sulla Comunità Internazionale.</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized"><a href="https://www.edizioniesi.it/pubblicazioni/libri/diritto_storia_filosofia_e_teoria_del_diritto_-_1/diritto_civile__-_1_-_07/il-cyberspace.html" rel="nofollow">https://www.edizioniesi.it/pubblicazioni/libri/diritto_storia_filosofia_e_teoria_del_diritto_-_1/diritto_civile__-_1_-_07/il-cyberspace.html</a> Il cyberspace è comunemente inteso quale spazio di interazione tra attori internazionali. In... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_48996668" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden"><a href="https://www.edizioniesi.it/pubblicazioni/libri/diritto_storia_filosofia_e_teoria_del_diritto_-_1/diritto_civile__-_1_-_07/il-cyberspace.html" rel="nofollow">https://www.edizioniesi.it/pubblicazioni/libri/diritto_storia_filosofia_e_teoria_del_diritto_-_1/diritto_civile__-_1_-_07/il-cyberspace.html</a> <br /><br />Il cyberspace è comunemente inteso quale spazio di interazione tra attori internazionali. In particolare si fa riferimento allo spazio informatico quale V° dominio della conflittualità. Il presente studio intende presentare il cyberspace quale autonomo fattore di progresso in grado di incidere in maniera originale sui principali elementi e dinamiche della Comunità Internazionale.<br />Entro questa prospettiva verranno inizialmente evidenziati i principali caratteri dell’informazione e delle tecnologie ITC e i loro riflessi sulla definizione e l’esercizio del Cyberpower così come sulle emergenti dinamiche economiche. <br />La successiva analisi dell’azione delle Nazione Unite evidenzia le principali problematiche poste dal processo di affermazione delle nuove tecnologie. Problematiche riconducibili alle tre aree tematiche della tutela della pace internazionale, della sicurezza delle infrastrutture informatiche e del loro utilizzo, della promozione e tutela dei diritti umani nel cyberspace.<br />In ragione dell’importanza acquisita dagli attori privati nel cyberspace il quarto capitolo delinea i principali caratteri delle emergenti forme di governance multistakeholder del dominio informatico.<br />A partire dagli aspetti analizzati, l'ultimo capitolo affronta il tema dell’incidenza del progresso tecnologico sul sistema delle fonti di diritto internazionale e sulla sua interpretazione e applicazione alle problematiche riconducibili alle tre aree tematiche indicate.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/48996668" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="1ede6243bf57ae323def996830931e6b" rel="nofollow" data-download="{"attachment_id":67385444,"asset_id":48996668,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/67385444/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="44219438" href="https://uniroma1.academia.edu/MatteoMirti">Matteo Mirti</a><script data-card-contents-for-user="44219438" type="text/json">{"id":44219438,"first_name":"Matteo","last_name":"Mirti","domain_name":"uniroma1","page_name":"MatteoMirti","display_name":"Matteo Mirti","profile_url":"https://uniroma1.academia.edu/MatteoMirti?f_ri=30945","photo":"https://0.academia-photos.com/44219438/12473134/15151327/s65_matteo.mirti.jpeg"}</script></span></span></li><li class="js-paper-rank-work_48996668 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="48996668"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 48996668, container: ".js-paper-rank-work_48996668", }); });</script></li><li class="js-percentile-work_48996668 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 48996668; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_48996668"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_48996668 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="48996668"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 48996668; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=48996668]").text(description); $(".js-view-count-work_48996668").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_48996668").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="48996668"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">10</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="2592" href="https://www.academia.edu/Documents/in/Human_Rights">Human Rights</a>, <script data-card-contents-for-ri="2592" type="text/json">{"id":2592,"name":"Human Rights","url":"https://www.academia.edu/Documents/in/Human_Rights?