<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE ArticleSet PUBLIC "-//NLM//DTD PubMed 2.7//EN" "https://dtd.nlm.nih.gov/ncbi/pubmed/in/PubMed.dtd">
<ArticleSet>
<Article>
<Journal>
				<PublisherName>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</PublisherName>
				<JournalTitle>Journal of Cyberspace Studies</JournalTitle>
				<Issn>2588-5499</Issn>
				<Volume>10</Volume>
				<Issue>1</Issue>
				<PubDate PubStatus="epublish">
					<Year>2026</Year>
					<Month>01</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Iranian Twitter users' dissatisfaction with the presence of Afghans in Iran; Case study: The Hashtag "#Expel_Afghans_a_National_Demand"</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>1</FirstPage>
			<LastPage>22</LastPage>
			<ELocationID EIdType="pii">102393</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jcss.2025.394677.1144</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Reihaneh</FirstName>
					<LastName>Razmara</LastName>
<Affiliation>Department of Social Communication Sciences, Faculty of Social Sciences, University of Tehran, Tehran, Iran.</Affiliation>

</Author>
<Author>
					<FirstName>Roghayeh</FirstName>
					<LastName>Khosravi</LastName>
<Affiliation>Department of Sociology &amp; Social Planning, Faculty of Economics, Management &amp; Social Sciences, Shiraz University, Shiraz, Iran.</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2025</Year>
					<Month>05</Month>
					<Day>04</Day>
				</PubDate>
			</History>
		<Abstract>&lt;strong&gt;Background:&lt;/strong&gt; Afghans are the main group of migrants in Iran, and in recent years, their presence has been met with negative reactions from the Iranian public. For example, recently on Twitter, hashtags such as &lt;strong&gt;#Expel_Afghans_a_National_Demand (in Persian: &lt;/strong&gt;&lt;strong&gt;#&lt;/strong&gt;&lt;strong&gt;اخراج_افغانی_مطالبه_ملی&lt;/strong&gt;&lt;strong&gt;)&lt;/strong&gt; have been widely used by Iranian users.&lt;br /&gt;&lt;strong&gt;Aims: &lt;/strong&gt;This study aims to examine Iranian users&#039; perspectives on Afghans by analyzing tweets written with this hashtag about Afghans living in Iran.&lt;br /&gt;&lt;strong&gt;Methodology: &lt;/strong&gt;Using thematic analysis, it investigates the negative views expressed by Iranian users. This analysis is based on Bennett’s six-stage model of intercultural sensitivity. The extracted themes from these tweets include five main categories:&lt;strong&gt; &lt;/strong&gt;dissatisfaction with the lifestyle and behaviors of Afghans living in Iran, financial-related dissatisfaction, nationalism-related dissatisfaction, xenophobia-related dissatisfaction, and dissatisfaction due to internal factors.&lt;br /&gt;&lt;strong&gt;Finding:&lt;/strong&gt; The dissatisfaction of Iranians toward Afghans aligns with the &lt;strong&gt;Defense&lt;/strong&gt; stage of Bennett’s model, as this stage is characterized by individuals distinguishing between themselves and others, perceiving their own culture as superior, and viewing other cultures as inferior.&lt;br /&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt; Based on the themes present in the tweets, it seems that some targeted actions can help reduce xenophobia and counter dominant narratives.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Afghan</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">intercultural sensitivity</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Iran</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">migrant</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Twitter</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jcss.ut.ac.ir/article_102393_3c90f3c7ed22eb650bb4ca6be8aef0c6.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</PublisherName>
				<JournalTitle>Journal of Cyberspace Studies</JournalTitle>
				<Issn>2588-5499</Issn>
				<Volume>10</Volume>
				<Issue>1</Issue>
				<PubDate PubStatus="epublish">
					<Year>2026</Year>
					<Month>01</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Modelling procedure while assessing the impact of news articles on cryptocurrency (Bitcoin) market movement</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>23</FirstPage>
			<LastPage>42</LastPage>
			<ELocationID EIdType="pii">102687</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jcss.2025.393177.1139</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Maku T</FirstName>
					<LastName>O</LastName>
<Affiliation>Department of Statistics, Federal University, Otuoke, Nigeria</Affiliation>

</Author>
<Author>
					<FirstName>Monday Osagie</FirstName>
					<LastName>Adenomon</LastName>
<Affiliation>Department of Statistics, Nasarawa State University, Kefi, Nigeria.</Affiliation>

</Author>
<Author>
					<FirstName>Mary U</FirstName>
					<LastName>Adehi</LastName>
<Affiliation>Department of Statistics, Nasarawa State University, Kefi, Nigeria.</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2025</Year>
					<Month>04</Month>
					<Day>09</Day>
				</PubDate>
			</History>
		<Abstract>&lt;strong&gt;Background:&lt;/strong&gt; Cryptocurrencies have a variety of unique qualities, from cutting-edge technology to highly secure architecture. Additionally, the ability to invest in cryptocurrency, as an asset or a function of its prosperity has made crypto-currencies attractive to venture capitalists, computer scientists, and statisticians.&lt;br /&gt;&lt;strong&gt;Aims: &lt;/strong&gt;In this study, we concentrated on a collection of documents web-scrapped from the market section of CNBC, where each document is associated with a response variable.&lt;br /&gt;&lt;strong&gt;Methodology: &lt;/strong&gt;These documents contain preprocessed words/terms of day-to-day reportage on cryptocurrency (Bitcoin). The corresponding response variables are the daily opening and closing price of Bitcoin prices. The Supervised Latent Dirichlet Allocation(sLDA), a statistical model of labeled documents, was used to analyze the textual data alongside their corresponding response variables, since our study aims to predict the response variable for unlabeled new documents.&lt;br /&gt;&lt;strong&gt;Results:&lt;/strong&gt; Hidden Topics with their unique terms from the preprocessed articles were exposed through a Natural language processor. Mean absolute error (MAE), Mean absolute percentage error (MAPE), and Root mean square error (RMSE) graphs were constructed for the sLDA models with ‘k = 3,10,20,30,50,75,100 and 200 Topics’ values where the model with the best evaluation metric, was selected for prediction purpose.&lt;br /&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt; It was discovered that the sLDA model with k = 20. A posterior covariance matrix which shows the proportion of terms from the documents, making up a Topic. Coefficient values were generated in other to graphically visualize how important the discovered topics are and how they affect the market trend. Finally, the prediction of new labels (numeric-decoded closing prices) for the unlabeled documents was done and comparisons were made; the predicted labels follow a similar pattern to that of the time series closing price trend.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Bitcoin</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">CNBC’s market section website</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">LDA</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Prediction</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">sLDA</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Topic modelling</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jcss.ut.ac.ir/article_102687_29bfce847dba6472b11d18da79be940b.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</PublisherName>
				<JournalTitle>Journal of Cyberspace Studies</JournalTitle>
				<Issn>2588-5499</Issn>
				<Volume>10</Volume>
				<Issue>1</Issue>
				<PubDate PubStatus="epublish">
					<Year>2026</Year>
					<Month>01</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Pink or Green? Evaluating gendered color differences in cyberspace multi-level marketing advertisements</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>43</FirstPage>
			<LastPage>60</LastPage>
			<ELocationID EIdType="pii">102718</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jcss.2025.396344.1170</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Elizabeth</FirstName>
					<LastName>Zak</LastName>
<Affiliation>Department of Computer Science, Carthage College, Wisconsin, USA.</Affiliation>
<Identifier Source="ORCID">0000-0003-0021-0027</Identifier>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2025</Year>
					<Month>05</Month>
					<Day>31</Day>
				</PubDate>
			</History>
		<Abstract>&lt;strong&gt;Background:&lt;/strong&gt; Economic misinformation may result in people making poor financial choices. Multi-level marketing organizations often target women as potential salespeople. The majority of multi-level marketing organizations are predatory. Oftentimes, their online promotion effectively reaches people.&lt;br /&gt;&lt;strong&gt;Aims: &lt;/strong&gt;In order to better identify the differences in color used in online advertisements for multi-level marketing organizations, I chose to explore whether health multi-level marketing organization advertisements had colors that corresponded with traditional gender norms or traditional health advertisements.&lt;br /&gt;&lt;strong&gt;Methodology: &lt;/strong&gt;I obtained and analyzed exclusively online advertisements for multi-level marketing organizations. I found that there was indeed a difference in both color and brightness between organizations that targeted men and organizations that targeted women.&lt;br /&gt;&lt;strong&gt;Results:&lt;/strong&gt; Health multi-level marketing organizations pose a unique danger. Specifically, they promote both economic and health misinformation. Not only do these organizations recruit people to sell products using spurious techniques, but in many cases, these products may be directly harmful to consumers’ health. As a result, more insight into detecting a health multi-level marketing advertisement is necessary.&lt;br /&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt; Color is a major element in advertisements. Specifically, distinct colors may be used in advertisements that target different genders. Understanding the differences in multi-level marketing advertisement colors is important: if consumers can identify which organizations are multi-level marketing companies, they will distrust the advertisements.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">health misinformation</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Online Advertising</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Visual Culture</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">visual misinformation</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jcss.ut.ac.ir/article_102718_df945c4b4755a8bd8edd5b8ce781571b.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</PublisherName>
				<JournalTitle>Journal of Cyberspace Studies</JournalTitle>
				<Issn>2588-5499</Issn>
				<Volume>10</Volume>
				<Issue>1</Issue>
				<PubDate PubStatus="epublish">
					<Year>2026</Year>
					<Month>01</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>An Arctic Puffin Optimization with SCA approach, enhanced by a random neural network model for detecting attacks on the Internet of Things</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>61</FirstPage>
			<LastPage>80</LastPage>
			<ELocationID EIdType="pii">103726</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jcss.2025.395014.1146</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Mohamad</FirstName>
					<LastName>Arefi</LastName>
<Affiliation>Department of Computer Engineering, ST.C., Islamic Azad University, Tehran, Iran.</Affiliation>

</Author>
<Author>
					<FirstName>Parisa</FirstName>
					<LastName>Rahmani</LastName>
<Affiliation>Department of Computer Engineering, Par.C., Islamic Azad University, Tehran, Iran.</Affiliation>

</Author>
<Author>
					<FirstName>Hamid</FirstName>
					<LastName>Shokrzadeh</LastName>
<Affiliation>Department of Computer Engineering, Par.C., Islamic Azad University, Tehran, Iran.</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2025</Year>
					<Month>05</Month>
					<Day>10</Day>
				</PubDate>
			</History>
		<Abstract>&lt;strong&gt;Background:&lt;/strong&gt; Network security and penetration pose a significant challenge in the extensive IoT research of recent years. System security and user privacy demand security solutions that are carefully planned and diligently maintained.&lt;br /&gt;&lt;strong&gt;Aims: &lt;/strong&gt;This paper introduces a novel three-stage hybrid IDS, IoT-APOSCA, leveraging machine learning and meta-heuristics for attack detection; stages include pre-processing, feature selection, and attack detection. The pre-processing steps are: cleaning, visualization, feature engineering, and vectorization.&lt;br /&gt;&lt;strong&gt;Methodology: &lt;/strong&gt;Networks use Intrusion Detection Systems (IDSs) to monitor and detect malicious activities as a key security feature. The Arctic Puffin Optimization (APO) and Sine-Cosine Algorithm (SCA) are used in the feature selection stage, while a changed Random Neural Network (RNN) is employed in the attack detection stage.&lt;br /&gt;&lt;strong&gt;Results: &lt;/strong&gt;The proposed technique is assessed using the DS2OS dataset, and the outcomes show that the approach, integrating multiple learning models, led to an accuracy enhancement to 99.66%. Also, the values Recall and False Alarm Rate obtained are equal to 0.9926 and 0.003, respectively.&lt;br /&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt; Intrusion detection system efficacy is directly tied to the quality of its classification method. Enhanced neural network performance is achievable through adjustments to parameters, such as network weights.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Intrusion Detection System (IDS)</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">IOT</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Machine Learning Algorithm</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Meta-heuristic algorithms</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Network Security</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Sine-Cosine Algorithm (SCA)</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jcss.ut.ac.ir/article_103726_c7c6b2d147b42ad89ebe63e590bbf17c.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</PublisherName>
				<JournalTitle>Journal of Cyberspace Studies</JournalTitle>
				<Issn>2588-5499</Issn>
				<Volume>10</Volume>
				<Issue>1</Issue>
				<PubDate PubStatus="epublish">
					<Year>2026</Year>
					<Month>01</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>The construction of spectacular religious-political rituals in Iran; A critical study</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>81</FirstPage>
			<LastPage>108</LastPage>
			<ELocationID EIdType="pii">102843</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jcss.2025.395162.1147</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Ali</FirstName>
					<LastName>Momeni</LastName>
<Affiliation>Department of Social Communication, Faculty of Social Sciences, University of Tehran, Tehran, Iran.</Affiliation>

