Encyclopedia of Cyber Behavior
Latest Publications


TOTAL DOCUMENTS

106
(FIVE YEARS 0)

H-INDEX

5
(FIVE YEARS 0)

Published By IGI Global

9781466603158, 9781466603165

2012 ◽  
pp. 1316-1327
Author(s):  
Matthieu J. Guitton

The real world impacts the use of the cyber world. Two characteristics shape the Canadian cyber world: first, the bilingual nature of Canada; second and most important, the immensity of the Canadian territory and the related difficulties in physically reaching its population. Due to this situation, Canada has been at the edge of the development of cyberspace, investing major efforts in cyber-applications for the health system and for tele-education. This chapter describes the characteristics of cyber behavior in Canada and summarizes the current state of Canadian cyberspace, with a particular focus on the involvement of the government, media and entertainment, universities and hospitals, and a special emphasis on tele-medicine. Finally, this chapter describes some of the research of Canadian scientists in the field of cyber behavior. In the context of a globalized world, the experience of Canada provides a useful example for optimizing the use of cyberspaces in large territories, and facilitating interactions between different – real or virtual – communities.


2012 ◽  
pp. 1282-1304
Author(s):  
Mangala Anil Hirwade

The National e-Governance Plan (NeGP) was approved by the Government of India in the year 2006, comprising of 27 Mission Mode Projects (MMPs) and 8 components. The vision of this programme is –“to make all government services accessible to the common man in his locality, through common service delivery outlets, and ensure efficiency, transparency, and reliability of such services at affordable costs to realise the basic needs of the common man.” The effort has been made to demystify and simplify the process of delivering government services by taking a holistic view of initiatives across the country and proving an enabling ICT based platform. The ultimate objective is to bring government services to citizens’ doorsteps. This article discusses major e-governance initiatives before the launch of NeGP and the status of MMPs under Central and State Government and under integrated service category after the launch of NeGP. It also takes an overview of the number of online services provided to the stakeholders through government portals. A review of recommendations of National Knowledge Commission of India on e-governance is taken along with the actions taken in this direction. Major challenges in implementation of e-governance are also discussed.


2012 ◽  
pp. 1225-1233
Author(s):  
Christos N. Moridis ◽  
Anastasios A. Economides

During recent decades there has been an extensive progress towards several Artificial Intelligence (AI) concepts, such as that of intelligent agent. Meanwhile, it has been established that emotions play a crucial role concerning human reasoning and learning. Thus, developing an intelligent agent able to recognize and express emotions has been considered an enormous challenge for AI researchers. Embedding a computational model of emotions in intelligent agents can be beneficial in a variety of domains, including e-learning applications. However, until recently emotional aspects of human learning were not taken into account when designing e-learning platforms. Various issues arise when considering the development of affective agents in e-learning environments, such as issues relating to agents’ appearance, as well as ways for those agents to recognize learners’ emotions and express emotional support. Embodied conversational agents (ECAs) with empathetic behaviour have been suggested to be one effective way for those agents to provide emotional feedback to learners’ emotions. There has been some valuable research towards this direction, but a lot of work still needs to be done to advance scientific knowledge.


2012 ◽  
pp. 1088-1095
Author(s):  
Kumi Ishii ◽  
Brittany R. Black

With the diffusion of networked technology in our society, online communication has become an integral part of daily life, and conflict no longer occurs only in face-to-face (FtF) contexts. Many people experience cyber conflict (i.e., a perceived incompatibility of goals among two or more cyber parties over computer-mediated communication (CMC) or online communication) and manages it online. While research in this significant and emerged topic is scattered across contexts and disciplines, this chapter provides preliminary knowledge by discussing the antecedents and outcomes of cyber conflict as well as factors that affect cyber conflict management. The chapter also offers future research directions.


2012 ◽  
pp. 1063-1073
Author(s):  
Tetsuro Kobayashi

This chapter reviews historical development of research on cyber behavior and social capital, based on the definition by Robert D. Putnam, by focusing on the relationship between Information Communication and Technology use with social networks, civic engagement, as well as social trust. Firstly, the intellectual history of studies on cyber behavior and social capital is reviewed. Secondly, important past studies on the relationship between ICT use and social capital are focused from four perspectives: social networks, civic engagement, local community, and mobile phone use. Finally, future research directions are discussed from the perspective of comparative culture and rapidly evolving high-functionality smart phones.


2012 ◽  
pp. 1018-1034
Author(s):  
Fabian Ströhle ◽  
Timm Sprenger

The rise of Twitter has changed human communication behavior not only in the political domain, but also in many other fields. Individuals are increasingly using microblogging platforms like Twitter for political deliberation, making full use of the features offered for discussions and social networking. At the same time, politicians and political parties hop on the bandwagon, using Twitter to reach a larger audience and communicate to constituents. As is the case for blogs, the political Twittersphere is fragmented along party lines, but stimulates communication between different ideological clusters. The publicly available discussions on Twitter can serve as a basis for election forecasts and have the potential to complement opinion polls and prediction markets in the future.


2012 ◽  
pp. 1010-1017
Author(s):  
Seong-Jae Min

The democratic divide, or the political participation gap in cyberspace, raises a critical social question as it suggests that new communication technologies, which are expected to contribute to the development of all humans, actually widen the political inequalities among different segments of people. Studies of the democratic divide show that human behavior in cyberspace is not equal, as individuals possess different levels of digital literacy and political motivation. The democratic divide will likely persist in a variety of forms.


2012 ◽  
pp. 960-975
Author(s):  
Yuriko Sasaki ◽  
Jon Hobbs

Internet safety has become a great concern in daily life. This entry provides information about Internet safety in terms of: (1) psychological well-being; (2) online privacy; (3) cyberbullying; and (4) exposure to sexual content. As part of the narrative, the authors discuss problematic Internet use, online communication and psychological factors, breaches of online privacy, privacy concerns, privacy protection behaviors (online privacy), cyberbullying (Internet harassment), online pornography, and sexual offenders. For each topic, the authords identify factors that are related to Internet safety and the potential for harm in online and offline contexts.


2012 ◽  
pp. 944-959 ◽  
Author(s):  
Stepan Konecny

Mass media often presents a warped image of the Internet as an unreliable environment in which nobody can be trusted. In this entry, the authors describe lying on the Internet both in the context of lying in the real world and with respect to the special properties of computer-mediated communication (CMC). They deal with the most frequent motives for lying online, such as increasing one’s attractiveness or experimenting with identities. They also take into account the various environments of the Internet and their individual effects on various properties of lying. The current methods for detecting lies and the potential for future computer-linguistic analysis of hints for lying in electronic communication are also considered.


2012 ◽  
pp. 931-943
Author(s):  
Michael Bachmann ◽  
Brittany Smith

This article provides an introduction into the topic of Internet fraud. A precise definition and detailed descriptions of the most prevalent Internet fraud schemes are provided. The entry presents a history of frauds committed on the Internet and introduces the leading scholars on the subject. Predominant areas of research are discussed, and future directions of the problem of Internet fraud schemes are outlined. The entry concludes with a critique of current limitations and advancements needed to better address the increasing problem of online frauds.


Sign in / Sign up

Export Citation Format

Share Document