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="6617" href="https://www.academia.edu/Documents/in/United_Nations">United Nations</a>, <script data-card-contents-for-ri="6617" type="text/json">{"id":6617,"name":"United Nations","url":"https://www.academia.edu/Documents/in/United_Nations?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a>, <script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="46738" href="https://www.academia.edu/Documents/in/Cybersecurity">Cybersecurity</a><script data-card-contents-for-ri="46738" type="text/json">{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=48996668]'), work: {"id":48996668,"title":"Il Cyberspace. Caratteri e riflessi sulla Comunità Internazionale.","created_at":"2021-05-20T11:18:21.347-07:00","url":"https://www.academia.edu/48996668/Il_Cyberspace_Caratteri_e_riflessi_sulla_Comunit%C3%A0_Internazionale?f_ri=30945","dom_id":"work_48996668","summary":"https://www.edizioniesi.it/pubblicazioni/libri/diritto_storia_filosofia_e_teoria_del_diritto_-_1/diritto_civile__-_1_-_07/il-cyberspace.html \n\nIl cyberspace è comunemente inteso quale spazio di interazione tra attori internazionali. In particolare si fa riferimento allo spazio informatico quale V° dominio della conflittualità. Il presente studio intende presentare il cyberspace quale autonomo fattore di progresso in grado di incidere in maniera originale sui principali elementi e dinamiche della Comunità Internazionale.\nEntro questa prospettiva verranno inizialmente evidenziati i principali caratteri dell’informazione e delle tecnologie ITC e i loro riflessi sulla definizione e l’esercizio del Cyberpower così come sulle emergenti dinamiche economiche. \nLa successiva analisi dell’azione delle Nazione Unite evidenzia le principali problematiche poste dal processo di affermazione delle nuove tecnologie. Problematiche riconducibili alle tre aree tematiche della tutela della pace internazionale, della sicurezza delle infrastrutture informatiche e del loro utilizzo, della promozione e tutela dei diritti umani nel cyberspace.\nIn ragione dell’importanza acquisita dagli attori privati nel cyberspace il quarto capitolo delinea i principali caratteri delle emergenti forme di governance multistakeholder del dominio informatico.\nA partire dagli aspetti analizzati, l'ultimo capitolo affronta il tema dell’incidenza del progresso tecnologico sul sistema delle fonti di diritto internazionale e sulla sua interpretazione e applicazione alle problematiche riconducibili alle tre aree tematiche indicate.\n","downloadable_attachments":[{"id":67385444,"asset_id":48996668,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":44219438,"first_name":"Matteo","last_name":"Mirti","domain_name":"uniroma1","page_name":"MatteoMirti","display_name":"Matteo Mirti","profile_url":"https://uniroma1.academia.edu/MatteoMirti?f_ri=30945","photo":"https://0.academia-photos.com/44219438/12473134/15151327/s65_matteo.mirti.jpeg"}],"research_interests":[{"id":2592,"name":"Human Rights","url":"https://www.academia.edu/Documents/in/Human_Rights?f_ri=30945","nofollow":false},{"id":6617,"name":"United Nations","url":"https://www.academia.edu/Documents/in/United_Nations?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=30945","nofollow":false},{"id":62706,"name":"Digital Economy","url":"https://www.academia.edu/Documents/in/Digital_Economy?f_ri=30945"},{"id":175544,"name":"Multistakeholder governance","url":"https://www.academia.edu/Documents/in/Multistakeholder_governance?f_ri=30945"},{"id":215276,"name":"Multistakeholder Processes","url":"https://www.academia.edu/Documents/in/Multistakeholder_Processes?f_ri=30945"},{"id":278686,"name":"Cybersecurity Law","url":"https://www.academia.edu/Documents/in/Cybersecurity_Law?f_ri=30945"},{"id":300785,"name":"Cyberspace and Cyber Laws","url":"https://www.academia.edu/Documents/in/Cyberspace_and_Cyber_Laws?f_ri=30945"},{"id":2477799,"name":"Cyber Power","url":"https://www.academia.edu/Documents/in/Cyber_Power?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_44364669" data-work_id="44364669" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/44364669/Cypherpunks_Memes_and_Bitcoin_The_Underbelly_of_the_Cryptoverse">Cypherpunks, Memes and Bitcoin: The Underbelly of the Cryptoverse</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">A draft methods practicum.