Results 61 to 70 of about 3,809 (177)
In an era of surveillance and big data, we aim to interpret resistance strategies and tactics beyond the individuals and groups that employ them. We propose a model for interpreting resistance, covering power asymmetries between different actors, and ...
Jaseff Raziel Yauri Miranda +2 more
doaj +1 more source
Proxy of democracy? : metaphors of connection as arguments against representation [PDF]
This paper aims to assess the arguments that claim representative democracy may be enhanced or replaced by an updated electronic version. Focusing on the dimension of elections and electioneering as the core mechanism of representative democracy I will ...
Cuono, Massimo
core
Securing the Anthropocene? International Policy Experiments in Digital Hacktivism: A Case Study of Jakarta [PDF]
This article analyses security discourses that are beginning to self-consciously take on board the shift towards the Anthropocene. Firstly, it sets out the developing episteme of the Anthropocene, highlighting the limits of instrumentalist cause-and ...
Abrahamsen R +47 more
core +1 more source
Players of the massively multiplayer online role-playing game World of Warcraft (WoW) are accustomed to a transformative culture that appropriates off-line events and personas into virtual-world representations inside of the game. Following this culture,
Lauren B. Collister
doaj +1 more source
(De)Centralization of the Global Informational Ecosystem
Centralization and decentralization are key concepts in debates that focus on the (anti)democratic character of digital societies. Centralization is understood as the control over communication and data flows, and decentralization as giving it (back) to ...
Johanna Möller, M. Bjørn von Rimscha
doaj +1 more source
Teaching Sensitive Issues in Cyberpsychology [PDF]
In contrast to the helpful sources of guidance and regulations for researchers designing and conducting experiments in cyberpsychology, there is very little guidance available for academics and teachers teaching sensitive issues related to behavior in ...
Cole, Terri +3 more
core
Cyber Attacks and Combat Behavior [PDF]
Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages.
Carataș Maria Alina +2 more
doaj
For the Lulz: Anonymous, Aesthetics and Affect
The focus of this paper is on different but connected areas of power – relating to things such as economic globalisation, surveillance, censorship/freedom, ‘terrorism’ and/or specific military activity – visually represented through online media, and ...
Rodrigo Ferrada Stoehrel, Simon Lindgren
doaj +1 more source
Reality bytes: cyberterrorism and terrorist 'use' of the Internet [PDF]
This paper examines the concept of cyberterrorism. Fringe activity on the Internet ranges from non-violent 'Use' at one end to 'Cyberterrorism' at the other.
Conway, Maura
core
The Epistemic Dimensions of Civil Disobedience
Journal of Political Philosophy, Volume 32, Issue 1-4, Page 77-97, March‐December 2024.
Alexander Bryan
wiley +1 more source

