Results 1 to 10 of about 2,078 (135)

Edgework, state power, and hacktivists [PDF]

open access: yesHAU: Journal of Ethnographic Theory, 2015
Comment on Coleman, Gabriella. 2014. Hacker, hoaxer, whistleblower, spy: The many faces of Anonymous.
Fish, Adam, Follis, Luca
core   +4 more sources

Safeguarding digital livestock farming - a comprehensive cybersecurity roadmap for dairy and poultry industries [PDF]

open access: yesFrontiers in Big Data
The rapid digital transformation of dairy and poultry farming through big data analytics and Internet of Things (IoT) innovations has significantly advanced precision management of feeding, animal health, and environmental conditions.
Suresh Neethirajan, Suresh Neethirajan
doaj   +2 more sources

Gagged and Doxed: Hacktivism’s Self-Incrimination Complex [PDF]

open access: yesInternational Journal of Communication, 2016
The investigation, arrest, and conviction of a number of high-profile hacker-activists, or hacktivists, reveal the ways subjectivity is mobilized through processes of revelation and evasion.
Adam Fish, Luca Follis
doaj   +4 more sources

La scénographie numérique du discours hacktiviste des Anonymous

open access: yesCommunication, 2016
This discourse analysis looks at the digital staging of hacktivist discourse by members of Anonymous. The authors study the staging of a group of anonymous hackers who have risen to prominence through their counter-discourse and anti-government ...
Warda Baba Hamed, Sabiha Benmansour
doaj   +3 more sources

Improving Student Engagement in the Study of Professional Ethics: Concepts and an Example in Cyber Security. [PDF]

open access: yesSci Eng Ethics, 2018
In spite of the acknowledged importance of professional ethics, technical students often show little enthusiasm for studying the subject. This paper considers how such engagement might be improved.
Bustard JD.
europepmc   +3 more sources

Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions [PDF]

open access: yes, 2017
Current threat models typically consider all possible ways an attacker can penetrate a system and assign probabilities to each path according to some metric (e.g. time-to-compromise).
Allodi, Luca, Etalle, Sandro
core   +6 more sources

Principles of Stacktivism

open access: yestripleC: Communication, Capitalism & Critique, 2020
In this essay a new form of Internet activism is proposed: stacktivism. Building on hacktivist practices, this form of code and standard development as political struggle is envisioned to connect different layers of the techno-protological stack (also ...
Geert Lovink
doaj   +1 more source

Guidebook for Mirror Worlds. Poetics of Transparency in Augmented Reality

open access: yesBody, Space & Technology Journal, 2020
It denotes the feature of an interface that is able to erase itself (in the sense of ‘interface-less’), making the user experience more immediate.
Federico Biggio
doaj   +2 more sources

Analysis of some case studies on cyberattacks and proposed methods for preventing them

open access: yesRevista Română de Informatică și Automatică, 2023
The last few years have brought about a tremendous increase in the speed of technological advancement and digitalisation which led to an exponential uptick in the amount of data that is being either stored or moved across the cyberspace.
Daniel Mihai LEU   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy