Results 61 to 70 of about 2,097 (152)

Surveying the Hackers: The Challenges of Data Collection from a Secluded Community [PDF]

open access: yes, 2017
There are various challenges with online data collection, from participant recruitment to ensuring the integrity and representativeness of the results; and when the data is being collected from hacking communities who value privacy the challenges ...
Dogan, Huseyin   +4 more
core  

On the Efficacy of Live DDoS Detection with Hadoop

open access: yes, 2015
Distributed Denial of Service flooding attacks are one of the biggest challenges to the availability of online services today. These DDoS attacks overwhelm the victim with huge volume of traffic and render it incapable of performing normal communication ...
Ali, Usman, Hameed, Sufian
core   +1 more source

Cybercrime: a theoretical overview of the growing digital threat [PDF]

open access: yes, 2016
This theoretical paper is published by the EUCPN Secretariat in connection with the theme of the Luxembourgian presidency which was cybercrime. Cybercrime is a global definition which characterizes many different criminal forms committed in the virtual ...
Verleysen, Cindy
core   +1 more source

Le singulier, le pluriel et le général

open access: yesSociologies, 2019
This article aims to distinguish the processes of individuation, individualization, personification and, finally, personalization, which every individual has to go through in order to become a « person ».
Laurence Kaufmann
doaj  

4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community

open access: yes, 2011
We present two studies of online ephemerality and anonymity based on the popular discussion board /b/ at 4chan.org: a website with over 7 million users that plays an influential role in Internet culture.
André, Paul   +5 more
core   +1 more source

How to Become War Machine, Or … A Low Hacktivist (Un)Methodology in Pieces [PDF]

open access: yesNetworking Knowledge: Journal of the MeCCSA Postgraduate Network, 2016
In recent years, digital media and networks have been increasingly used to deploy dissent, opposition and resistance. More frequently, beyond traditional media as communicational tools, politically-oriented hacking subjectivities like ‘Anonymous’ employ media as weapons.
openaire   +2 more sources

Cybersecurity: a critical priority for digital mental health. [PDF]

open access: yesFront Digit Health, 2023
Inkster B, Knibbs C, Bada M.
europepmc   +1 more source

Cyborg Activism: Exploring the reconfigurations of democratic subjectivity in Anonymous [PDF]

open access: yes, 2018
This article develops the concept of cyborg activism as novel configuration of democratic subjectivity in the Information Age by exploring the online collectivity Anonymous as a prototype.
Boellstorff T   +21 more
core   +2 more sources

Piensa globalmente, actúa localmente: mapeo de la cultura libre en un sistema mediático híbrido [PDF]

open access: yes, 2019
From the nineties, the Internet has been providing new political hybrid action forms. At the same time, some communities make a disruptive use of technologies aiming to subvert network power relationships at the current capitalized and centralized ...
Calvo, Dafne, Campos Domínguez, Eva
core   +1 more source

Pertanggungjawaban Pidana Hacktivist dalam Perspektif Hukum Pidana di Indonesia

open access: yesPAMPAS: Journal of Criminal Law
This article aims to analyze the criminal liability of hacktivists in Indonesia. In an increasingly advanced digital era, hacktivism has become a significant phenomenon in cyberspace. Hacktivists are individuals or groups who use hacking techniques to voice socio-political ambitions or convey ideological messages related to issues that occur in society.
Maharani, Puan   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy