Results 51 to 60 of about 3,809 (177)
Cybercrime: a theoretical overview of the growing digital threat [PDF]
This theoretical paper is published by the EUCPN Secretariat in connection with the theme of the Luxembourgian presidency which was cybercrime. Cybercrime is a global definition which characterizes many different criminal forms committed in the virtual ...
Verleysen, Cindy
core +1 more source
An NLP‐Based Framework to Spot Extremist Networks in Social Media
Governments and law enforcement agencies (LEAs) are increasingly concerned about growing illicit activities in cyberspace, such as cybercrimes, cyberespionage, cyberterrorism, and cyberwarfare. In the particular context of cyberterrorism, hostile social manipulation (HSM) represents a strategy that employs different manipulation methods, mostly through
Andrés Zapata Rozo +5 more
wiley +1 more source
An analysis of security issues in building automation systems [PDF]
The purpose of Building Automation Systems (BAS) is to centralise the management of a wide range of building services, through the use of integrated protocol and communication media.
Johnstone, Michael N, Peacock, Matthew D
core +2 more sources
Self-organization of Citizens in the Age of Digital Communications
The article addresses the issue of civic participation in online communities. It is shown that modern network technologies make it easy to combine institutionalized forms of civic participation with informal practices through social media.
I. A. Bronnikov
doaj +1 more source
Groups Online: Hacktivism and Social Protest [PDF]
Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online ..
McAlaney, John, Thackray, Helen
core
Wishing to be Like the Character on Screen: Media Exposure and Perception of Hacking Behavior
This research addressed whether exposure to media, which increasingly portrays hacker characters across diverse media domains, may predict perceptions of others’ willingness to hack.
Sarah Staggs +2 more
doaj +1 more source
When States Strike Back: Failures of Mediatized Activism in Azerbaijan and Turkey
This article is a theoretical investigation of the failures of oppositional online movements in the year 2011 in Azerbaijan and Turkey. Through the analysis of a set of specific cases, namely the complete dispersion of social media based opposition in ...
Ilkin Mehrabov
doaj +1 more source
The first part analises the problem of temporary citizenship through the case of !Mediengruppe Bitnik’s Random Darknet Shopper, a piece of hactivism art that has been initially arrested by police, then released. The semiotic concept of discursive regimes is here used to inspect the conflicts between the legal, the artist and the technical istances that
openaire +2 more sources
The social psychology of cybersecurity [PDF]
Cybersecurity incidents may seem very technological in nature, but ultimately the hackers and the organisations they target are people, with their own goals, influences and beliefs.
McAlaney, John +2 more
core
Social Psychology: An under-used tool in Cybersecurity [PDF]
In cyber-security the weakest link is often seen as the human factor. This has led to discussions about the optimal methods in preventing cyber security breaches.
Dogan, H. +4 more
core +1 more source