</Author>
<Author>
					<FirstName>Abdollah</FirstName>
					<LastName>Bicharanlou</LastName>
<Affiliation>Department of Social Communication, Faculty of Social Sciences, University of Tehran, Tehran, Iran.</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2025</Year>
					<Month>05</Month>
					<Day>12</Day>
				</PubDate>
			</History>
		<Abstract>&lt;strong&gt;Background:&lt;/strong&gt; Following the Islamic Revolution and the expansion of access to visual media, the use of this media in Shia rituals, such as religious gatherings (&lt;em&gt;hey’ats&lt;/em&gt;), significantly increased. In recent years, a new form of Shia ritual, referred to as “public communities”, has emerged which organized by cultural institutions. These communities differ markedly from traditional Shia-Iranian rituals and have established a distinct communicative domain.&lt;br /&gt;&lt;strong&gt;Aims: &lt;/strong&gt;This study aims to critically examine these events by identifying their constitutive components and analyzing the nature of their mediatization.&lt;br /&gt;&lt;strong&gt;Methodology: &lt;/strong&gt;Three events held in the Iranian calendar year 1401 were analyzed using a qualitative content analysis approach. These Shia-revolutionary performative rituals are categorized into two main domains: the “Public construction of the ritual” and the “construction of the presence and positioning of the subject”. Their media representation is also shaped by two principal categories: the “transitionalization of the communication mode” and “ideological representation”.&lt;br /&gt;&lt;strong&gt;Findings:&lt;/strong&gt; Our findings indicate that the organization and media representation of these events produce a spectacular pseudo-ritual that significantly diverges from traditional Shia rituals in Iran.&lt;br /&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt; These events have been organized and represented in ways that prioritize spectacle, visibility, and media populism, thus enabling a transformation in ritual structures and indicating a growing tendency toward mediatization in Iran.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">media construction</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">mediatization</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Representation</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Rituals</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">spectacularizing</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jcss.ut.ac.ir/article_102843_bdf595aeb7a02279ee30276d2578216b.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</PublisherName>
				<JournalTitle>Journal of Cyberspace Studies</JournalTitle>
				<Issn>2588-5499</Issn>
				<Volume>10</Volume>
				<Issue>1</Issue>
				<PubDate PubStatus="epublish">
					<Year>2026</Year>
					<Month>01</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Between exploitation and resilience: Reconciling AI’s role in surveillance capitalism and disaster risk management</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>109</FirstPage>
			<LastPage>139</LastPage>
			<ELocationID EIdType="pii">102844</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jcss.2025.396045.1165</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Mohammad Sharif</FirstName>
					<LastName>Sharifi Poor Bgheshmi</LastName>
<Affiliation>Department of Civil Engineering, Structural Engineering, Azad University, Qeshm, Iran.</Affiliation>

</Author>
<Author>
					<FirstName>Mahsa</FirstName>
					<LastName>Sharajsharifi</LastName>
<Affiliation>Department of Architectural Engineering, Azad University, North Tehran Branch, Iran.</Affiliation>

</Author>
<Author>
					<FirstName>Mohammad Reza</FirstName>
					<LastName>Saeidabadi</LastName>
<Affiliation>Department of European Studies, Faculty of World Studies, University of Tehran, Tehran, Iran.</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2025</Year>
					<Month>05</Month>
					<Day>27</Day>
				</PubDate>
			</History>
		<Abstract>&lt;strong&gt;Background:&lt;/strong&gt; This study explores the paradoxical role of artificial intelligence as both a tool of exploitation within surveillance capitalism and a force for resilience in disaster risk management, highlighting the ethical and governance challenges that arise at the intersection of these domains.&lt;br /&gt;&lt;strong&gt;Aims: &lt;/strong&gt;This article aims to enable the ethical use of AI in DRM while insulating public systems from the structural harms of commercial data exploitation.&lt;br /&gt;&lt;strong&gt;Methodology: &lt;/strong&gt;Drawing from a comparative qualitative analysis of 35 academic sources, the study investigates how BigTech corporations and data brokers leverage AI to commodify personal data, consolidate informational power, and erode democratic agency.&lt;br /&gt;&lt;strong&gt;Results:&lt;/strong&gt; The present study critically examines the dual role of artificial intelligence in contemporary digital society, contrasting its exploitative deployment within surveillance capitalism with its constructive use in disaster risk management (DRM). Simultaneously, it highlights a parallel body of research showcasing AI’s capacity to enhance early warning systems, situational awareness, and post-disaster recovery, especially in resource-constrained and climate-vulnerable regions.&lt;br /&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt; To reconcile these conflicting trajectories, the article proposes the Public AI for Resilience (PAIR) framework—a governance model grounded in data sovereignty, public infrastructure, algorithmic explainability, and cross-sectoral collaboration. Ultimately, the article argues for a normative recalibration of AI governance that prioritizes equity, transparency, and collective resilience over market imperatives, demonstrating that AI’s public good potential can be realized without surrendering to surveillance-based capitalism.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Artificial Intelligence</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">BigTech accountability</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Data Governance</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">disaster risk management</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">ethical technology</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">surveillance capitalism</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jcss.ut.ac.ir/article_102844_ba35ca09800a98ddd6653f69669a8426.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</PublisherName>
				<JournalTitle>Journal of Cyberspace Studies</JournalTitle>
				<Issn>2588-5499</Issn>
				<Volume>10</Volume>
				<Issue>1</Issue>
				<PubDate PubStatus="epublish">
					<Year>2026</Year>
					<Month>01</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Responsible cyberspace engagement: Towards Omolúàbí ethos for Nigerian youth</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>141</FirstPage>
			<LastPage>157</LastPage>
			<ELocationID EIdType="pii">104946</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jcss.2025.403070.1181</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Ridwan Ishola</FirstName>
					<LastName>Mogaji</LastName>
<Affiliation>Department of Philosophy, Faculty of Arts, Lagos State University, Ojo, Lagos, Nigeria.</Affiliation>

</Author>
<Author>
					<FirstName>Rotimi</FirstName>
					<LastName>Omosulu</LastName>
<Affiliation>Department of Language, Linguistics and Philosophy, Faculty of Humanities and Education, The University of the West Indies, Mona Campus, Kingston, Jamaica.</Affiliation>
<Identifier Source="ORCID">0000-0002-2591-5181</Identifier>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2025</Year>
					<Month>09</Month>
					<Day>25</Day>
				</PubDate>
			</History>
		<Abstract>&lt;strong&gt;Background:&lt;/strong&gt; Cyberspace is understood in this paper as a place for possible moral and immoral conducts, just as it is the case with physical societies across the world. However, the Nigerian cyberspace has, in recent times, experienced increase in moral decadence, with young people engaging in acts of vices, including disrespect, fraud, and phishing among other cybercrimes. This set of behaviours negates the values expected of a well-ordered and well-meaning cyberspace, all of which threaten physical societal cohesion and ethical standards.&lt;br /&gt;&lt;strong&gt;Aims: &lt;/strong&gt;This paper examines &lt;em&gt;Omolúàbí&lt;/em&gt; ethos, a traditional embodiment of moral principle of the Yoruba people, as a remedial framework. The &lt;em&gt;Omolúàbí&lt;/em&gt; ethos places virtues such as good character, respectful conduct, gentleness, honesty, trust, humanness, among others, as a necessity for building a responsible society, even in the cyberspace.&lt;br /&gt;&lt;strong&gt;Methodology: &lt;/strong&gt;Being philosophical research, the paper adopts qualitative method to unpack the relevance of ancient Yoruba proverbs and ethical practices to contemporary online engagement.&lt;br /&gt;&lt;strong&gt;Findings: &lt;/strong&gt;The paper argues that if the &lt;em&gt;Omolúàbí&lt;/em&gt; ethos is imbued into cyberspace culture, through the medium of philosophical counseling in collaboration with the National Orientation Agency, it could help ensure a more suitable online environment where respect, dignity, and virtue are paramount.&lt;br /&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt; This paper contributes to scholarship by positioning an indigenous ethical framework for addressing contemporary cyberspace’s ethical challenges.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">cyberspace</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">moral decadence</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">national orientation agency</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Nigerian youths</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Omolúàbí</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jcss.ut.ac.ir/article_104946_bab9db64249145cf68b946847337b3ad.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</PublisherName>
				<JournalTitle>Journal of Cyberspace Studies</JournalTitle>
				<Issn>2588-5499</Issn>
				<Volume>10</Volume>
				<Issue>1</Issue>
				<PubDate PubStatus="epublish">
					<Year>2026</Year>
					<Month>01</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Exploring responses to cybercrime in South Africa: The South African Police Services (SAPS) perspectives</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>159</FirstPage>
			<LastPage>179</LastPage>
			<ELocationID EIdType="pii">102846</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jcss.2025.395262.1149</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Slindile</FirstName>
					<LastName>Ngcece</LastName>
<Affiliation>Department of Humanities, School of Applied Human Sciences, University of Kwa Zulu Natal, KwaZulu-Natal, South Africa.</Affiliation>

</Author>
<Author>
					<FirstName>Sazelo</FirstName>
					<LastName>Mkhize</LastName>
<Affiliation>Department of Criminology and Security Science, School of Criminal Justice College of Law, The University of South Africa (UnISA), Pretoria, South Africa.</Affiliation>

</Author>
<Author>
					<FirstName>Khanyisile B</FirstName>
					<LastName>Majola</LastName>
<Affiliation>Department of Criminology and Security Science, School of Criminal Justice College of Law, The University of South Africa (UnISA), Pretoria, South Africa.</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2025</Year>
					<Month>05</Month>
					<Day>13</Day>
				</PubDate>
			</History>
		<Abstract>&lt;strong&gt;Background:&lt;/strong&gt; The rapid development of technology and computing has significantly impacted modern societies, leading to increased opportunities for wealth creation and, inversely, transactional offending. Cybercrimes are increasing and have become a major threat to nations, governments, businesses, and individuals, resulting in financial losses, reputational damage, and personal information data breaches.&lt;br /&gt;&lt;strong&gt;Aims: &lt;/strong&gt;This study explores how the South African Police Service (SAPS) responds to and combats cybercrimes.&lt;br /&gt;&lt;strong&gt;Methodology: &lt;/strong&gt;This research was conducted in Durban, KwaZulu-Natal. The study adopted the qualitative research approach and the phenomenological research design, according to which interpretive and constructivist qualitative research paradigms were deemed appropriate. Data was collected through in-depth interviews using semi-structured interviews, with a sample of 17 participants purposively drawn from the Directorate for Priority Crime Investigation (DPCI) and the Commercial Crimes Unit (CCI) of the South African Police Service (SAPS). The theoretical orientation that guided the study is the Structural Functionalism Theory. Data were analyzed using thematic analysis.&lt;br /&gt;&lt;strong&gt;Findings:&lt;/strong&gt; The study revealed that South Africa has been experiencing an increase in cybercrimes. However, has introduced laws and security strategies, such as the Cybercrime and Cybersecurity Bill of 2017, to respond to cybercrimes. However, these are argued to be not adapting fast enough to the constantly changing technological environment.&lt;br /&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt; Although limited, there are Police forensic experts in the field who can respond to cybercrimes. The study emphasizes the need for collaboration among all stakeholders, including prosecutors, the judiciary, private security agencies, CSPs, and ISPs, to effectively tackle cybercrimes.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Cybercrimes</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Cybersecurity</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Law Enforcement</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">policies</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">South African police services</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jcss.ut.ac.ir/article_102846_9e5a6ac674cff88827743681b4d28369.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</PublisherName>
				<JournalTitle>Journal of Cyberspace Studies</JournalTitle>
				<Issn>2588-5499</Issn>
				<Volume>10</Volume>
				<Issue>1</Issue>
				<PubDate PubStatus="epublish">
					<Year>2026</Year>
					<Month>01</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Artificial intelligence and crime detection: A critical review</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>181</FirstPage>
			<LastPage>197</LastPage>
			<ELocationID EIdType="pii">103771</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jcss.2025.402206.1179</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Karim</FirstName>
					<LastName>Salehi</LastName>
<Affiliation>Department of Law, Shahrekord Branch, Islamic Azad University, Shahrekord, Iran.</Affiliation>

</Author>
<Author>
					<FirstName>Simin</FirstName>
					<LastName>Habib Zadeh Khiyaban</LastName>
<Affiliation>Department of Public Administration, Faculty of Accounting and Management, Allameh Tabataba’i University, Tehran, Iran.</Affiliation>

</Author>
<Author>
					<FirstName>Shoaib</FirstName>
					<LastName>Sabbar</LastName>
<Affiliation>Department of International Commercial Law, Faculty of Law, Azad University, Tehran. Iran.</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2025</Year>
					<Month>09</Month>
					<Day>13</Day>
				</PubDate>
			</History>
		<Abstract>&lt;strong&gt;Background:&lt;/strong&gt; Since the advent of modern policing, technological innovations in communication and information management have significantly shaped investigative practices and crime detection strategies.&lt;br /&gt;&lt;strong&gt;Aims: &lt;/strong&gt;The current research study explores the transformative role of Artificial Intelligence in modern crime detection and prevention across diverse domains including cybercrime, environmental crime, financial fraud, and urban surveillance.&lt;br /&gt;&lt;strong&gt;Methodology: &lt;/strong&gt;Employing a qualitative meta-synthesis methodology, the research critically examines peer-reviewed literature published between the years 2015 and 2025 to identify emerging trends, technological innovations, and socio-legal implications associated with AI-driven policing.&lt;br /&gt;&lt;strong&gt;Findings: &lt;/strong&gt;The key findings highlight the integration of machine learning, computer vision, and natural language processing techniques into the predictive and real-time law enforcement systems. These technologies have demonstrably enhanced the accuracy, efficiency, and responsiveness of crime prevention strategies. However, the current study also reveals significant challenges, including algorithmic bias, lack of transparency, and inadequate regulatory oversight, particularly in socially stratified or underregulated contexts.&lt;br /&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt; The current article underscores the necessity of embedding explainability, accountability, and human oversight into Artificial Intelligence systems to ensure the ethical and equitable implementation of AI-driven policing systems.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Artificial Intelligence</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Crime Prevention</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">predictive policing</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">algorithmic accountability</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">surveillance ethics</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jcss.ut.ac.ir/article_103771_8c7b282eaf258cc0913f4ab0f943705f.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</PublisherName>
				<JournalTitle>Journal of Cyberspace Studies</JournalTitle>
				<Issn>2588-5499</Issn>
				<Volume>10</Volume>
				<Issue>1</Issue>
				<PubDate PubStatus="epublish">
					<Year>2026</Year>
					<Month>01</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Individual variability and threshold dynamics in distance estimation: A statistical analysis of visual perception in built environments</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>199</FirstPage>
			<LastPage>209</LastPage>
			<ELocationID EIdType="pii">103773</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jcss.2025.391801.1134</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Mojtaba</FirstName>
					<LastName>Pourbakht</LastName>
<Affiliation>Department of Environmental and Urban Engineering, Kansai University, Osaca, Japan.</Affiliation>