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/44364669" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="0b4e3fb8ee55872e392e312ca350442a" rel="nofollow" data-download="{"attachment_id":64761640,"asset_id":44364669,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/64761640/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="17279699" href="https://nus.academia.edu/OnatKibaroglu">Dr. Onat Kibaroğlu</a><script data-card-contents-for-user="17279699" type="text/json">{"id":17279699,"first_name":"Dr. Onat","last_name":"Kibaroğlu","domain_name":"nus","page_name":"OnatKibaroglu","display_name":"Dr. Onat Kibaroğlu","profile_url":"https://nus.academia.edu/OnatKibaroglu?f_ri=30945","photo":"https://0.academia-photos.com/17279699/13932982/35387275/s65_onat.kibaro_lu.png"}</script></span></span></li><li class="js-paper-rank-work_44364669 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="44364669"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 44364669, container: ".js-paper-rank-work_44364669", }); });</script></li><li class="js-percentile-work_44364669 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 44364669; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_44364669"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_44364669 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="44364669"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 44364669; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=44364669]").text(description); $(".js-view-count-work_44364669").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_44364669").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="44364669"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">12</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="4289" href="https://www.academia.edu/Documents/in/Cyberpunk">Cyberpunk</a>, <script data-card-contents-for-ri="4289" type="text/json">{"id":4289,"name":"Cyberpunk","url":"https://www.academia.edu/Documents/in/Cyberpunk?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="15758" href="https://www.academia.edu/Documents/in/Internet_memes">Internet memes</a>, <script data-card-contents-for-ri="15758" type="text/json">{"id":15758,"name":"Internet memes","url":"https://www.academia.edu/Documents/in/Internet_memes?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a>, <script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="54244" href="https://www.academia.edu/Documents/in/Cyberpunk_and_steampunk">Cyberpunk and steampunk</a><script data-card-contents-for-ri="54244" type="text/json">{"id":54244,"name":"Cyberpunk and steampunk","url":"https://www.academia.edu/Documents/in/Cyberpunk_and_steampunk?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=44364669]'), work: {"id":44364669,"title":"Cypherpunks, Memes and Bitcoin: The Underbelly of the Cryptoverse","created_at":"2020-10-24T17:26:37.327-07:00","url":"https://www.academia.edu/44364669/Cypherpunks_Memes_and_Bitcoin_The_Underbelly_of_the_Cryptoverse?f_ri=30945","dom_id":"work_44364669","summary":"A draft methods practicum.","downloadable_attachments":[{"id":64761640,"asset_id":44364669,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":17279699,"first_name":"Dr. Onat","last_name":"Kibaroğlu","domain_name":"nus","page_name":"OnatKibaroglu","display_name":"Dr. Onat Kibaroğlu","profile_url":"https://nus.academia.edu/OnatKibaroglu?f_ri=30945","photo":"https://0.academia-photos.com/17279699/13932982/35387275/s65_onat.kibaro_lu.png"}],"research_interests":[{"id":4289,"name":"Cyberpunk","url":"https://www.academia.edu/Documents/in/Cyberpunk?f_ri=30945","nofollow":false},{"id":15758,"name":"Internet memes","url":"https://www.academia.edu/Documents/in/Internet_memes?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":54244,"name":"Cyberpunk and steampunk","url":"https://www.academia.edu/Documents/in/Cyberpunk_and_steampunk?f_ri=30945","nofollow":false},{"id":57868,"name":"Memes","url":"https://www.academia.edu/Documents/in/Memes?f_ri=30945"},{"id":266106,"name":"Cyberpunk, Internet Studies","url":"https://www.academia.edu/Documents/in/Cyberpunk_Internet_Studies?f_ri=30945"},{"id":281112,"name":"Bitcoin","url":"https://www.academia.edu/Documents/in/Bitcoin?f_ri=30945"},{"id":333492,"name":"Cypherpunk","url":"https://www.academia.edu/Documents/in/Cypherpunk?f_ri=30945"},{"id":1450126,"name":"Blockchains","url":"https://www.academia.edu/Documents/in/Blockchains?f_ri=30945"},{"id":2152002,"name":"Dank Memes","url":"https://www.academia.edu/Documents/in/Dank_Memes?f_ri=30945"},{"id":2199949,"name":"Blockchain","url":"https://www.academia.edu/Documents/in/Blockchain?f_ri=30945"},{"id":2199951,"name":"Blockchain Technologies","url":"https://www.academia.edu/Documents/in/Blockchain_Technologies?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_43783862" data-work_id="43783862" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/43783862/In_Brief_The_Law_of_War_Cyberspace_and_International_Security">In Brief: The Law of War, Cyberspace, and International Security</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The law of war is part of who we are, it is part of our military heritage. Warfare may have changed shape, methods, and technologies – but the concept of one group of people battling another group of people defensively, due to religious... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_43783862" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The law of war is part of who we are, it is part of our military heritage. Warfare may have changed shape, methods, and technologies – but the concept of one group of people battling another group of people defensively, due to religious conflict, balance of power, economy, or otherwise, remains constant to this day. The primary issues surrounding the Law of Armed Conflict (LOAC) international security can be separated into three main concerns. First, establishment of internationally agreed-upon legal definitions of the terms surrounding cyberspace and, cyberspace, and international security must be created. Second, to be addressed in a later paper, escalation scales must be produced by which each of those infractions can be judged and options for defensive retaliatory measures can be considered. Third, also to be addressed by a later paper, the methods by which assessment, attribution, and accountability are to be conducted11 must be applied to suit each of the legal definitions. Based upon category and placement on the new escalation scale, LOAC can be applied to new rules of engagement. <br />The goal is to identify a cyber event, then properly categorize it based on internationally agreed upon parameters, assess the severity against an escalation scale in order to determine a proper response, attribute the incident to a state or non-state actor, find the parties who perpetrated the incident, and strive to achieve justice.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/43783862" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="3b599c81dbce4ee6db40c71322e94c52" rel="nofollow" data-download="{"attachment_id":64098783,"asset_id":43783862,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/64098783/download_file?st=MTczMjgyNDYwOSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="36027559" href="https://harvard-ext.academia.edu/SonieLasker">Sonie Lasker</a><script data-card-contents-for-user="36027559" type="text/json">{"id":36027559,"first_name":"Sonie","last_name":"Lasker","domain_name":"harvard-ext","page_name":"SonieLasker","display_name":"Sonie Lasker","profile_url":"https://harvard-ext.academia.edu/SonieLasker?f_ri=30945","photo":"https://0.academia-photos.com/36027559/10935440/54736724/s65_sonie.lasker.jpg"}</script></span></span></li><li class="js-paper-rank-work_43783862 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="43783862"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 43783862, container: ".js-paper-rank-work_43783862", }); });</script></li><li class="js-percentile-work_43783862 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 43783862; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_43783862"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_43783862 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="43783862"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 43783862; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=43783862]").text(description); $(".js-view-count-work_43783862").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_43783862").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="43783862"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">7</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2511" href="https://www.academia.edu/Documents/in/Cybercrimes">Cybercrimes</a>, <script data-card-contents-for-ri="2511" type="text/json">{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5321" href="https://www.academia.edu/Documents/in/International_Human_Rights_Law">International Human Rights Law</a>, <script data-card-contents-for-ri="5321" type="text/json">{"id":5321,"name":"International Human Rights Law","url":"https://www.academia.edu/Documents/in/International_Human_Rights_Law?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="14247" href="https://www.academia.edu/Documents/in/Laws_of_War">Laws of War</a>, <script data-card-contents-for-ri="14247" type="text/json">{"id":14247,"name":"Laws of War","url":"https://www.academia.edu/Documents/in/Laws_of_War?f_ri=30945","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a><script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=43783862]'), work: {"id":43783862,"title":"In Brief: The Law of War, Cyberspace, and International Security","created_at":"2020-08-04T18:20:11.720-07:00","url":"https://www.academia.edu/43783862/In_Brief_The_Law_of_War_Cyberspace_and_International_Security?f_ri=30945","dom_id":"work_43783862","summary":"The law of war is part of who we are, it is part of our military heritage. Warfare may have changed shape, methods, and technologies – but the concept of one group of people battling another group of people defensively, due to religious conflict, balance of power, economy, or otherwise, remains constant to this day. The primary issues surrounding the Law of Armed Conflict (LOAC) international security can be separated into three main concerns. First, establishment of internationally agreed-upon legal definitions of the terms surrounding cyberspace and, cyberspace, and international security must be created. Second, to be addressed in a later paper, escalation scales must be produced by which each of those infractions can be judged and options for defensive retaliatory measures can be considered. Third, also to be addressed by a later paper, the methods by which assessment, attribution, and accountability are to be conducted11 must be applied to suit each of the legal definitions. Based upon category and placement on the new escalation scale, LOAC can be applied to new rules of engagement. \nThe goal is to identify a cyber event, then properly categorize it based on internationally agreed upon parameters, assess the severity against an escalation scale in order to determine a proper response, attribute the incident to a state or non-state actor, find the parties who perpetrated the incident, and strive to achieve justice.","downloadable_attachments":[{"id":64098783,"asset_id":43783862,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":36027559,"first_name":"Sonie","last_name":"Lasker","domain_name":"harvard-ext","page_name":"SonieLasker","display_name":"Sonie Lasker","profile_url":"https://harvard-ext.academia.edu/SonieLasker?f_ri=30945","photo":"https://0.academia-photos.com/36027559/10935440/54736724/s65_sonie.lasker.jpg"}],"research_interests":[{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=30945","nofollow":false},{"id":5321,"name":"International Human Rights Law","url":"https://www.academia.edu/Documents/in/International_Human_Rights_Law?f_ri=30945","nofollow":false},{"id":14247,"name":"Laws of War","url":"https://www.academia.edu/Documents/in/Laws_of_War?f_ri=30945","nofollow":false},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=30945","nofollow":false},{"id":61620,"name":"National Security","url":"https://www.academia.edu/Documents/in/National_Security?f_ri=30945"},{"id":162629,"name":"Cyber Laws and Cyber Crime","url":"https://www.academia.edu/Documents/in/Cyber_Laws_and_Cyber_Crime?f_ri=30945"},{"id":294517,"name":"Defense and Strategic Studies","url":"https://www.academia.edu/Documents/in/Defense_and_Strategic_Studies?f_ri=30945"}]}, }) } })();</script></ul></li></ul></div></div></div><div class="u-taCenter Pagination"><ul class="pagination"><li class="next_page"><a href="/Documents/in/Cyberspace?after=50%2C43783862" rel="next">Next</a></li><li class="last next"><a href="/Documents/in/Cyberspace?page=last">Last »</a></li></ul></div></div><div class="hidden-xs hidden-sm"><div class="u-pl6x"><div style="width: 300px;"><div class="panel panel-flat u-mt7x"><div class="panel-heading u-p5x"><div class="u-tcGrayDark u-taCenter u-fw700 u-textUppercase">Related Topics</div></div><ul class="list-group"><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Cybercultures">Cybercultures</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="29128">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="29128">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Cyber_Warfare">Cyber Warfare</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="11337">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="11337">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="115676">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="115676">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Cybersecurity">Cybersecurity</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="46738">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="46738">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Cyberwarfare">Cyberwarfare</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="41862">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="41862">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Cyber_Terrorism">Cyber Terrorism</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="11336">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="11336">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Internet_Governance">Internet Governance</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="7822">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="7822">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Cyborgs">Cyborgs</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="168614">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="168614">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Cybercrimes">Cybercrimes</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="2511">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="2511">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Cyber_crime">Cyber crime</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="20594">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="20594">Following</a></div></li></ul></div></div></div></div></div></div><script>// MIT License // Copyright © 2011 Sebastian Tschan, https://blueimp.net // Permission is hereby granted, free of charge, to any person obtaining a copy of // this software and associated documentation files (the "Software"), to deal in // the Software without restriction, including without limitation the rights to // use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of // the Software, and to permit persons to whom the Software is furnished to do so, // subject to the following conditions: // The above copyright notice and this permission notice shall be included in all // copies or substantial portions of the Software. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS // FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR // COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER // IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN // CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. !function(n){"use strict";function d(n,t){var r=(65535&n)+(65535&t);return(n>>16)+(t>>16)+(r>>16)<<16|65535&r}function f(n,t,r,e,o,u){return d((c=d(d(t,n),d(e,u)))<<(f=o)|c>>>32-f,r);var c,f}function l(n,t,r,e,o,u,c){return f(t&r|~t&e,n,t,o,u,c)}function v(n,t,r,e,o,u,c){return f(t&e|r&~e,n,t,o,u,c)}function g(n,t,r,e,o,u,c){return f(t^r^e,n,t,o,u,c)}function m(n,t,r,e,o,u,c){return f(r^(t|~e),n,t,o,u,c)}function i(n,t){var r,e,o,u;n[t>>5]|=128<<t%32,n[14+(t+64>>>9<<4)]=t;for(var c=1732584193,f=-271733879,i=-1732584194,a=271733878,h=0;h<n.length;h+=16)c=l(r=c,e=f,o=i,u=a,n[h],7,-680876936),a=l(a,c,f,i,n[h+1],12,-389564586),i=l(i,a,c,f,n[h+2],17,606105819),f=l(f,i,a,c,n[h+3],22,-1044525330),c=l(c,f,i,a,n[h+4],7,-176418897),a=l(a,c,f,i,n[h+5],12,1200080426),i=l(i,a,c,f,n[h+6],17,-1473231341),f=l(f,i,a,c,n[h+7],22,-45705983),c=l(c,f,i,a,n[h+8],7,1770035416),a=l(a,c,f,i,n[h+9],12,-1958414417),i=l(i,a,c,f,n[h+10],17,-42063),f=l(f,i,a,c,n[h+11],22,-1990404162),c=l(c,f,i,a,n[h+12],7,1804603682),a=l(a,c,f,i,n[h+13],12,-40341101),i=l(i,a,c,f,n[h+14],17,-1502002290),c=v(c,f=l(f,i,a,c,n[h+15],22,1236535329),i,a,n[h+1],5,-165796510),a=v(a,c,f,i,n[h+6],9,-1069501632),i=v(i,a,c,f,n[h+11],14,643717713),f=v(f,i,a,c,n[h],20,-373897302),c=v(c,f,i,a,n[h+5],5,-701558691),a=v(a,c,f,i,n[h+10],9,38016083),i=v(i,a,c,f,n[h+15],14,-660478335),f=v(f,i,a,c,n[h+4],20,-405537848),c=v(c,f,i,a,n[h+9],5,568446438),a=v(a,c,f,i,n[h+14],9,-1019803690),i=v(i,a,c,f,n[h+3],14,-187363961),f=v(f,i,a,c,n[h+8],20,1163531501),c=v(c,f,i,a,n[h+13],5,-1444681467),a=v(a,c,f,i,n[h+2],9,-51403784),i=v(i,a,c,f,n[h+7],14,1735328473),c=g(c,f=v(f,i,a,c,n[h+12],20,-1926607734),i,a,n[h+5],4,-378558),a=g(a,c,f,i,n[h+8],11,-2022574463),i=g(i,a,c,f,n[h+11],16,1839030562),f=g(f,i,a,c,n[h+14],23,-35309556),c=g(c,f,i,a,n[h+1],4,-1530992060),a=g(a,c,f,i,n[h+4],11,1272893353),i=g(i,a,c,f,n[h+7],16,-155497632),f=g(f,i,a,c,n[h+10],23,-1094730640),c=g(c,f,i,a,n[h+13],4,681279174),a=g(a,c,f,i,n[h],11,-358537222),i=g(i,a,c,f,n[h+3],16,-722521979),f=g(f,i,a,c,n[h+6],23,76029189),c=g(c,f,i,a,n[h+9],4,-640364487),a=g(a,c,f,i,n[h+12],11,-421815835),i=g(i,a,c,f,n[h+15],16,530742520),c=m(c,f=g(f,i,a,c,n[h+2],23,-995338651),i,a,n[h],6,-198630844),a=m(a,c,f,i,n[h+7],10,1126891415),i=m(i,a,c,f,n[h+14],15,-1416354905),f=m(f,i,a,c,n[h+5],21,-57434055),c=m(c,f,i,a,n[h+12],6,1700485571),a=m(a,c,f,i,n[h+3],10,-1894986606),i=m(i,a,c,f,n[h+10],15,-1051523),f=m(f,i,a,c,n[h+1],21,-2054922799),c=m(c,f,i,a,n[h+8],6,1873313359),a=m(a,c,f,i,n[h+15],10,-30611744),i=m(i,a,c,f,n[h+6],15,-1560198380),f=m(f,i,a,c,n[h+13],21,1309151649),c=m(c,f,i,a,n[h+4],6,-145523070),a=m(a,c,f,i,n[h+11],10,-1120210379),i=m(i,a,c,f,n[h+2],15,718787259),f=m(f,i,a,c,n[h+9],21,-343485551),c=d(c,r),f=d(f,e),i=d(i,o),a=d(a,u);return[c,f,i,a]}function a(n){for(var t="",r=32*n.length,e=0;e<r;e+=8)t+=String.fromCharCode(n[e>>5]>>>e%32&255);return t}function h(n){var t=[];for(t[(n.length>>2)-1]=void 0,e=0;e<t.length;e+=1)t[e]=0;for(var r=8*n.length,e=0;e<r;e+=8)t[e>>5]|=(255&n.charCodeAt(e/8))<<e%32;return t}function e(n){for(var t,r="0123456789abcdef",e="",o=0;o<n.length;o+=1)t=n.charCodeAt(o),e+=r.charAt(t>>>4&15)+r.charAt(15&t);return e}function r(n){return unescape(encodeURIComponent(n))}function o(n){return a(i(h(t=r(n)),8*t.length));var t}function u(n,t){return function(n,t){var r,e,o=h(n),u=[],c=[];for(u[15]=c[15]=void 0,16<o.length&&(o=i(o,8*n.length)),r=0;r<16;r+=1)u[r]=909522486^o[r],c[r]=1549556828^o[r];return e=i(u.concat(h(t)),512+8*t.length),a(i(c.concat(e),640))}(r(n),r(t))}function t(n,t,r){return t?r?u(t,n):e(u(t,n)):r?o(n):e(o(n))}"function"==typeof define&&define.amd?define(function(){return t}):"object"==typeof module&&module.exports?module.exports=t:n.md5=t}(this);</script><script>window.AbTest = (function() { return { 'ab_test': (uniqueId, test_name, buckets) => { let override = new URLSearchParams(window.location.search).get(`ab_test[${test_name}]`); if ( override ) { return override; } const bucketNames = buckets.map((bucket) => { return typeof bucket === 'string' ? bucket : Object.keys(bucket)[0]; }); const weights = buckets.map((bucket) => { return typeof bucket === 'string' ? 1 : Object.values(bucket)[0]; }); const total = weights.reduce((sum, weight) => sum + weight); const hash = md5(`${uniqueId}${test_name}`); const hashNum = parseInt(hash.slice(-12), 16); let bucketPoint = total * (hashNum % 100000) / 100000; const bucket = bucketNames.find((_, i) => { if (weights[i] > bucketPoint) { return true; } bucketPoint -= weights[i]; return false; }); return bucket; } }; })();</script><div data-auto_select="false" data-client_id="331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b" data-landing_url="https://www.academia.edu/Documents/in/Cyberspace" data-login_uri="https://www.academia.edu/registrations/google_one_tap" data-moment_callback="onGoogleOneTapEvent" id="g_id_onload"></div><script>function onGoogleOneTapEvent(event) { var momentType = event.getMomentType(); var momentReason = null; if (event.isNotDisplayed()) { momentReason = event.getNotDisplayedReason(); } else if (event.isSkippedMoment()) { momentReason = event.getSkippedReason(); } else if (event.isDismissedMoment()) { momentReason = event.getDismissedReason(); } Aedu.arbitraryEvents.write('GoogleOneTapEvent', { moment_type: momentType, moment_reason: momentReason, }); }</script><script>(function() { var auvid = unescape( document.cookie .split(/; ?/) .find((s) => s.startsWith('auvid')) .substring(6)); var bucket = AbTest.ab_test(auvid, 'lo_ri_one_tap_google_sign_on', ['control', 'one_tap_google_sign_on']); if (bucket === 'control') return; var oneTapTag = document.createElement('script') oneTapTag.async = true oneTapTag.defer = true oneTapTag.src = 'https://accounts.google.com/gsi/client' document.body.appendChild(oneTapTag) })();</script></div></div></div> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span ="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "0352c05a0f7d5516ee342538cb081c3e3d4ff2f52c016bc6019fed5c420d10e1", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="maUTDk7eEYzMWqdIcGN6Rxw8wq4jp8ZCCXeYGnF/j0dNVSApq/5ED3D3woDIS4B4UlYlxvYX/0ePBmgH1NWNFA==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://www.academia.edu/Documents/in/Cyberspace" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="yb4GDfqUa3BogVT8ppQPWigjuFfeRY9TkdvA+LDl1iAdTjUqH7Q+89QsMTQevPVlZklfPwv1tlYXqjDlFU/Ucw==" autocomplete="off" /><p>Enter the email address you signed up with and we'll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account? <a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a rel="nofollow" href="https://medium.com/academia">Blog</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg> <strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg> <strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia ©2024</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>