Results 31 to 40 of about 2,097 (152)

Polyspatial Resistance for the Sake of the "Real" Subalterns: Electronic Civil Disobedience as a Form of Hacktivism [PDF]

open access: yes, 2009
This essay examines Electronic Disturbance Theater's virtual sit-in actions as a form of hacktivism in relation to the subaltern ...
Iskandar Zulkarnain
core   +1 more source

Humans as Data

open access: yesPress Start, 2021
The fear of humans abusing technology to control others and the sociopolitical order has been at the heart of many dystopian stories. This fear is also at the heart of Watch_Dogs 2, where the centralized city-wide management system made by the Blume ...
Kai Kehrer
doaj  

Unpacking cyberterrorism discourse: Specificity, status, and scale in news media constructions of threat [PDF]

open access: yes, 2016
This article explores original empirical findings from a research project investigating representations of cyberterrorism in the international news media.
Al-Garni   +17 more
core   +4 more sources

A Ghost Workers' Bill of Rights: How to Establish a Fair and Safe Gig Work Platform [PDF]

open access: yes, 2020
Many of us assume that all the free editing and sorting of online content we ordinarily rely on is carried out by AI algorithms — not human persons. Yet in fact, that is often not the case.
Balkin, David   +2 more
core  

Cyberactivism in Syria: Emergence, Transformation, Potentials, and Limitations

open access: yesGüvenlik Stratejileri Dergisi
The rise of the cyber domain and social media platforms has profoundly impacted the socio-political landscape in Syria, enabling cyber-activism to emerge as a potent force against authoritarian regimes.
Iyad Helwani
doaj   +1 more source

Empowering protest through social media [PDF]

open access: yes, 2011
Advances in personal communications devices including smartphones, are enabling individuals to establish and form virtual communities in cyberspace. Such platforms now allow users to be in continuous contact, enabling them to receive information in real ...
O\u27Rourke, Simon
core   +1 more source

A Machine Learning Framework for Detecting and Preventing Cyber‐Attacks in Industrial Cyber‐Physical Systems

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Proposed cyber physical system security framework. ABSTRACT The increasing adoption of cyber‐physical systems (CPS) in Industry 4.0 has heightened vulnerability to cyber threats. This study proposes a machine learning–based intrusion detection framework, DBID‐Net, to effectively identify and prevent attacks in CPS environments. The framework integrates
Anurag Sinha   +14 more
wiley   +1 more source

IoT Botnets Analysis [PDF]

open access: yes, 2017
A botnet is a set of connected devices which have been infected with malware that allows an attacker to gain remote control and coordinate their actions. Attackers most commonly use their botnets to launch DDoS (Distributed Denial of Service) attacks
Dushenok, M. S.   +2 more
core  

Social Psychology: An under-used tool in Cybersecurity [PDF]

open access: yes, 2016
In cyber-security the weakest link is often seen as the human factor. This has led to discussions about the optimal methods in preventing cyber security breaches.
Dogan, H.   +4 more
core   +1 more source

Hacktivists: Cyberterrorists or Online Activists?

open access: yes, 2012
The last decade, online activism has vastly grown. In the current digital society, from time to time citizens decide to express their opinion by attacking large corporations digitally in some way. Where the activists claim this to be a digital assembly, others see it as criminal offences.
Slobbe, J., Verberkt, S. L. C.
openaire   +2 more sources

Home - About - Disclaimer - Privacy