Origin, evolution and current status of digital activism and its social commitment. Ciberactivism, hacktivism and slacktivism [PDF]
Este trabajo estudia la cuestión de la participación digital de los ciudadanos en los asuntos públicos y su capacidad de perturbar el poder establecido. Realizamos una aproximación teórica y conceptual de las bases del activismo digital, o tecnoactivismo,
García-Estévez, Noelia
core
Book review: the coming swarm: DDoS actions, hacktivism, and civil disobedience on the internet [PDF]
The internet is increasingly becoming a tool for political activism and protest. The Coming Swarm is one of the first publications which profoundly examines the dynamics of civil disobedience and specifically Distributed Denial of Service (DDoS) actions ...
Tanczer, Leonie Maria
core
How Biomedical Citizen Scientists Define What They Do: It's All in the Name. [PDF]
Trejo M +3 more
europepmc +1 more source
To Re:Make, To Re:Do, To Re:Think - Localised Production in a Globalised World [PDF]
To live in a global world is to be constantly aware of our own lives and histories and how they may merge and blend with others. Taking a practitioner-led approach to design, and the production of cultural artifacts, this paper will draw on the author’s ...
Shah, Karen
core
Trusted CI Experiences in Cybersecurity and Service to Open Science
This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation to serve the community as the NSF Cybersecurity Center of Excellence.
Adams, Andrew +18 more
core +1 more source
The emergence of media artivism over the last decades constitutes a new and relevant field of study for researchers of digital culture and social change, digital art historians and media archaeologists.
Carolina Fernández-Castrillo +1 more
doaj +1 more source
Youth political participation and digital movement in Indonesia: the case of #ReformasiDikorupsi and #TolakOmnibusLaw. [PDF]
Wahyuningroem SL +3 more
europepmc +1 more source
Cyber security as a central strategy for smart community [PDF]
The cyber threat landscape has evolved in fairly dramatic ways.Cyber threats come in various different forms both technical and content related threats.Emerging threats have become sophisticated and a lot more disastrous involving state actors, state ...
Abdul Wahab, Amirudin
core
VisTAS: blockchain-based visible and trusted remote authentication system. [PDF]
Ali A +5 more
europepmc +1 more source
К вопросу о борьбе с кибершпионажем: изучение и осмысление [PDF]
У статті автор розмірковує про загрози інформаційної безпеки та розглядає одну з найбільш актуальних проблем сучасного інформаційного суспільства – кібершпіонаж.
Нашинець-Наумова, Анфіса Юріївна
core