</Author>
<Author>
					<FirstName>Yoshihiro</FirstName>
					<LastName>Kametani</LastName>
<Affiliation>Department of Environmental and Urban Engineering, Kansai University, Osaca, Japan.</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2025</Year>
					<Month>03</Month>
					<Day>09</Day>
				</PubDate>
			</History>
		<Abstract>&lt;strong&gt;Background:&lt;/strong&gt; Understanding how humans perceive and estimate distances in built environments is critical not only for advancing perceptual psychology but also for informing the design of computational models in computer vision, robotics, and architectural design.&lt;br /&gt;&lt;strong&gt;Aims: &lt;/strong&gt;This study investigates the mechanisms and limitations of human distance estimation within a controlled architectural environment.&lt;br /&gt;&lt;strong&gt;Methodology: &lt;/strong&gt;While some previous experiments focused on estimating distances in virtual settings, the current study examines real-world estimation accuracy across a series of predefined points within an unobstructed corridor. Participants were asked to visually estimate the distance between their position and seven distinct target locations, ranging from near to far without the aid of physical reference cues. The core objective was not simply to measure accuracy, but to identify the perceptual threshold beyond which estimation errors significantly increase. A one-way ANOVA model was employed to assess the influence of variables such as actual distance and participant age on perceptual accuracy.&lt;br /&gt;&lt;strong&gt;Results:&lt;/strong&gt; Results revealed a consistent estimation performance up to approximately 2 m, beyond which the margin of error grew increasingly pronounced. Notably, a critical threshold was identified at 7.476 m, where estimation errors sharply escalated. The maximum observed discrepancy occurred at a distance of 10.186 m, suggesting a cognitive boundary in spatial awareness.&lt;br /&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt; These findings contribute to the understanding of visual-spatial perception mechanisms and offer theoretical insights relevant to applications in robotics, image processing, virtual reality, and navigation system design.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">ANOVA</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Built Environment</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">distance estimation</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Estimation Error</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">perceptual threshold</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">spatial estimation</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">visual angle</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">visual perception</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jcss.ut.ac.ir/article_103773_2551cec8e20fe2c948549a72ceead686.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</PublisherName>
				<JournalTitle>Journal of Cyberspace Studies</JournalTitle>
				<Issn>2588-5499</Issn>
				<Volume>10</Volume>
				<Issue>1</Issue>
				<PubDate PubStatus="epublish">
					<Year>2026</Year>
					<Month>01</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Effects of users' social identity on intention to purchase a brand: The mediating roles of social media use, eWOM and brand loyalty</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>211</FirstPage>
			<LastPage>238</LastPage>
			<ELocationID EIdType="pii">105067</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jcss.2025.403217.1184</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Mohammad Reza</FirstName>
					<LastName>Jalilvand</LastName>
<Affiliation>Department of Business Management and Entrepreneurship, Faculty of Management, University of Tehran, Tehran, Iran.</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2025</Year>
					<Month>09</Month>
					<Day>28</Day>
				</PubDate>
			</History>
		<Abstract>&lt;strong&gt;Background:&lt;/strong&gt; Social identity theory suggests that individuals define themselves partly through their membership in social groups, and these identities shape attitudes and behaviors, including consumption choices. Brands increasingly function as social symbols, allowing users to express group belonging, self-concept, and shared values through brand affiliation. Consequently, users’ social identities can significantly influence their intention to purchase a brand by strengthening emotional attachment, perceived congruence, and loyalty toward brands that represent their in-group.&lt;br /&gt;&lt;strong&gt;Aims: &lt;/strong&gt;Consumers like to associate themselves with different brands to represent their social identity. This study suggests a social identity perspective of customer-brand relationship and integrates brand identity with social media usage, electronic WOM (eWOM) and brand loyalty in predicting brand purchase intention in an online environment.&lt;br /&gt;&lt;strong&gt;Methodology: &lt;/strong&gt;Data were collected through a questionnaire-based survey among a sample of higher education students in a public university in Iran. A sample of 423 respondents was selected through a convenience sampling technique. Data were then analyzed through Structural Equation Modeling (SEM) to provide a prediction-oriented model assessment by LISREL 8.54. Sobel mediation tests were performed to test the mediating effects of social media use, eWOM and brand loyalty on the relationship between social identity and brand purchase intention.&lt;br /&gt;&lt;strong&gt;Findings: &lt;/strong&gt;The findings indicated that social identity (affective, cognitive, and evaluative) of users/consumers has a significant impact on: (a) social media use, (b) eWOM about brand, and (c) brand loyalty. Social media use and brand loyalty were found to be the determinants of eWOM about brand. Finally, this research found that all three variables of: (a) social media use, (b) eWOM about brand, and (c) brand loyalty are the main determinants of intention to purchase a certain brand.&lt;br /&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt; This research suggests that social identity perspective can be integrated with other perspectives to model the consumer&#039;s psychological path to brand purchase intentions. This study confirms the critical role of social identification of users in the reaction towards a given brand and stresses the mediation effects of social media use, brand loyalty and eWOM on the effects of social identity on the path to brand purchase intention.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Brand Loyalty</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">brand purchase intention</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">EWOM</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Social Identity</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Social media use</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jcss.ut.ac.ir/article_105067_a210167e6f6946490d50ce8e958d9fcc.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</PublisherName>
				<JournalTitle>Journal of Cyberspace Studies</JournalTitle>
				<Issn>2588-5499</Issn>
				<Volume>10</Volume>
				<Issue>1</Issue>
				<PubDate PubStatus="epublish">
					<Year>2026</Year>
					<Month>01</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Children, consent, and control in Persian social media</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>239</FirstPage>
			<LastPage>256</LastPage>
			<ELocationID EIdType="pii">105098</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jcss.2025.406842.1207</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Shaho</FirstName>
					<LastName>Sabbar</LastName>
<Affiliation>Department of Iranian Studies, Faculty of World Studies, University of Tehran, Tehran, Iran.</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2025</Year>
					<Month>11</Month>
					<Day>23</Day>
				</PubDate>
			</History>
		<Abstract>&lt;strong&gt;Background:&lt;/strong&gt; Social media platforms such as Facebook, Instagram, TikTok, and X have redefined the norms of sociality, identity performance, and participation in the public sphere.&lt;br /&gt;&lt;strong&gt;Aims: &lt;/strong&gt;This study examines how Persian-language users on X negotiate the visibility of children in online spaces through affective discourse and vernacular governance.&lt;br /&gt;&lt;strong&gt;Methodology: &lt;/strong&gt;Analyzing 2,392 posts, we identify seven thematic formations—ranging from family blogging and sharenting to screenshot-based mockery, celebrity child cultures, and rights-based critiques. Using a hybrid methodological approach combining high-recall data retrieval, supervised multi-label topic modeling, and sentiment–intensity analysis, we map how practices like quote-tweeting and screenshotting structure public debates around parental branding, childhood agency, privacy, and consent. Central to this ecosystem is the culturally specific figure of “Arat’s father”, a discursive shorthand for the commodification of childhood under platform economies.&lt;br /&gt;&lt;strong&gt;Findings: &lt;/strong&gt;The findings reveal a layered affective landscape where humor, outrage, and pedagogical neutrality coexist, enabling users to police age norms and negotiate ethical boundaries in real time.&lt;br /&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt; This study reveals how ordinary users in Iran and Persian-speaking contexts regulate childhood visibility through platform affordances, emotional repertoires, and normative claims. It also proposes a reproducible pipeline for analyzing culturally specific digital publics with methodological transparency and ethical sensitivity.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">digital rights</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">platformized childhood</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Persian social media</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">sharenting</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">vernacular governance</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jcss.ut.ac.ir/article_105098_e7ac059e7b580dbfb44acb985975bddd.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</PublisherName>
				<JournalTitle>Journal of Cyberspace Studies</JournalTitle>
				<Issn>2588-5499</Issn>
				<Volume>10</Volume>
				<Issue>1</Issue>
				<PubDate PubStatus="epublish">
					<Year>2026</Year>
					<Month>01</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>The engagement of Hawzeh media with Artificial Intelligence as a modern technology</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>257</FirstPage>
			<LastPage>279</LastPage>
			<ELocationID EIdType="pii">105042</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jcss.2025.406840.1206</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Zohreh</FirstName>
					<LastName>Alikhani</LastName>
<Affiliation>Department of Social Communication Sciences, Faculty of Social Sciences, University of Tehran, Tehran, Iran.</Affiliation>

</Author>
<Author>
					<FirstName>Hanieh</FirstName>
					<LastName>Malekmohammadi</LastName>
<Affiliation>Department of Social Communication Sciences, Faculty of Social Sciences, University of Tehran, Tehran, Iran.</Affiliation>

</Author>
<Author>
					<FirstName>Farzad</FirstName>
					<LastName>Gholami</LastName>
<Affiliation>Department of Social Communication Sciences, Faculty of Social Sciences, University of Tehran, Tehran, Iran.</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2025</Year>
					<Month>11</Month>
					<Day>23</Day>
				</PubDate>
			</History>
		<Abstract>&lt;strong&gt;Background:&lt;/strong&gt; Background: In Iran, following the introduction of modern technologies, various social groups have responded to them, among whom “Tolab” constitute one category. Due to their religious authority within Iranian society, seminarians exert both direct and indirect influence on people’s social lives.&lt;br /&gt;&lt;strong&gt;Aims: &lt;/strong&gt;This study aims to explore how &lt;em&gt;Hawzeh&lt;/em&gt; members engage with artificial intelligence (AI) as a manifestation of modern technology, by examining &lt;em&gt;Hawzeh&lt;/em&gt; media such as journals and news agencies, and to explain its relationship with modernity and technological application approaches.&lt;br /&gt;&lt;strong&gt;Methodology: &lt;/strong&gt;122 texts from &lt;em&gt;Hawzeh&lt;/em&gt; media over a two-year period were selected and analyzed using thematic analysis. Ultimately, three main categories were identified: “Understanding the Nature of Artificial Intelligence among &lt;em&gt;Hawzeh&lt;/em&gt; Members”, “The Relationship between Power and Artificial Intelligence among &lt;em&gt;Hawzeh&lt;/em&gt; Members”, and “The Operational Attention of the &lt;em&gt;Hawzeh&lt;/em&gt; to Artificial Intelligence”.&lt;br /&gt;&lt;strong&gt;Findings: &lt;/strong&gt;&lt;em&gt;Hawzeh&lt;/em&gt; media perceive AI as having a variable nature, which can be utilized depending on the intention, design, and use by its users.&lt;br /&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt; The experience of the People of the &lt;em&gt;Hawzeh&lt;/em&gt; with AI demonstrates that the systematic form of religion can also be integrated with technology as a product of modern science, because it is not entirely anti-modern, nor is it modern and subjective in the sense of defining its existence solely as a specific mode of being.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Artificial Intelligence</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Hawzeh members</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Media</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Religion</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">technology</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jcss.ut.ac.ir/article_105042_fd510a1a6f26322b5b6ae749fd4f9f57.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</PublisherName>
				<JournalTitle>Journal of Cyberspace Studies</JournalTitle>
				<Issn>2588-5499</Issn>
				<Volume>10</Volume>
				<Issue>1</Issue>
				<PubDate PubStatus="epublish">
					<Year>2026</Year>
					<Month>01</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Performing the empowered self: Pseudoscience, individualism, and the Iranian self-development microcelebrities</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>281</FirstPage>
			<LastPage>301</LastPage>
			<ELocationID EIdType="pii">105118</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jcss.2025.406607.1204</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Mohammadreza</FirstName>
					<LastName>Gharghani</LastName>
<Affiliation>Department of Social Communication Sciences, Faculty of Social Sciences, University of Tehran, Tehran, Iran.</Affiliation>

