Cyber Behavior: Concepts, Methodologies, Tools, and Applications, 1st Edition

  • Published By:
  • ISBN-10: 1466659432
  • ISBN-13: 9781466659438
  • DDC: 303.48
  • Grade Level Range: College Freshman - College Senior
  • 2300 Pages | eBook
  • Original Copyright 2014 | Published/Released September 2014
  • This publication's content originally published in print form: 2014

  • Price:  Sign in for price



Following the migration of workflows, data, and communication to the Cloud and other Internet-based frameworks, interaction over the Web has become ever more commonplace. As with any social situation, there are rules and consequences to actions within a virtual environment. Cyber Behavior: Concepts, Methodologies, Tools, and Applications explores the role of cyberspace in modern communication and interaction, including considerations of ethics, crime, security, and education. With chapters on a variety of topics and concerns inherent to a contemporary networked society, this multi-volume work will be of particular interest to students and academicians, as well as software developers, computer scientists, and specialists in the field of Information Technologies.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
List of Contributors.
Table of Contents.
1: Fundamental Concepts and Theories.
2: Communication and Collaboration in a Web 2.0 World.
3: Knowledge Sharing in the Age of Web 2.0: A Social Capital Perspective.
4: Redefining Participation in Online Community: Some Neglected Topics.
5: Cyber Identity: Our Alter-Ego?.
6: Communities, Communication, and Online Identities.
7: Social Network Citizenship.
8: Web 2.0 as a Foundation for Social Media Marketing: Global Perspectives and the Local Case of Croatia.
9: The Creation and Management of Online Brand Communities.
10: Intelligence in Web Technology.
11: Social Networking, Cyber Bullying, and the Role of Community Education.
12: Cyberbullying: The Bad and the Ugly Side of Information Age.
13: Cyber Criminals on the Internet Super Highways: A Technical Investigation of Different Shades and Colours within the Nigerian Cyber Space.
14: What is Cyberterrorism and How Real is the Threat? A Review of the Academic Literature, 1996 – 2009.
15: A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict.
16: Development and Design Methodologies.
17: Cyber Risks in Energy Grid ICT Infrastructures.
18: Safeguarding Australia from Cyber-Terrorism: A SCADA Risk Framework.
19: Distributed Monitoring: A Framework for Securing Data Acquisition.
20: An Alternative Framework for Research on Situational Awareness in Computer Network Defense.
21: Toward an Understanding of Online Community Participation through Narrative Network Analysis.
22: Virtual Communities of Practice as a Support for Knowledge Sharing in Social Networks.
23: Semantically Linking Virtual Communities.
24: E-Infrastructures for International Cooperation.
25: Designing and Implementing Online Collaboration Tools in West Africa.
26: A Framework for Government 2.0 Development and Implementation: The Case of U.S. Federal Government.
27: Cyber-Search and Cyber-Seizure: Policy Considerations of Cyber Operations and Fourth Amendment Implications.
28: Creating an Emotionally Resilient Virtual and On-Campus Student Community at K-State through the University Life Café: A Case Study about Understanding the Users of a Socio-Technical Space.
1: Competencies 2.0: A Theoretical Model for Defining and Managing a Presence Plan on the Web.
2: Tools and Technologies.
3: Web 2.0 Open Remote and Virtual Laboratories in Engineering Education.
4: Mobile Web 2.0 Integration.
5: Virtual Learning Communities: Interaction in Blended Learning Using Web 2.0 Tools.
6: Virtual Collaborative Learning: Opportunities and Challenges of Web 2.0-Based E-Learning Arrangements for Developing Countries.
7: Analyzing Critical Functions of Recording Tools for Synchronous Cyber Classroom Instruction.
8: Individual E-Portfolios: Can a Classic Tool for Teachers and Students be Merged with Web 2.0 Tools for Reflective Learning?.
9: An E-Portfolio to Support E-Learning 2.0.
10: The Meeting Point of Second Life® and Web 2.0: Self-Discovery for Writing.
11: Virtual World Avatar Branding.
12: Application of Collaborative Technologies: Enterprise 2.0 in Virtual Enterprise Context.
13: Technological Support for Online Communities Focusing on Music Creation: Adopting Collaboration, Flexibility, and Multiculturality from Brazilian Creativity Styles.
14: Web 2.0 Technologies and Authentic Public Participation: Engaging Citizens in Decision Making Processes.
15: China's Cyber Tool: Striving to Attain Electronic Shi?.
16: Tracking Public Participation in Urban Governance: Democracy and Data Privacy.
17: Botnets and Cyber Security: Battling Online Threats.
18: Utilization and Application.
19: Cyber Command and Control: A Military Doctrinal Perspective on Collaborative Situation Awareness for Decision Making.
20: Using Web 2.0 as a Community Policing Strategy: An Examination of the United States Municipal Police Departments.
21: Security and Privacy Issues in E-Government.
22: The Use of Internet by Diasporic Communities for Political Mobilization.
23: Towards E-Government Information Platforms for Enterprise 2.0.
24: E-Marketing on Online Social Networks and Ethical Issues.
25: Application of Social Media Tools by Retailers.
26: Using Web 2.0 Features on Social Networks for Word-of-Mouth Effects.
27: An Innovative Approach to Enhance Collaboration in the Biomedical Field.
28: Social Networking in Academic Libraries: A State-of-the-Art Review of Web 2.0 Library Applications, Issues, and Concerns.
29: Norms, Practices, and Rules of Virtual Community of Online Gamers: Applying the Institutional Theoretical Lens.
30: A Distributed Community of Practice to Facilitate Communication, Collaboration, and Learning among Faculty.
1: Web 2.0 for Language Learning: Benefits and Challenges for Educators.
2: Digital Storytelling with Web 2.0 Tools for Collaborative Learning.
3: Organizational and Social Implications.
4: Student Mentors in Physical and Virtual Learning Spaces.
5: The Continued Use of a Virtual Community: An Information Adoption Perspective.
6: E-Behaviour Trends and Patterns among Malaysian Pre-Adolescents and Adolescents.
7: Wikipedia's Success and the Rise of the Amateur-Expert.
8: Virtual Communities as Contributors for Digital Objects Metadata Generation.
9: Mindclone Technoselves: Multi-Substrate Legal Identities, Cyber-Psychology, and Biocyberethics.
10: Web 2.0, the Individual, and the Organization: Privacy, Confidentiality, and Compliance.
11: Identification vs. Self-Verification in Virtual Communities (VC): Theoretical Gaps and Design Implications.
12: Human Rights, the Global War on Transnational Terror, and the Mixed Roles of ICT: A Meta-Analysis.
13: Cyber-Bullying, Personality and Coping among Pre-Adolescents.
14: Virtual Hate Communities in the 21st Century.
15: When the Virtual and the Real Clash: Power and Politics in a Social Networking Community.
16: From Town Hall to the Virtual Community: Engaging the Public with Web 2.0 and Social Media Applications.
17: Users' Involvement in the Innovation Process through Web 2.0: A Framework for Involvement Analysis in a Brazilian Automotive Company.
18: Managerial Impact.
19: The Pedagogical Considerations in the Design of Virtual Worlds for Organization Learning.
20: Organizational Learning and Web 2.0 Technologies: Improving the Planning and Organization of a Software Development Process.
21: Meeting Them Halfway: Using Social Networking to Connect with Students.
22: The Web 2.0 Mandate for a Transition from Webmaster to Wiki Master.
23: US Cities and Social Networking: A Focus on City Websites and Mayors.
24: Improving CRM 2.0 through Collective Intelligence by Using CBIR Algorithms.
25: A Framework for Customer Knowledge Management Based on Social Semantic Web: A Hotel Sector Approach.
26: Exploiting Technological Potentialities for Collaborative New Product Development.
27: Usability Impact Analysis of Collaborative Environments.
28: Capturing Tacit Knowledge within Business Simulation Games.
29: The Community Manager and Social Media Networks: The Case of Local Governments in Spain.
30: An Approach to Governance of CyberSecurity in South Africa.
1: Al-Qaeda on Web 2.0: Radicalization and Recruitment Strategies.
2: Critical Issues.
3: Model-Based Evaluation of the Impact of Attacks to the Telecommunication Service of the Electrical Grid.
4: The Role of Web 2.0 in the Arab Spring.
5: The Use and Abuse of Digital Democracy: Case Study of
6: Are ICT/Web 2.0 Tools Influencing Civic Engagement in Modern Democracies? An Exploratory Analysis from India.
7: Studying Web 2.0 Interactivity: A Research Framework and Two Case Studies.
8: Empirical Study of Cyber Harassment among Social Networks.
9: A Study of the Predictive Relationship between Online Social Presence and ONLE Interaction.
10: The Role of Social Networking Sites for Language Learning in UK Higher Education: The Views of Learners and Practitioners.
11: Toward an Infrastructural Approach to Understanding Participation in Virtual Communities.
12: An Examination of the Factors Influencing Consumers' Visit of C2C Websites.
13: Understanding Brand Implication and Engagement on Facebook.
14: Virtual Communities in Marketing Processes: A Marketing Framework.
15: Networked Knowledge Workers on the Web: An Examination of US Trends, 2008–2010.
16: Social Net/work(ing) on Facebook: An Analysis of Audiences, Producers, and Immaterial Laborers.
17: Viewing Cybercommunities through the Lens of Modernity: The Case of Second Life.
18: Emerging Trends.
19: Virtual Communities as Subaltern Public Spheres: A Theoretical Development and an Application to the Chinese Internet.
20: Citizens Collaboration and Co-Creation in Public Service Delivery: The COCKPIT Project.
21: Conducting Research in the Cloud.
22: Child Security in Cyberspace through Moral Cognition.
23: A Systemic Approach to Online Sharing Motivations: A Cross-Disciplinary Synthesis of Rhetorical Analysis and Gift Research.
24: The “Right to be Forgotten” in the Era of Social Media and Cloud Computing.
25: Law and Technology at Crossroads in Cyberspace: Where Do We Go From Here?.
26: Motivating Cybersecurity: Assessing the Status of Critical Infrastructure as an Object of Cyber Threats.
27: Advancing Cyber Resilience Analysis with Performance-Based Metrics from Infrastructure Assessments.
28: Abstract Service for Cyber Physical Service Composition.
29: Threats to the Critical Information Infrastructure Protection (CIIP) Posed by Modern Terrorism.
30: Using Hybrid Attack Graphs to Model and Analyze Attacks against the Critical Information Infrastructure.