Results 21 to 30 of about 3,809 (177)

Port cybersecurity and threat: A structural model for prevention and policy development

open access: yesAsian Journal of Shipping and Logistics, 2021
Most port operators have increasingly integrated cybertechnology into port activities to increase their competitiveness; unfortunately, this digitalization becomes the major vulnerability for the emerging cyberthreat.
Chalermpong Senarak
doaj   +1 more source

Polyspatial Resistance for the Sake of the "Real" Subalterns: Electronic Civil Disobedience as a Form of Hacktivism [PDF]

open access: yes, 2009
This essay examines Electronic Disturbance Theater's virtual sit-in actions as a form of hacktivism in relation to the subaltern ...
Iskandar Zulkarnain
core   +1 more source

The perks and downsides of being a digital prosumer: optimistic and pessimistic approaches to digital prosumption [PDF]

open access: yes, 2016
The recent evolution of users’ position and agency in digital environments absorbs the attention of several scholars in different fields of study.
Dusi, Davide
core   +1 more source

Social movements and digital media in the UK

open access: yes, 2022
IPPR Progressive Review, Volume 29, Issue 3-4, Page 226-233, Winter 2022.
Anastasia Kavada
wiley   +1 more source

Dígitos a Contrapelo ou da Materialidade do Erro na Cultura Digital

open access: yesMatLit, 2015
Review of Peter Krapp, Noise Channels: Glitch and Error in Digital Culture. Minneapolis, University of Minnesota Press, 2011, 162 pp.
Neves, Nuno Miguel
doaj   +1 more source

Mapping Hacktivism

open access: yesComputer Fraud & Security, 2001
China is frequently reported as the source of many politically motivated cyber-attacks. Yet, there have been very few studies on the people behind such attacks, also known as hacktivists. In this paper, we have taken a step back and studied some of the reasons behind the rise of freelance hacktivism emanating from China.
Yip, Michael, Webber, Craig
openaire   +3 more sources

Why I joined Facebook and still regret it [PDF]

open access: yes, 2015
This article argues for a particular understanding of identity and sociality in social media. While there is considerable insightful research about the sociality and subjectivity produced in social media, it is also important to see that such identity ...
Jordan, Tim
core   +2 more sources

DDoS: From Activist Event to Perpetual Crisis

open access: yescommunication +1, 2021
This paper focuses on recent changes in the way Distributed Denial of Service (DDoS) attacks are technically administered in order to reassess their role as an activist tactic. By contextualising current forms of attacks within the history of hacktivism,
Theo Röhle
doaj   +1 more source

La culture pirate à l’épreuve de la forme partisane

open access: yesTracés, 2014
This article deals with the emergence of the Parti pirate in France and questions how new practices and new digital issues have an impact on the renewing of the political participation.
Jonathan Bocquet
doaj   +1 more source

Implications of the jihadist terrorism in cyberspace

open access: yesBulletin of "Carol I" National Defense University
The terrorist attack on the 11th of September, 2001, marked the change in the West’s perception of the Middle East and vice versa. Followed by the US military presence in the Middle East, this event contributed to the development of the means of ...
Bianca Brandea
doaj   +1 more source

Home - About - Disclaimer - Privacy