Results 121 to 130 of about 2,097 (152)
Design principles for essentially digital governance [PDF]
Dunleavy, Patrick, Margetts, Helen
core
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2021
Abstract Online communities have long been the sites of political mobilization. Work on these communities in relation to politics sits at the intersection of the study of social movements broadly as well as hacktivism specifically; anthropological and cultural studies of online culture, including trolling; and work focused on the ...
openaire +1 more source
Abstract Online communities have long been the sites of political mobilization. Work on these communities in relation to politics sits at the intersection of the study of social movements broadly as well as hacktivism specifically; anthropological and cultural studies of online culture, including trolling; and work focused on the ...
openaire +1 more source
Securing Critical National Infrastructure Against Hacktivist
Advances in Multidisciplinary and scientific Research Journal Publication, 2022The acts of hacktivists in today's modern world might have extremely negative repercussions for the order and peace of countries. Hacktivists, by the very nature of their methodology, invariably target important government installations. This research focuses mostly on investigating the myriad of approaches that may be taken to cyber-secure important ...
openaire +1 more source
When 'Hacktivists' Target Your Hospital
New England Journal of Medicine, 2014Earlier this year, Boston Children's Hospital was targeted in a sustained cyberattack purportedly instigated by the hacker group known as Anonymous — an event that may carry lessons for other health care organizations that now rely heavily on electronic systems.
openaire +2 more sources
The Syrian Electronic Army – a hacktivist group
Journal of Information, Communication and Ethics in Society, 2016Purpose The aim of the paper is to assess the hacktivist group called the Syrian Electronic Army and determine what their motivations in terms of ethical and poetical motivations. Design/methodology/approach This paper looks at chronological examples of Syrian Electronic Army activities and assess them using a developed hacktivist criteria to try ...
Matthew Warren, Shona Leitch
openaire +1 more source
THE INFOCARTOGRAPHIC ANALYSIS METHOD OF HACKTIVIST ACTION
ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, 2023Объективное понимание ландшафта угроз является необходимым условием для выработки эффективных мер предотвращения компьютерных инцидентов или снижения негативных последствий в случае их наступления. В статье предлагается метод, который обеспечивает такое понимание для угроз, связанных с действиями политически мотивированных группировок (хактивистов ...
openaire +1 more source

