Cybercodification and invisible documentation of the population

Download
2002
Topal, Çağatay

Suggestions

Cyberbullying and its correlation to traditional bullying, gender and frequent and risky usage of internet-mediated communication tools
Erdur Baker, Özgür (2010-02-01)
This study examined the relationships between cyber and traditional bullying experiences regarding gender differences. Also, the contributions of frequent and risky usage of internet to cyberbullying experiences were examined. The participants were 276 adolescents (123 females, 151 males and 2 unknown) ranging in age from 14 to 18 years. The results revealed that 32 percent of the students were victims of both cyber and traditional bullying, while 26 percent of the students bullied others in both cyber and ...
Cyber Bullying @ Schools: What do Turkish Adolescents Think?
Topcu, Çiǧdem; Yıldırım, Ali; Erdur Baker, Özgür (2013-01-01)
Cyber bullying is an emerging form of peer bullying, becoming prominent especially over the past decade. The aim of this study was to investigate through interviews the perceptions of Turkish high school students about cyber bullying. The sample consisted of six male and one female high school students all aged 15 years who identified as being active in cyber bullying. Findings were grouped under four main headings; acts of cyber bullying, reasons for cyber bullying, characteristics of cyber bullies and vic...
Cyber Bullying in Turkey Its Correlates and Links to Depressive Symptoms
Erdur Baker, Özgür (2009-01-01)
Cyber Security by a New Analogy: "The Allegory of the 'Mobile'Cave"
Canbek, Gurol (Informa UK Limited, 2018-01-01)
Mobile devices as the most pervasive technology enablers also bring new security risks in cyberspace. However, related cyber security studies mainly focus on technologies and practices rather than fundamentals and root causes. These studies may also omit the current scientific knowledge gained on other relevant or irrelevant domains that may be adapted to cyber security and ignore human nature that is more important than technology and processes. This study surveys and associates all the analogical methods ...
Cyber Warfare Integration to Conventional Combat Modeling: A Bayesian Framework
Sengul, Zafer; Acartürk, Cengiz (2021-01-01)
© 2021 IEEE.Malware propagation is capable of introducing adverse effects in military operations since today's high-tech military weapons and command, control, and communication systems are essentially interconnected ICT systems. Conventional warfare models have been recently upgraded to include cyber warfare elements to reflect the potential influence of cyber-attacks. In the present study, we propose and evaluate a framework for modeling the integrated effect of the spread of malware through computer netw...
Citation Formats
Ç. Topal, “Cybercodification and invisible documentation of the population,” Middle East Technical University, 2002.