50 shades of hacking: how IT and cybersecurity industry actors perceive good, bad, and former hackers
In: Contemporary security policy, Band 41, Heft 1, S. 108-128
ISSN: 1352-3260, 0144-0381
10 Ergebnisse
Sortierung:
In: Contemporary security policy, Band 41, Heft 1, S. 108-128
ISSN: 1352-3260, 0144-0381
World Affairs Online
In: Contemporary security policy, Band 41, Heft 1, S. 108-128
ISSN: 1743-8764
In: Political studies review, Band 14, Heft 4, S. 600-601
ISSN: 1478-9302
In: New media & society: an international and interdisciplinary forum for the examination of the social dynamics of media and information change, Band 18, Heft 8, S. 1599-1615
ISSN: 1461-7315
This research explores hacktivism as a new form of online political activism. It uses qualitative interviews with a gender-equal sample of 10 self-defined hacktivists to address issues of gender and the discursive strategies used by males and females to handle the hacktivist community's male-only stereotype. The semi-structured interviews are analysed using Foucauldian discourse analysis (FDA). The analysis indicates that male hacktivists relate to this dominant male-only representation through discursive techniques such as the suppression of gender (Male Oblivious Discourse) or mechanisms of vindication (Male Justification Discourse). Female hacktivists use the accentuation of gender and sexism to counteract male-dominant discourses and establish Female Discourses of Resistance (Emphasis Discourse; Negation Discourse). These gender-related argumentative positions and rhetorical mechanisms demonstrate how the male-only stereotype is created and maintained and how it affects not only hacktivists' talk and sense-making but also their identity and the hacktivist actions they perform.
In: Global policy: gp, Band 9, Heft S3, S. 60-66
ISSN: 1758-5899
AbstractOngoing efforts by state actors to collaborate on addressing the challenges of global cybersecurity have been slow to yield results. Technical expert communities such as Computer Security and Incident Response Teams (CSIRTs) have played a fundamental role in maintaining the Internet's functional structure through transnational collaboration. Responsible for security incident management and located in diverse constituencies, these coordination centres engage in joint responses and solve day‐to‐day cybersecurity problems through diverse national, regional and international networks. This article argues that CSIRTs form an epistemic community that engages in science diplomacy, at times navigating geopolitical tensions in a way that political actors are not able to. Through interviews with CSIRT representatives, we explain how their collaborative actions, rooted in shared technical knowledge, norms and best practices, contribute to the advancement of international cooperation on cybersecurity.
In: Journal of global security studies, Band 1, Heft 4, S. 346-355
ISSN: 2057-3189
In: Journal of family violence
ISSN: 1573-2851
Abstract
Purpose
Technology-facilitated domestic abuse (TFDA) is a prevalent form of domestic abuse. While police are recognized as critical first responders to intimate partner violence, there is limited research about what the challenges to policing TFDA are perceived to be and how they might be addressed. This article speaks to this issue.
Methods
Between April 2020 and June 2022, n = 196 Australian and n = 256 United Kingdom representatives of services engaged with domestic abuse victim-survivors participated in an online survey about TFDA. Survey components asked respondents to report on challenges to policing TFDA. The authors analyzed these comments.
Results
Key themes identified from the survey responses regarding challenges to policing TFDA include that participants held perceptions that (a) police do not recognize TFDA as an aspect of coercive control and thus do not recognize its seriousness, (b) police receive inadequate training about TFDA, (c) police have insufficient time and personnel to tackle TFDA and (d) evidence collection is an obstacle to policing TFDA.
Conclusions
The study points to a need to address the perceived concerns associated with policing TFDA to effectively respond to domestic abuse in the digital age and ensure domestic abuse perpetrators who misuse emerging technologies are held accountable.
In: Journal of family violence, Band 38, Heft 6, S. 1205-1224
ISSN: 1573-2851
Abstract
Purpose
Computational text mining methods are proposed as a useful methodological innovation in Intimate Partner Violence (IPV) research. Text mining can offer researchers access to existing or new datasets, sourced from social media or from IPV-related organisations, that would be too large to analyse manually. This article aims to give an overview of current work applying text mining methodologies in the study of IPV, as a starting point for researchers wanting to use such methods in their own work.
Methods
This article reports the results of a systematic review of academic research using computational text mining to research IPV. A review protocol was developed according to PRISMA guidelines, and a literature search of 8 databases was conducted, identifying 22 unique studies that were included in the review.
Results
The included studies cover a wide range of methodologies and outcomes. Supervised and unsupervised approaches are represented, including rule-based classification (n = 3), traditional Machine Learning (n = 8), Deep Learning (n = 6) and topic modelling (n = 4) methods. Datasets are mostly sourced from social media (n = 15), with other data being sourced from police forces (n = 3), health or social care providers (n = 3), or litigation texts (n = 1). Evaluation methods mostly used a held-out, labelled test set, or k-fold Cross Validation, with Accuracy and F1 metrics reported. Only a few studies commented on the ethics of computational IPV research.
Conclusions
Text mining methodologies offer promising data collection and analysis techniques for IPV research. Future work in this space must consider ethical implications of computational approaches.
In: New media & society: an international and interdisciplinary forum for the examination of the social dynamics of media and information change, Band 23, Heft 10, S. 2861-2881
ISSN: 1461-7315
The right to data portability (RtDP), as outlined in the European Union's General Data Protection Regulation (GDPR), enables data subjects to transmit their data from one service to another. This is of particular interest in the evolving Internet of Things (IoT) environment. This research delivers the first empirical analysis detailing the exercisability of the RtDP in the context of consumer IoT devices and the information provided to users about exercising the right. In Study 1, we reviewed 160 privacy policies of IoT producers to understand the level of information provided to a data subject. In Study 2, we tested four widely available IoT systems to examine whether procedures are in place to enable users to exercise the RtDP. Both studies showcase how the RtDP is not yet exercisable in the IoT environment, risking consumers being unable to unlock the long-term benefits of IoT systems.
In: International studies perspectives: ISP
ISSN: 1528-3585
AbstractThe Internet and digital technologies have become indispensable in academia. A world without email, search engines, and online databases is practically unthinkable. Yet, in this time of digital dependence, the academy barely demonstrates an appetite to reflect upon the new challenges that digital technologies have brought to the scholarly profession. This forum's inspiration was a roundtable discussion at the 2017 International Studies Association Annual Convention, where many of the forum authors agreed on the need for critical debate about the effects of online surveillance and censorship techniques on scholarship. This forum contains five critiques regarding our digitized infrastructures, datafied institutions, mercenary corporations, exploitative academic platforms, and insecure online practices. Together, this unique collection of articles contributes to the research on academic freedom and helps to frame the analysis of the neoliberal higher education sector, the surveillance practices that students and staff encounter, and the growing necessity to improve our "digital hygiene."