Results 41 to 50 of about 3,809 (177)

Firms’ Response to Slacktivism: When and Why are E‐Petitions Effective?

open access: yesJournal of Management Studies, Volume 61, Issue 7, Page 3148-3183, November 2024.
Abstract E‐petitions have evoked an important debate about the potential for digital activism to pressure firms to change social policies and practices. One prevailing perspective is that slacktivism, a tendency of online supporters to provide only token support, undermines any possible impact.
Ronei Leonel   +3 more
wiley   +1 more source

Tantangan dan Peluang Menghadapi Ekonomi Reputasi dalam Perspektif Media Sosial

open access: yesJKG (Jurnal Komunikasi Global), 2020
Tingkat reputasi telah menjadi suatu tolak ukur dalam menentukan perekonomian organisasi. Konten-konten di media sosial dipertimbangkan sebagai komponen yang membangun reputasi suatu organisasi. Hal tersebut menyebabkan berbagai organisasi berlomba untuk
Shiddiq Sugiono
doaj   +1 more source

Parliament, petitions and pandemic: Conspiracism in Australia's federal e‐petitions system, 2020−2021

open access: yesPolicy &Internet, Volume 16, Issue 3, Page 485-508, September 2024.
Abstract During the COVID‐19 pandemic, some groups and individuals rearticulated state power through conspiracy theories. Despite their fringe status, conspiracy theory beliefs can directly animate citizen's engagements with institutions. Drawing on Barkun's ‘conventional’ and ‘stigmatised’ knowledge types, we analyse the appearance of conspiracism in ...
Ben Lyall, Patrick Marple
wiley   +1 more source

Hacking Threat in Arab Cyberspace: Appraisal Analysis on Al-Hakirz Al-Muslimun’s Hacktivism Narratives

open access: yesJournal of Languages and Language Teaching
This research aims to describe the negotiation of the attitude of the hacker group الهاكرز المسلمون (al-hākirz al-muslimūn) 'Muslim hackers' (MH) in the narrative of their hacking threats to the governments of Sweden, Australia and Israel.
Reflinaldi Reflinaldi   +3 more
doaj   +1 more source

Tracking, calculating, watching: Governing and delay in the Jakarta Smart City

open access: yesTransactions of the Institute of British Geographers, Volume 49, Issue 2, June 2024.
Short Abstract This paper examines efforts by the Jakarta Smart City to govern the challenges of flooding, traffic and waste management in the context of climate change and urbanisation. Where smart cities promise speed and real‐time efficiency, we instead find temporal relations of delay that push action further into the future.
Sophie Webber   +2 more
wiley   +1 more source

Entre o controle e o ativismo hacker: a ação política dos Anonymous Brasil

open access: yesHistória, Ciências, Saúde: Manguinhos
Resumo Este trabalho trata da ação política dos Anonymous, principal expressão do ativismo hacker atual, argumentando que o hacktivismo se configura como uma forma de resistência política nas sociedades de controle.
Murilo Bansi Machado
doaj   +1 more source

Gentlemen, you can't fight in here. Or can you?: How cyberspace operations impact international security 先生们,你们不能在这里打架。你们能吗?:网络空间操作如何影响国际安全 Caballeros, no pueden pelear aquí. ¿O puedes?: Cómo las operaciones del ciberespacio impactan la seguridad internacional

open access: yesWorld Affairs, Volume 187, Issue 1, Page 24-36, Spring 2024.
Abstract The military now views cyberspace as a new warfare domain, with constant cyber operations potentially causing significant consequences. Internationally, countries are heavily involved in cyberspace, but international law lags behind this evolution, raising questions about its application and retaliation measures.
Sam Maesschalck
wiley   +1 more source

Cybersecurity carrots and sticks

open access: yesAmerican Business Law Journal, Volume 61, Issue 1, Page 5-29, Spring 2024.
Abstract In an unsustainable trend, each year is touted as the worst on record for data and system breaches. 2020's dubious top distinction was exceeded across numerous metrics in 2021, and 2022's numbers set another unwanted record. The growing epidemic of ransomware, data breaches, and cyber‐enabled attacks pushes policymakers and business leaders to
Janine Hiller   +2 more
wiley   +1 more source

Anonymous's Glory

open access: yesInternational Journal of Communication, 2020
Hannah Arendt is unusual among contemporary political theorists for many reasons, not least of which is her apparent praise for the pursuit of glory. Yet, far from arguing for its enduring relevance, Arendt seems to suggest the pursuit is obsolete, as ...
Ashley E. Gorham
doaj   +2 more sources

A statistical approach for assessing cyber risk via ordered response models

open access: yesRisk Analysis, Volume 44, Issue 2, Page 425-438, February 2024.
Abstract Proper evaluation of the risk associated to a cyber attack is a crucial aspect for many companies. There is an increasing need to plan for and implement effective ways to address cyber security, data security, and privacy protection. Estimating the risk of a successful cyber attack is an important issue, since this type of threat is ...
Silvia Facchinetti   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy