Cyber Behavior: Concepts, Methodologies, Tools, and Applications
Cyber Behavior: Concepts, Methodologies, Tools, and Applications
Editor: Information Resources Management Association
Publication Year: 2014
Publisher: IGI Global
Single-User Purchase Price:
$2250.00

Unlimited-User Purchase Price:
$3375.00
ISBN: 978-1-4666-5942-1
Category: Technology & Engineering - Technology
Image Count:
329
Book Status: Available
Table of Contents
Cyber Behavior: Concepts, Methodologies, Tools, and Applications explores the role of cyberspace in modern communication and interaction, including considerations of ethics, crime, security, and education. With chapters on a variety of topics and concerns inherent to a contemporary networked society, this multi-volume work will be of particular interest to students and academicians, as well as software developers, computer scientists, and specialists in the field of Information Technologies.
Table of Contents
- Editorial Advisory Board and List of Reviewers
- Preface
- Section 1: Fundamental Concepts and Theories
- Chapter 1: Communication and Collaboration in a Web 2.0 World
- Chapter 2: Knowledge Sharing in the Age of Web 2.0
- Chapter 3: Redefining Participation in Online Community
- Chapter 4: Cyber Identity
- Chapter 5: Communities, Communication, and Online Identities
- Chapter 6: Social Network Citizenship
- Chapter 7: Web 2.0 as a Foundation for Social Media Marketing
- Chapter 8: The Creation and Management of Online Brand Communities
- Chapter 9: Intelligence in Web Technology
- Chapter 10: Social Networking, Cyber Bullying, and the Role of Community Education
- Chapter 11: Cyberbullying
- Chapter 12: Cyber Criminals on the Internet Super Highways
- Chapter 13: What is Cyberterrorism and How Real is the Threat?
- Chapter 14: A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict
- Section 2: Development and Design Methodologies
- Chapter 15: Cyber Risks in Energy Grid ICT Infrastructures
- Chapter 16: Safeguarding Australia from Cyber-Terrorism
- Chapter 17: Distributed Monitoring
- Chapter 18: An Alternative Framework for Research on Situational Awareness in Computer Network Defense
- Chapter 19: Toward an Understanding of Online Community Participation through Narrative Network Analysis
- Chapter 20: Virtual Communities of Practice as a Support for Knowledge Sharing in Social Networks
- Chapter 21: Semantically Linking Virtual Communities
- Chapter 22: E-Infrastructures for International Cooperation
- Chapter 23: Designing and Implementing Online Collaboration Tools in West Africa
- Chapter 24: A Framework for Government 2.0 Development and Implementation
- Chapter 25: Cyber-Search and Cyber-Seizure
- Chapter 26: Creating an Emotionally Resilient Virtual and On-Campus Student Community at K-State through the University Life Café
- Chapter 27: Competencies 2.0
- Section 3: Tools and Technologies
- Chapter 28: Web 2.0 Open Remote and Virtual Laboratories in Engineering Education
- Chapter 29: Mobile Web 2.0 Integration
- Chapter 30: Virtual Learning Communities
- Chapter 31: Virtual Collaborative Learning
- Chapter 32: Analyzing Critical Functions of Recording Tools for Synchronous Cyber Classroom Instruction
- Chapter 33: Individual E-Portfolios
- Chapter 34: An E-Portfolio to Support E-Learning 2.0
- Chapter 35: The Meeting Point of Second Life® and Web 2.0
- Chapter 36: Virtual World Avatar Branding
- Chapter 37: Application of Collaborative Technologies
- Chapter 38: Technological Support for Online Communities Focusing on Music Creation
- Chapter 39: Web 2.0 Technologies and Authentic Public Participation
- Chapter 40: China's Cyber Tool
- Chapter 41: Tracking Public Participation in Urban Governance
- Chapter 42: Botnets and Cyber Security
- Section 4: Utilization and Application
- Chapter 43: Cyber Command and Control
- Chapter 44: Using Web 2.0 as a Community Policing Strategy
- Chapter 45: Security and Privacy Issues in E-Government
- Chapter 46: The Use of Internet by Diasporic Communities for Political Mobilization
- Chapter 47: Towards E-Government Information Platforms for Enterprise 2.0
- Chapter 48: E-Marketing on Online Social Networks and Ethical Issues
- Chapter 49: Application of Social Media Tools by Retailers
- Chapter 50: Using Web 2.0 Features on Social Networks for Word-of-Mouth Effects
- Chapter 51: An Innovative Approach to Enhance Collaboration in the Biomedical Field
- Chapter 52: Social Networking in Academic Libraries
- Chapter 53: Norms, Practices, and Rules of Virtual Community of Online Gamers
- Chapter 54: A Distributed Community of Practice to Facilitate Communication, Collaboration, and Learning among Faculty
- Chapter 55: Web 2.0 for Language Learning
- Chapter 56: Digital Storytelling with Web 2.0 Tools for Collaborative Learning
- Section 5: Organizational and Social Implications
- Chapter 57: Student Mentors in Physical and Virtual Learning Spaces
- Chapter 58: The Continued Use of a Virtual Community
- Chapter 59: E-Behaviour Trends and Patterns among Malaysian Pre-Adolescents and Adolescents
- Chapter 60: Wikipedia's Success and the Rise of the Amateur-Expert
- Chapter 61: Virtual Communities as Contributors for Digital Objects Metadata Generation
- Chapter 62: Mindclone Technoselves
- Chapter 63: Web 2.0, the Individual, and the Organization
- Chapter 64: Identification vs. Self-Verification in Virtual Communities (VC)
- Chapter 65: Human Rights, the Global War on Transnational Terror, and the Mixed Roles of ICT
- Chapter 66: Cyber-Bullying, Personality and Coping among Pre-Adolescents
- Chapter 67: Virtual Hate Communities in the 21st Century
- Chapter 68: When the Virtual and the Real Clash
- Chapter 69: From Town Hall to the Virtual Community
- Chapter 70: Users’ Involvement in the Innovation Process through Web 2.0
- Section 6: Managerial Impact
- Chapter 71: The Pedagogical Considerations in the Design of Virtual Worlds for Organization Learning
- Chapter 72: Organizational Learning and Web 2.0 Technologies
- Chapter 73: Meeting Them Halfway
- Chapter 74: The Web 2.0 Mandate for a Transition from Webmaster to Wiki Master
- Chapter 75: US Cities and Social Networking
- Chapter 76: Improving CRM 2.0 through Collective Intelligence by Using CBIR Algorithms
- Chapter 77: A Framework for Customer Knowledge Management based on Social Semantic Web
- Chapter 78: Exploiting Technological Potentialities for Collaborative New Product Development
- Chapter 79: Usability Impact Analysis of Collaborative Environments
- Chapter 80: Capturing Tacit Knowledge within Business Simulation Games
- Chapter 81: The Community Manager and Social Media Networks
- Chapter 82: An Approach to Governance of CyberSecurity in South Africa
- Chapter 83: Al-Qaeda on Web 2.0
- Section 7: Critical Issues
- Chapter 84: Model-Based Evaluation of the Impact of Attacks to the Telecommunication Service of the Electrical Grid
- Chapter 85: The Role of Web 2.0 in the Arab Spring
- Chapter 86: The Use and Abuse of Digital Democracy
- Chapter 87: Are ICT/Web 2.0 Tools Influencing Civic Engagement in Modern Democracies?
- Chapter 88: Studying Web 2.0 Interactivity
- Chapter 89: Empirical Study of Cyber Harassment among Social Networks
- Chapter 90: A Study of the Predictive Relationship between Online Social Presence and ONLE Interaction
- Chapter 91: The Role of Social Networking Sites for Language Learning in UK Higher Education
- Chapter 92: Toward an Infrastructural Approach to Understanding Participation in Virtual Communities
- Chapter 93: An Examination of the Factors Influencing Consumers’ Visit of C2C Websites
- Chapter 94: Understanding Brand Implication and Engagement on Facebook
- Chapter 95: Virtual Communities in Marketing Processes
- Chapter 96: Networked Knowledge Workers on the Web
- Chapter 97: Social Net/work(ing) on Facebook
- Chapter 98: Viewing Cybercommunities through the Lens of Modernity
- Section 8: Emerging Trends
- Chapter 99: Virtual Communities as Subaltern Public Spheres
- Chapter 100: Citizens Collaboration and Co-Creation in Public Service Delivery
- Chapter 101: Conducting Research in the Cloud
- Chapter 102: Child Security in Cyberspace through Moral Cognition
- Chapter 103: A Systemic Approach to Online Sharing Motivations
- Chapter 104: The “Right to be Forgotten” in the Era of Social Media and Cloud Computing
- Chapter 105: Law and Technology at Crossroads in Cyberspace
- Chapter 106: Motivating Cybersecurity
- Chapter 107: Advancing Cyber Resilience Analysis with Performance-Based Metrics from Infrastructure Assessments
- Chapter 108: Abstract Service for Cyber Physical Service Composition
- Chapter 109: Threats to the Critical Information Infrastructure Protection (CIIP) Posed by Modern Terrorism
- Chapter 110: Using Hybrid Attack Graphs to Model and Analyze Attacks against the Critical Information Infrastructure