نتایج جستجو برای: sysops
تعداد نتایج: 6 فیلتر نتایج به سال:
It has been stated that information is almost impossible to control. Especially in a society which has become heavily networked. If this statement is true, it must have consequences for the position of system administrators (sysadmins) and bulletin board system operators (sysops). Will they be liable for (il)legal activities on their systems? Will they play an important role in the disseminatio...
Internet trolling has become a popularly used term to describe the posting of any content on the Internet which is provocative or offensive. This is different from the original meaning online in the 1990s, which referred to the posting of provocative messages for humourous effect. Those systems operators (sysops) who run online communities are finding they are being targeted because of abuse po...
This paper aims to probe the nature of possible responses to the actions taken by certain foreign companies to unilaterally terminate their services to the Iranian public and private Internet service providers. The paper examines specifically the procedural aspects of the issue and concludes that due to the lack of the biased nature of relationship between sysops and Internet users and the abse...
this paper aims to probe the nature of possible responses to the actions taken by certain foreign companies to unilaterally terminate their services to the iranian public and private internet service providers. the paper examines specifically the procedural aspects of the issue and concludes that due to the lack of the biased nature of relationship between sysops and internet users and the abse...
Recent social and technical developments are expanding surveillance by the government and private sector and intensifying privacy concerns, resulting in a surveillance-privacy dilemma. Governments establish surveillance schemes to fight terrorism and crime. Private organizations use profiling and data mining techniques to target marketing endeavors, to analyze customer behavior and monitor the ...
This paper continues our examination of Trojan horses on the Internet; their prevalence, technical structure and impact. It explores the type and scope of threats encountered on the Internet throughout history until today. It examines user attitudes and considers ways in which those attitudes can actively affect your organization’s vulnerability to Trojanizations of various types. It discusses ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید