Results 31 to 40 of about 3,809 (177)

Data Strikes Against Data Coloniality: Hacking Labour Law

open access: yesItalian Labour Law e-Journal
From a decolonial perspective, what is the relationship between the limits of the legality of strikes and boycotts in digital labour? Starting from Faustino and Lippold’s framework, we will consolidate the idea that data coloniality is part of the ...
Renata Queiroz Dutra   +1 more
doaj   +1 more source

Critical Literacy – Open Values, Imaginary Rationalities

open access: yesColloquia Humanistica, 2014
Critical Literacy – Open Values, Imaginary Rationalities This papers aims to emphasize the importance of discussing the relationship between positivism, critical pedagogy and politics of new media production of information and knowledge, claiming that ...
Mario Hibert
doaj   +1 more source

Trusted commons: why ‘old’ social media matter

open access: yesInternet Policy Review, 2020
This paper looks at contemporary uses of an “old” social media – Internet Relay Chat (IRC) – and shows how they constitute a form of resistance to and a social critique of mainstream social media platforms.
P Maxigas, Guillaume Latzko-Toth
doaj   +1 more source

Managing cyberattacks in wartime: The case of Ukraine

open access: yesPublic Administration Review, Volume 85, Issue 3, Page 619-627, May/June 2025.
Abstract Cybersecurity specialists face continual challenges in protecting organizations and societies from ever‐evolving cyberattacks. These challenges intensify dramatically in the context of war, yet our understanding of cyberattacks during wartime is limited.
Iryna Fyshchuk   +2 more
wiley   +1 more source

Contention For the Right to Information: Hacktivism as A Social Movement

open access: yesYeni Medya
Social movements have evolved significantly over time, adapting to historical developments and conditions. Initially perceived as aggressive and aimless, they have transformed into more organised forms, particularly in response to industrialisation. Post-
Elif Kara
doaj   +1 more source

Cyberterrorism: the story so far [PDF]

open access: yes, 2003
This paper is concerned with the origins and development of the concept of cyberterrorism. It seeks to excavate the story of the concept through an analysis of both popular/media renditions of the term and scholarly attempts to define the borders of same.
Conway, Maura
core  

CDBi‐LSTM: A Hybrid Deep Learning Model With Attention‐Based Fusion for Efficient DDoS Detection in IoT Environments

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
This paper presents the composite deep bidirectional long short‐term memory (CDBi‐LSTM), a hybrid deep learning model for improving distributed denial of service (DDoS) detection in Internet of Things (IoT) networks. Combining CNN for spatial features and Bi‐LSTM for temporal dependencies, the model attains excellent performance: 99.95% accuracy on ...
Anthony Jacklingo Kwame Quansah Junior   +5 more
wiley   +1 more source

Hacktivism: A New Breed of Protest in a Networked World [PDF]

open access: yes, 2012
After WikiLeaks released hundreds of thousands of classified U.S. government documents in 2010, the ensuing cyber-attacks waged by all sides in the controversy brought the phenomenon of hacktivism into popular focus.
Hampson, Noah C.N.
core  

Cyber‐Physical Vulnerabilities of Wireless Sensor Networks in the Oil and Gas Industry: A Literature Review

open access: yesThe Journal of Engineering, Volume 2025, Issue 1, January/December 2025.
This article reviews the cyber‐physical vulnerabilities of wireless sensor networks (WSNs) in oil and gas operations. It examines real‐world attack scenarios, highlights key threat vectors such as spoofing and malware, and outlines best practices for securing WSNs within industrial control environments.
Ali Sayghe
wiley   +1 more source

A genealogy of hacking [PDF]

open access: yes, 2016
Hacking is now a widely discussed and known phenomenon, but remains difficult to define and empirically identify because it has come to refer to many different, sometimes incompatible, material practices. This paper proposes genealogy as a framework for
Bamford J   +54 more
core   +1 more source

Home - About - Disclaimer - Privacy