نتایج جستجو برای: سایبرلوفینگ cyber loafing

تعداد نتایج: 16469  

2007

Introduction Nature and Formation of Groups Groupthink (Box 7.1) Type of Groups The Minimal Group Paradigm Experiments (Box 7.2) Influence of Group on Individual Behaviour Social Loafing Group Polarisation Conformity, Compliance, and Obedience The Autokinetic Effect (Box 7.3) Group Pressure and Conformity : The Asch Experiment (Box 7.4) Cooperation and Competition Sherif’s Summer Camp Experimen...

Sharafi , Shahin, Amirzadeh, Vahid, Manzari Tavakoli , Alireza, Salajegheh, Sanjar,

Purpose: Cyber social networks and cyberspace are like a double-edged sword that brings favorable and unfavorable consequences. The advantages cannot prevent us from neglecting its dangerous disadvantages that disregard the ethical principles and community values. The present research has been carried out to explain the factors related to the implementation of cyber social network policies in I...

,

Background: Given the appropriateness of cyberspace and its interconnectedness, each country is expected to minimize the possibility of harmful actions by securing and continuously monitoring the Internet and the virtual world. Of course, part of this goal will be achieved through the adoption of appropriate national laws and, in part, through proper education of citizens and the development of...

2009
Heum Park SunHo Cho Hyuk-Chul Kwon

We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber sp...

Journal: :Cyberpsychology, behavior and social networking 2012
Michelle F. Wright Yan Li

Using the general strain theory as a theoretical framework, the present longitudinal study investigated both face-to-face and cyber victimization in relation to cyber-displaced aggression. Longitudinal data were collected from 130 (70 women) young adults who completed measures assessing their victimization (face-to-face and cyber), cyber aggression, and both face-to-face and cyber-displaced agg...

ژورنال: رویش روانشناسی 2022

n this article, attempts to review with a developmental approach to cyberbullying, prevalence and risk and protective factors it. In the present narrative review article, which is done by the method of text research, articles about cyberbullying from 2010 to 2020 were published in the Google Scholar, ScienceDirect, Elsevier, Scopus, ProQuest, Springer, and PubMed databases were extracted and an...

2001
Tomoko Itao Tetsuya Nakamura Masato Matsuo Tatsuya Suda Tomonori Aoyama

In this paper, we describe Jack-in-the-Net (Ja-Net), a framework to achieve adaptive service composition in a large scale, open network environment. In Ja-Net, a service is implemented by a collection of cyber-entities and provided through cooperative interaction of cyber-entities. Cyber-entities communicate with each other using Ja-Net ACL (Agent Communication Language) and establish relations...

2015
Priya Singh Neeraj Saini Rajkumar Saini

Cyber Crimes are increasing day by day and are posing a great threat to internet users. This paper discusses the Cyber crime, its nature and types. Various tools and techniques used for cyber crime are evaluated in this paper. The paper also discusses cyber related laws under Indian Penal Code and their application to the cyber offences. With the discussion of cyber crimes, this paper proposes ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید