Query : cyberespace
- Bakis, Henry2
- Corey, Kenneth E.2
- Douzet, Frédérick2
- Guy, Bernard2
- Henri Desbois2
- Henry Bakis2
- Joubert, Vincent2
- Koch, Andreas2
- Pierre Lévy2
- Samaan, Jean-Loup2
- Wilson, Mark I.2
- Alava, Séraphin1
- Alix Desforges1
- Alliot, Julien1
- Amal Bou Hachem1
- Ana Carelli1
- Ana Esmeralda Carelli1
- André Lemos1
- Anne Sophie Voyer1
- Arai, Yoshio1
- Communication Sciences23
- History, Philosophy and Sociology of Sciences14
- Social Anthropology and Ethnology11
- Political Science10
- Art and Art History9
- Archaeology and Prehistory5
- Architecture and Space Management4
- Economies and Finances4
- Musicology and Performing Arts4
- Gender Studies3
- Classical Studies2
- Cultural Heritage and Museology2
- Methods and Statistics1
Law and technology: to reconcile the irreconcilable situation? Epistemological reflections for a right to technological freedoms
The myth of cyberspace as a zone of lawlessness has lived! Since the 1978 Law on Informatics and Freedoms, the interaction between law and new technologies has given rise to a genuine network of standards that are constantly changing and cross all traditional legal categories. The balance is mixed,...
Intergovernmentality in cyberspace: a comparative study of Otan and EU initiatives
While cyberspace has become an indispensable subject of international diplomatic agendas, there are few studies dedicated to analysing the adaptation of international organisations, particularly European ones, to this phenomenon. This article thus provides a comparative study of the bureaucratic, in...
Cyber Remembrance Theatres
While it is an area where modernity joins history, it is the field of remembrance theatres. The art of remembrance, a discipline taught in Greek Antiquity and then Roman and used by speakers to remember their texts, consisted of mentally building remembrance theatres. Memorial theatres are mental re...
The European Union, a growing cyber power? Reflection on European cyber defence
This article looks at how the European Union (EU) is developing a cyber defence strategy and tools in recent years. In an increasingly connected world, how does the EU see its role in cyberspace? How do European cyber defence initiatives translate the ambiguous relationship of the EU to the notion o...
Protection of personal data and cyber (in) security
As human and objects interconnect, the protection of privacy decreases. Net companies live from the exploitation of individual mass data. States are moving away from the usual rules for collecting data in order to combat terrorism and crime. Legal arrangements do not ensure a balance between securit...
Cyberspace, this full-fledged confrontation space
How to define cyberspace? Is this term, the francisation of the English word cyberspace, often referred to as a hashtag, buzzword, anything other than the opportunistic contraction of two words: “Cyber” and “Space”? It is a space created by humans to communicate, exchange and make their senses work:...
B to C contract challenged by new information and communication technologies
The development of new technologies has had a considerable impact on society. The rise of the Internet and the technological revolution have created cyberspace, in which borders are non-existent. The opening of e-shops to the outside world, the development of the free digital economy and the forced...
Debriefing on the book “Territories and Cyberespace 2030”
Des cités hallucinées à la grille invisible, William Gibson et les métamorphoses du cyberespace
The influence of William Gibson has been of the utmost importance in crafting and spreading many popular imaginaries associated with digital technologies. In his first novels, cyberspace is at the same time a narrative trick to depict a global computer network and an element of a more global investi...
Representação e memória no ciberespaço Representation and memory in the cyberespace
Sendo a memória objeto de estudo de várias áreas e possuindo vários atributos, a categoria "preservação" é a mais utilizada pela ciência da informação no tocante à compreensão desse objeto. Entretanto, no ciberespaço, a preservação parece não estar muito fortemente ligada à inteligibilidade da memór...
Cave Canem or attention to the dog?
at this time wireless technology allows for extreme freedom of use for nomadic users by ensuring the continuity of services both efficiently and economically via suitable, reliable and relatively cheap terminals. Looking for a Wi-Fi access point will therefore see, next to the names of the various o...
Travel to Chernivtsi or back to Czernowitz?
RÉSUMÉ: Root tourism, which has grown particularly well in the last decade, has an identity quest function linked to the nostalgia of places of childhood. This article refers to experiences of returning to Czernowitz, the capital of the North Bucovine, now Chernivtsi in Ukraine, and tries to show wh...
NATO’s cyber proof strategic evolution
In the age of the digital revolution, NATO is slow to reveal a cyber strategy that can effectively respond to the diversity of cyber-attacks affecting its Member States on a daily basis. Over the last decade, the Atlantic Alliance has demonstrated an awareness of cyber threats through the rapid deve...
Freight flows and information flows, road freight transport production area (s)
Lombard Jerôme, Mauny Pascal. Freight flows and information flows, road freight transport production area (s). In: NETCOM: Networks, Communication and Territories/Networks and Communication Studies, Vol. 11 No 2, December 1997. Miscellaneous papers (II). From the IGU Meeting, Palma (Spain), 26-29 Ma...
The content of the reliability standard for electronic means of signature
The legal institutions have been built around the realities that have been known for millennia, which we nowadays call real world phenomena. These phenomena are now returning to a new theatre — cyberspace, and rules of law are facing the challenge of taking ownership of this new environment. Among o...
In today’s Poland, the changing patterns of civic and political engagement are taking place in particular among younger generations. Among the new experiences of political participation, new information and communication technologies offer radical opportunities to reshape the public space. Polish yo...
Educating digitally: the situation is urgent!
Olivier Ertzscheid, lecturer at the University of Nantes, published an article in Le Monde in April entitled ‘And if we really teach digital?’. After the hope of the possibilities offered by the web (see John Perry Barlow’s declaration of independence in cyberspace in 1996), the author believes that...
The role of ICT in Arab spring movements
Over the past 25 years, social movements have actively sought out and used new information and communication technologies (ICT), such as the Internet and mobile phones, to give voice to their concerns. The growth of access and use of ICT in the Middle East and North Africa provided resources for pro...
Religious practice on the world wide web: an original experience of the norm
International audience In continuation of studies on the practices of the sacred in the World Wide Web, we propose in this paper a hypothesis that seems not only relevant but also essential to approach this problem, whatever the theme or the angle considered. The hypothesis is the following: any sac...
History and journalism at the threshold of cyberspace
Black Calepin or IT gadgets by hand, the journalist sketches the first tips of the history that will be written tomorrow. According to a good tradition, a number of journalists have become accustomed, here and elsewhere, to signing books where history finds its part. This journalist’s contribution t...
In a context of increased dependence on IT tools and global interconnection of systems, cyber piracy has become a major security challenge for states. As on other fronts, China’s rise in this area is a cause for concern. Denial of service attacks by boots, phishing, spam, scams, scams, scams, etc. p...
Comments on the Tallinn Manuals (1.0 and 2.0) and the international law applicable to cyber operations
Do digital means are no longer merely complementary to threats. They are increasingly used as direct means of attacks that can lead to material destruction. How to deal with? The origins of the Tallinn Manuals make it possible to highlight the relevance of the method adopted — that of ‘soft law’ — t...
Sex tourism and virtuality: Travelling in cyberspace
Something Old, Something New: Addressing Technological Innovation Through the Lens of Time Quelque chose de neuf, quelque chose de vieux: envisager l'innovation technologique au regard de sa dimension temporelle
New technologies do not always raise new legal issues. We should therefore focus on technological change rather than discussing new technologies. What is new in time might not be new in kind. Filiation between outer space law and cyberspace law illustrates well this argument. Acknowledging historica...
Study of the formation of electronic contract, comparison between French law and Moroccan law
The e-commerce business is usually embodied in a traditional legal tool made available to economic actors by the law: the contract. This one is usually signed from afar. Thus it is dematerialized. In addition, there is the possibility of depersonalization and internationalization thanks to the abili...