Results 51 to 60 of about 3,809 (177)

Cybercrime: a theoretical overview of the growing digital threat [PDF]

open access: yes, 2016
This theoretical paper is published by the EUCPN Secretariat in connection with the theme of the Luxembourgian presidency which was cybercrime. Cybercrime is a global definition which characterizes many different criminal forms committed in the virtual ...
Verleysen, Cindy
core   +1 more source

An NLP‐Based Framework to Spot Extremist Networks in Social Media

open access: yesComplexity, Volume 2024, Issue 1, 2024.
Governments and law enforcement agencies (LEAs) are increasingly concerned about growing illicit activities in cyberspace, such as cybercrimes, cyberespionage, cyberterrorism, and cyberwarfare. In the particular context of cyberterrorism, hostile social manipulation (HSM) represents a strategy that employs different manipulation methods, mostly through
Andrés Zapata Rozo   +5 more
wiley   +1 more source

An analysis of security issues in building automation systems [PDF]

open access: yes, 2014
The purpose of Building Automation Systems (BAS) is to centralise the management of a wide range of building services, through the use of integrated protocol and communication media.
Johnstone, Michael N, Peacock, Matthew D
core   +2 more sources

Self-organization of Citizens in the Age of Digital Communications

open access: yesКонтуры глобальных трансформаций: политика, экономика, право, 2020
The article addresses the issue of civic participation in online communities. It is shown that modern network technologies make it easy to combine institutionalized forms of civic participation with informal practices through social media.
I. A. Bronnikov
doaj   +1 more source

Groups Online: Hacktivism and Social Protest [PDF]

open access: yes, 2018
Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online ..
McAlaney, John, Thackray, Helen
core  

Wishing to be Like the Character on Screen: Media Exposure and Perception of Hacking Behavior

open access: yesCyberpsychology: Journal of Psychosocial Research on Cyberpspace
This research addressed whether exposure to media, which increasingly portrays hacker characters across diverse media domains, may predict perceptions of others’ willingness to hack.
Sarah Staggs   +2 more
doaj   +1 more source

When States Strike Back: Failures of Mediatized Activism in Azerbaijan and Turkey

open access: yestripleC: Communication, Capitalism & Critique, 2016
This article is a theoretical investigation of the failures of oppositional online movements in the year 2011 in Azerbaijan and Turkey. Through the analysis of a set of specific cases, namely the complete dispersion of social media based opposition in ...
Ilkin Mehrabov
doaj   +1 more source

Hacktivism/Sexual Tourism

open access: yes, 2023
The first part analises the problem of temporary citizenship through the case of !Mediengruppe Bitnik’s Random Darknet Shopper, a piece of hactivism art that has been initially arrested by police, then released. The semiotic concept of discursive regimes is here used to inspect the conflicts between the legal, the artist and the technical istances that
openaire   +2 more sources

The social psychology of cybersecurity [PDF]

open access: yes, 2016
Cybersecurity incidents may seem very technological in nature, but ultimately the hackers and the organisations they target are people, with their own goals, influences and beliefs.
McAlaney, John   +2 more
core  

Social Psychology: An under-used tool in Cybersecurity [PDF]

open access: yes, 2016
In cyber-security the weakest link is often seen as the human factor. This has led to discussions about the optimal methods in preventing cyber security breaches.
Dogan, H.   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy