Results 31 to 40 of about 3,809 (177)
Data Strikes Against Data Coloniality: Hacking Labour Law
From a decolonial perspective, what is the relationship between the limits of the legality of strikes and boycotts in digital labour? Starting from Faustino and Lippold’s framework, we will consolidate the idea that data coloniality is part of the ...
Renata Queiroz Dutra +1 more
doaj +1 more source
Critical Literacy – Open Values, Imaginary Rationalities
Critical Literacy – Open Values, Imaginary Rationalities This papers aims to emphasize the importance of discussing the relationship between positivism, critical pedagogy and politics of new media production of information and knowledge, claiming that ...
Mario Hibert
doaj +1 more source
Trusted commons: why ‘old’ social media matter
This paper looks at contemporary uses of an “old” social media – Internet Relay Chat (IRC) – and shows how they constitute a form of resistance to and a social critique of mainstream social media platforms.
P Maxigas, Guillaume Latzko-Toth
doaj +1 more source
Managing cyberattacks in wartime: The case of Ukraine
Abstract Cybersecurity specialists face continual challenges in protecting organizations and societies from ever‐evolving cyberattacks. These challenges intensify dramatically in the context of war, yet our understanding of cyberattacks during wartime is limited.
Iryna Fyshchuk +2 more
wiley +1 more source
Contention For the Right to Information: Hacktivism as A Social Movement
Social movements have evolved significantly over time, adapting to historical developments and conditions. Initially perceived as aggressive and aimless, they have transformed into more organised forms, particularly in response to industrialisation. Post-
Elif Kara
doaj +1 more source
Cyberterrorism: the story so far [PDF]
This paper is concerned with the origins and development of the concept of cyberterrorism. It seeks to excavate the story of the concept through an analysis of both popular/media renditions of the term and scholarly attempts to define the borders of same.
Conway, Maura
core
This paper presents the composite deep bidirectional long short‐term memory (CDBi‐LSTM), a hybrid deep learning model for improving distributed denial of service (DDoS) detection in Internet of Things (IoT) networks. Combining CNN for spatial features and Bi‐LSTM for temporal dependencies, the model attains excellent performance: 99.95% accuracy on ...
Anthony Jacklingo Kwame Quansah Junior +5 more
wiley +1 more source
Hacktivism: A New Breed of Protest in a Networked World [PDF]
After WikiLeaks released hundreds of thousands of classified U.S. government documents in 2010, the ensuing cyber-attacks waged by all sides in the controversy brought the phenomenon of hacktivism into popular focus.
Hampson, Noah C.N.
core
This article reviews the cyber‐physical vulnerabilities of wireless sensor networks (WSNs) in oil and gas operations. It examines real‐world attack scenarios, highlights key threat vectors such as spoofing and malware, and outlines best practices for securing WSNs within industrial control environments.
Ali Sayghe
wiley +1 more source
Hacking is now a widely discussed and known phenomenon, but remains difficult to define and empirically identify because it has come to refer to many different, sometimes incompatible, material practices. This paper proposes genealogy as a framework for
Bamford J +54 more
core +1 more source

