{"title":"Geographische Entwicklungsmuster von Netzwerken der Ver- und Entsorgung","authors":"U. Koppitz","doi":"10.14361/9783839409800-006","DOIUrl":"https://doi.org/10.14361/9783839409800-006","url":null,"abstract":"","PeriodicalId":14527,"journal":{"name":"IT-Sicherheit für TCP/IP- und IoT-Netzwerke","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73962790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ein verborgenes internationales Netzwerk: Der synthetische Darwinismus","authors":"T. Junker","doi":"10.14361/9783839409800-009","DOIUrl":"https://doi.org/10.14361/9783839409800-009","url":null,"abstract":"","PeriodicalId":14527,"journal":{"name":"IT-Sicherheit für TCP/IP- und IoT-Netzwerke","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88994576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Der Austausch von Wissen und die rekonstruktive Visualisierung formeller und informeller Denkkollektive","authors":"H. Fangerau","doi":"10.14361/9783839409800-010","DOIUrl":"https://doi.org/10.14361/9783839409800-010","url":null,"abstract":"","PeriodicalId":14527,"journal":{"name":"IT-Sicherheit für TCP/IP- und IoT-Netzwerke","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90670090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Das Internet als Netzwerk des Wissens. Zur Dynamik und Qualität von spontanen Wissensordnungen im Web 2.0","authors":"Hans-Jürgen Bucher","doi":"10.14361/9783839409800-007","DOIUrl":"https://doi.org/10.14361/9783839409800-007","url":null,"abstract":"»Was wir über unsere Gesellschaft, ja über die Welt, in der wir leben wissen, wissen wir durch die Massenmedien«. Dieser erste, scheinbar banale Satz in Luhmanns berühmter Abhandlung über die »Realität der Massenmedien«1 beinhaltet bei genauerer Betrachtung ein umfangreiches Forschungsprogramm, das gleichermaßen wissenssoziologisch und medienwissenschaftlich ist. Ohne dass es immer explizit thematisiert wurde, sind die Medienund Kommunikationswissenschaften beispielsweise in der Nachrichtenforschung, der Analyse der Wissenschaftsberichterstattung und in der Rezeptionsforschung diesem Forschungsprogramm auch nachgekommen. Die Rolle, die das neueste Medium, nämlich das Internet, in der Wissensökonomie einer Gesellschaft spielt, ist bislang allerdings unterbelichtet geblieben2. Ein Grund dafür liegt in der neuartigen Kommunikationsstruktur dieses Mediums, das sich grundsätzlich von den traditionellen Distributionsmedien unterscheidet. Während Hörfunk, Fernsehen und Zeitungen als Push-Medien Information an ein disparates Publikum verteilen, ist das Internet ein Many-to-Many-Pull-Medium, in dem sich die Nutzer","PeriodicalId":14527,"journal":{"name":"IT-Sicherheit für TCP/IP- und IoT-Netzwerke","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91334244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Netzwerke – Eine allgemeine Theorie oder die Anwendung einer Universalmetapher in den Wissenschaf ten?","authors":"T. Halling, H. Fangerau","doi":"10.14361/9783839409800-012","DOIUrl":"https://doi.org/10.14361/9783839409800-012","url":null,"abstract":"","PeriodicalId":14527,"journal":{"name":"IT-Sicherheit für TCP/IP- und IoT-Netzwerke","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76782474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"I. Netzwerkpraxis","authors":"","doi":"10.1515/9783839403655-001","DOIUrl":"https://doi.org/10.1515/9783839403655-001","url":null,"abstract":"","PeriodicalId":14527,"journal":{"name":"IT-Sicherheit für TCP/IP- und IoT-Netzwerke","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80196609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frontmatter","authors":"","doi":"10.1515/9783839403655-fm","DOIUrl":"https://doi.org/10.1515/9783839403655-fm","url":null,"abstract":"","PeriodicalId":14527,"journal":{"name":"IT-Sicherheit für TCP/IP- und IoT-Netzwerke","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83368493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Abbildungsverzeichnis","authors":"","doi":"10.1515/9783839403655-006","DOIUrl":"https://doi.org/10.1515/9783839403655-006","url":null,"abstract":"","PeriodicalId":14527,"journal":{"name":"IT-Sicherheit für TCP/IP- und IoT-Netzwerke","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83586787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Backmatter","authors":"","doi":"10.1515/9783839403655-bm","DOIUrl":"https://doi.org/10.1515/9783839403655-bm","url":null,"abstract":"","PeriodicalId":14527,"journal":{"name":"IT-Sicherheit für TCP/IP- und IoT-Netzwerke","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73055701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"III. Netzwerktheorie","authors":"","doi":"10.1515/9783839403655-003","DOIUrl":"https://doi.org/10.1515/9783839403655-003","url":null,"abstract":"","PeriodicalId":14527,"journal":{"name":"IT-Sicherheit für TCP/IP- und IoT-Netzwerke","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87022961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}