Hacktivists, Proxy Groups, Cyber Volunteers
This paper explores the involvement of hacktivists, cyber volunteers and proxy groups in military cyber operations, with a particular focus on their roles in the ongoing Russian–Ukrainian war. The research aims to analyse the participation of these non-state actors, their legal implications, and how their involvement could influence the strategic ...
openaire +1 more source
Hacktivists or Cyberterrorists? The Changing Media Discourse on Hacking
This paper scrutinizes the language of government reports and news media sources to shed light on their role in forming a negative image of politically motivated hacking in general, and online political activism, in particular. It is argued that the mass media's portrayal of hacking conveniently fits the elite's strategy to form a popular consensus in
openaire +1 more source
Word-formation and word-creation: A datadriven exploration of inventiveness in neologisms [PDF]
Some neologisms attract our attention by their inventiveness, while others pass unnoticed. This article reports on an exploration of the concept of inventiveness in lexicogenesis. Inventiveness is not currently a notion present in morphological research,
Arnaud, Pierre J. L.
core
Vigilante Media: Unveiling Anonymous and the Hacktivist Persona in the Global Press [PDF]
Since 2008, Anonymous has been a rising presence in global affairs, although the group has remained relatively hidden behind the margins of media scrutiny. This study uses content and frame analysis from the review of 200 articles in 10 countries to examine the reception of Anonymous in the global press.
openaire +1 more source
Towards digital organized crime and digital sociology of organized crime. [PDF]
Di Nicola A.
europepmc +1 more source
Government secrecy and the task of meta-journalists [PDF]
This article is by Polis Summer School student Alessandra Bocchi In a debate with Noam Chomsky, social theorist Michel Foucault enounced the objective of modernity: to criticize unquestioned institutional norms in our society so that one can realise the ...
Bocci, Alessandra
core
Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations. [PDF]
Alqudhaibi A +4 more
europepmc +1 more source
Common Motivations and Personality Types of Cyber Terrorists [PDF]
According to the Federal Bureau of Investigations, “The CSIS has defined it (cyber terror) as the use of computer network tools to shutdown critical national infrastructures or to coerce or intimidate a government or civilian population” (Tafoya, 2011 ...
Floyd, Amanda
core +1 more source
Role of analytical testing for food fraud risk mitigation - A commentary on implementation of analytical fraud testing: Role of analytical testing for food fraud mitigation. [PDF]
Butler F +4 more
europepmc +1 more source
How Biomedical Citizen Scientists Define What They Do: It's All in the Name. [PDF]
Trejo M +3 more
europepmc +1 more source