</Author>
<Author>
					<FirstName>Ehsan</FirstName>
					<LastName>Shahghasemi</LastName>
<Affiliation>Department of Social Communication Sciences, Faculty of Social Sciences, University of Tehran, Tehran, Iran.</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2025</Year>
					<Month>11</Month>
					<Day>19</Day>
				</PubDate>
			</History>
		<Abstract>&lt;strong&gt;Background:&lt;/strong&gt; Self-development microcelebrities constitute a distinct and rapidly expanding subtype within the broader culture of fame. These figures primarily operate within the digital self-help domain, offering audiences simplified psychological and lifestyle concepts that promise personal transformation through adherence to their guidance. Contemporary self-help discourse is rooted in the positive psychology movement that gained traction in the United States during the late 20th century and is heavily influenced by neoliberal ideologies that emphasize individual agency and responsibility.
&lt;strong&gt;Aims: &lt;/strong&gt;In this research, Instagram pages of Iranian self-development microcelebrities were studied to understand what they share with their audience and the various methods they employ to engage with them.
&lt;strong&gt;Methodology: &lt;/strong&gt;This study analyzes the Instagram accounts of Iranian self-development microcelebrities with follower counts exceeding 300,000, using a thematic analysis approach. Initially, each account was analyzed individually, followed by a cross-case analysis to identify recurring thematic patterns.
&lt;strong&gt;Findings: &lt;/strong&gt;The analysis revealed three overarching themes—pseudoscience, the primacy of luck and the inner self, and self-made rules—comprising seven organizing themes and 31 basic themes. The findings indicate that these microcelebrities promote a form of hyper-individualism aligned with neoliberal values.
&lt;strong&gt;Conclusion:&lt;/strong&gt; This model of subjectivity emphasizes psychological self-regulation and inner transformation while detaching individuals from social and political engagement.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Instagram analysis</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">microcelebrities</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Neoliberalism</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">personal development</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">self-help discourse</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jcss.ut.ac.ir/article_105118_8307c5f297e8d410061cdd12c241622e.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</PublisherName>
				<JournalTitle>Journal of Cyberspace Studies</JournalTitle>
				<Issn>2588-5499</Issn>
				<Volume>10</Volume>
				<Issue>1</Issue>
				<PubDate PubStatus="epublish">
					<Year>2026</Year>
					<Month>01</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Cyber-acculturation through social media exposure: A Q methodology and network analysis</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>303</FirstPage>
			<LastPage>333</LastPage>
			<ELocationID EIdType="pii">105006</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jcss.2025.403148.1182</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Sholeh</FirstName>
					<LastName>Meraji Oskouie</LastName>
<Affiliation>Department of Cultural Affairs Management and Media Management, Science and Research Branch, Islamic Azad University, Tehran, Iran.</Affiliation>

</Author>
<Author>
					<FirstName>Kamran</FirstName>
					<LastName>Mohamadkhani</LastName>
<Affiliation>Department of Higher Education Administration, Science and Research Branch, Islamic Azad University, Tehran, Iran.</Affiliation>

</Author>
<Author>
					<FirstName>Mohammad</FirstName>
					<LastName>Soltanifar</LastName>
<Affiliation>Department of Communication Sciences and Knowledge Studies, Science and Research Branch, Islamic Azad University, Tehran, Iran.</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2025</Year>
					<Month>09</Month>
					<Day>26</Day>
				</PubDate>
			</History>
		<Abstract>&lt;strong&gt;Background:&lt;/strong&gt; Social media has enabled both intentional and incidental user exposure to diverse cultures and subcultures. This exposure fosters the socialization of similar cultural elements or produces changes in original cultural patterns through cyber-acculturation, which arises from continuous contact with culturally distinct groups.&lt;br /&gt;&lt;strong&gt;Aims: &lt;/strong&gt;This study aimed to develop models of social media users’ cyber-acculturation in their exposure to cyber-subcultures.&lt;br /&gt;&lt;strong&gt;Methodology: &lt;/strong&gt;Using a Q methodology research design, the study employed convenience snowball sampling and an online questionnaire to collect data from 52 participants, who freely rated 61 statements derived from interviews. Exploratory Factor Analysis, treating participants as variables, was conducted to identify distinct cyber-acculturation models. To further examine the characteristics of each factor, network analysis was applied.&lt;br /&gt;&lt;strong&gt;Discussions: &lt;/strong&gt;Users demonstrated varying patterns of cyber-acculturation. Comparable to the model proposed by Sam and Berry (2006)— which outlines the strategies of assimilation, separation, integration, and marginalization— this study identified five distinct models of social media users’ acculturation in exposure to cyber-subcultures: 1) Conservative Socialization Adopters, 2) Media-Literate Non-Adopters, 3) Media-Literate Acculturation Adopters, 4) Change-Aspirant Semi Non-Adopters, and 5) Risk-Taking Socialization Adopters. Each of these categories, to some extent, reflects the integration strategy, particularly motivated by social mobility, self-actualization, well-being, and personal advancement.&lt;br /&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt; Understanding the variations in how users adopt cultural elements enables governance bodies, policymakers, and professionals in media, culture, and education to design and implement more effective measures with greater impact across different user types.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">cyber-acculturation</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">cyber-subcultures</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">network analysis</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Q methodology</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">social media exposure</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jcss.ut.ac.ir/article_105006_bab5e5d6a60e8d94db1667eece14ba45.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>University of Tehran on behalf of the "Cyberspace Research Policy Center" and the "UNESCO Chair on Cyberspace and Culture: Dual Spacization of the World"</PublisherName>
				<JournalTitle>Journal of Cyberspace Studies</JournalTitle>
				<Issn>2588-5499</Issn>
				<Volume>10</Volume>
				<Issue>1</Issue>
				<PubDate PubStatus="epublish">
					<Year>2026</Year>
					<Month>01</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Book review: The Discursive-Digital Link: Antagonism and Polarisation in Digital Spaces by Ehsan Dehghan</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>335</FirstPage>
			<LastPage>339</LastPage>
			<ELocationID EIdType="pii">104718</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jcss.2025.406177.1196</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Mohsen</FirstName>
					<LastName>Goudarzi</LastName>
<Affiliation>Social Sciences Department, Literature and Humanities Faculty, University of Isfahan, Isfahan, Iran.</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2025</Year>
					<Month>11</Month>
					<Day>13</Day>
				</PubDate>
			</History>
		<Abstract>Aurhor: Ehsan Dehghan&lt;br /&gt;Title: &lt;em&gt;The Discursive-Digital Link: Antagonism and Polarisation in Digital Spaces&lt;/em&gt;&lt;br /&gt;Year of Published: August 2025&lt;br /&gt;352pp&lt;br /&gt;In English&lt;br /&gt;ISBN: 9781032487274&lt;br /&gt;Publisher: New York: Routledge</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Digital media</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Discourse theory</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">neoliberal capitalism</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">polarisation</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Actor-Network Theory</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">political communication</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jcss.ut.ac.ir/article_104718_75315c0760a2a1b745275fd27ad6185e.pdf</ArchiveCopySource>
</Article>
</ArticleSet>
