Results 21 to 30 of about 24,401 (224)
Criptopunks y América Latina: de la soberanía tecnológica a la era de las filtraciones
La irrupción de Wikileaks en el mundo reforzó la sintonía geopolítica histórica de los gobiernos latinoamericanos y los hackers globales. Además, supuso un viraje en el imaginario y método de las luchas latinoamericanas históricas: las filtraciones y la ...
Bernardo Gutiérrez González
doaj +1 more source
Cryptic journalism: News reporting of encryption. [PDF]
In light of Edward Snowden’s global surveillance disclosures, this article examines news discourses about online communication security and surveillance circumvention practices.
Thorsen, Einar
core +1 more source
Outrage without Consequences? Post-Snowden Discourses and Governmental Practice in Germany
In 2013 Edward Snowden’s disclosures of mass surveillance performed by US intelligence agencies seriously irritated politicians and citizens around the globe. This holds particularly true for privacy-sensitive communities in Germany.
Stefan Steiger +2 more
doaj +1 more source
Balancing the Privacy v. Surveillance argument: a perspective from the United Kingdom (Vol.13, N.1)
In the aftermath of revelations made by ex-NSA employee Edward Snowden about violation of privacy of individuals by states in the name of surveillance, right to privacy became one of the highly debated rights. There is no doubt that the state must secure
Vaibhav Chadha
doaj +1 more source
En la web, ‘un actor mucho más importante es la gente sin organización’
En julio de 2013, participó en el foro “Seguridad y espionaje en Internet: las acechanzas del poder”, organizado por Ciespal, en el cual planteó la interrogante quién vigila al vigilante, a propósito del ciber espionaje estadounidense denunciado por ...
Pamela Cruz Páez
doaj +1 more source
Whistleblowing or leaking? Public opinion toward Assange, Manning, and Snowden
The release of classified documents through outlets like WikiLeaks has transformed American politics by shedding light on the innerworkings of governments, parties, and corporations.
Michael R. Touchton +3 more
doaj +1 more source
Je breiter der Infrastruktur-Anschluss eines Landes an das World Wide Web, desto größer die Angriffsfläche im Fall eines Netzkriegs. Die Messung der virtuellen Kampfkraft erfolgt auf Basis von drei Faktoren: Offensivkraft, Defensivfähigkeit und die ...
Karl H. Stingeder
doaj +1 more source
The enemy has passed through the gate: insider threats, the dark triad, and the challenges around security [PDF]
Purpose – The purpose of this paper is to highlight the potential role that the so-called “toxic triangle” (Padilla et al., 2007) can play in undermining the processes around effectiveness.
Fischbacher-Smith, Denis
core +1 more source
A trajetória cypherpunk e suas práticas discursivas
O texto traz a análise de um tipo específico de ciberativismo denominado cypherpunk. Ele ganhou destaque mundial principalmente a partir das denuncias realizadas pelo Wikileaks, obtendo ainda mais força após as revelações de Edward Snowden, o ex-agente ...
SERGIO AMADEU SILVEIRA
doaj +1 more source
Googles Augmented-Reality-Game "Ingress"
Das an das "Geocoaching"-Spielprinzip erinnernde Augmented-Reality-Game "Ingress" ist auf allen mit Android-Betriebssystem ausgestatteten Smartphones spielbar. Das Alleinstellungsmerkmal des Spiels ist gleichzeitig auch das beste Patent-Rezept für bzw.
Karl H. Stingeder
doaj +1 more source

