Search results

1 – 10 of 486
Article
Publication date: 31 May 2004

Mathias Klang

The Internet is used for every conceivable form of communication and it is therefore only natural that it should be used as an infrastructure even for protest and civil…

Abstract

The Internet is used for every conceivable form of communication and it is therefore only natural that it should be used as an infrastructure even for protest and civil disobedience. The technology however brings with it the ability to carry out new forms of protest, in new environments and also involve changed consequences for those involved. This article looks at four criminal activities, which are used as active forms of Internet based protest in use today and analysis these forms in relation to the traditional civil disobedience discourse. The analysis is done by studying four basic criteria (disobedience, civil, non‐violence and justification) found in tradition civil disobedience discourse and observing their applicability in online environments. The purpose of this article is to better understand the political protest activities carried out online and to see whether traditional civil disobedience theory embraces these new forms of political activism.

Details

Journal of Information, Communication and Ethics in Society, vol. 2 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 8 May 2018

Adebisi Arewa

This paper aims to determine the extent to which the myriad of cybercrimes is within the purview of extant Nigerian laws against the backdrop of the modicum of legal and…

Abstract

Purpose

This paper aims to determine the extent to which the myriad of cybercrimes is within the purview of extant Nigerian laws against the backdrop of the modicum of legal and institutional mechanisms available at international law for combating cybercrimes.

Design/methodology/approach

This study is library based. It relies on secondary data generated by the variegated multilateral agencies, law reports of international and municipal tribunals, relevant books, journals, monographs policy papers and so forth as the basis of analysis.

Findings

Findings suggest that cybercrimes are very difficult to unravel because their traces are imperceptible and require highly specialised skills and digital protocols to find, store and save them for evidential purposes. Such gathered evidence are in the form of digital data stored in variegated hardware and software media, such as storage peripherals, electronic components, working memory, hard discs and external discs. The difficulty is how to identify, weigh for evidential value and capture the multiplicity of evidence unearthed in a digital forensic investigation. The foregoing underscores the digital forensic problematic which is engendered by the difficulties of contriving a thoroughgoing concept of digital evidence given the malleable nature of the variegated storage media.

Practical implications

This paper engenders considerable acquaintance of the entire sphere of digital crimes and cyber threats, which is contended with in the information epoch, and recommends both legal and institutional mechanisms to counter the clear, real and present danger, which digital crimes represent for the survival of human civilisation, sustainable economic growth and development.

Originality/value

This paper dwells on the infinite potentiality of deploying the instrumentality of national and international law to deter, control and prosecute the myriad of cybercrimes.

Details

Journal of Financial Crime, vol. 25 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 9 May 2016

Matthew Warren and Shona Leitch

The aim of the paper is to assess the hacktivist group called the Syrian Electronic Army and determine what their motivations in terms of ethical and poetical motivations.

1182

Abstract

Purpose

The aim of the paper is to assess the hacktivist group called the Syrian Electronic Army and determine what their motivations in terms of ethical and poetical motivations.

Design/methodology/approach

This paper looks at chronological examples of Syrian Electronic Army activities and assess them using a developed hacktivist criteria to try and gain a greater understanding of the motivations of the Syrian Electronic Army. The paper uses a netnography research approach.

Findings

This paper determines that the Syrian Electronic Army is motivated to protect the Syrian Government. This protection is highlighted by the new media and social media organisations that the Syrian Electronic Army attacks online.

Research limitations/implications

This paper focuses only on one group the Syrian Electronic Army.

Practical implications

A greater understanding of the Syrian Electronic Army.

Social implications

A greater understanding of the development of hacktivism.

Originality/value

A unique study into the motivation of the Syrian Electronic Army.

Details

Journal of Information, Communication and Ethics in Society, vol. 14 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 14 March 2016

Kosmas Pipyros, Lilian Mitrou, Dimitris Gritzalis and Theodoros Apostolopoulos

The increasing number of cyber attacks has transformed the “cyberspace” into a “battlefield”, bringing out “cyber warfare” as the “fifth dimension of war” and emphasizing the…

2370

Abstract

Purpose

The increasing number of cyber attacks has transformed the “cyberspace” into a “battlefield”, bringing out “cyber warfare” as the “fifth dimension of war” and emphasizing the States’ need to effectively protect themselves against these attacks. The existing legal framework seem inadequate to deal effectively with cyber operations and, from a strictly legal standpoint, it indicates that addressing cyber attacks does not fall within the jurisdiction of just one legal branch. This is mainly because of the fact that the concept of cyber warfare itself is open to many different interpretations, ranging from cyber operations performed by the States within the context of armed conflict, under International Humanitarian Law, to illicit activities of all kinds performed by non-State actors including cybercriminals and terrorist groups. The paper initially presents major cyber-attack incidents and their impact on the States. On this basis, it examines the existing legal framework at the European and international levels. Furthermore, it approaches “cyber warfare” from the perspective of international law and focuses on two major issues relating to cyber operations, i.e. “jurisdiction” and “attribution”. The multi-layered process of attribution in combination with a variety of jurisdictional bases in international law makes the successful tackling of cyber attacks difficult. The paper aims to identify technical, legal and, last but not least, political difficulties and emphasize the complexity in applying international law rules in cyber operations.

Design/methodology/approach

The paper focuses on the globalization of the “cyber warfare phenomenon” by observing its evolutionary process from the early stages of its appearance until today. It examines the scope, duration and intensity of major cyber-attacks throughout the years in relation to the reactions of the States that were the victims. Having this as the base of discussion, it expands further by exemplifying “cyber warfare” from the perspective of the existing European and International legal framework. The main aim of this part is to identify and analyze major obstacles that arise, for instance in terms of “jurisdiction” and “attribution” in applying international law rules to “cyber warfare”.

Findings

The absence of a widely accepted legal framework to regulate jurisdictional issues of cyber warfare and the technical difficulties in identifying, with absolute certainty, the perpetrators of an attack, make the successful tackling of cyber attacks difficult.

Originality/value

The paper fulfills the need to identify difficulties in applying international law rules in cyber warfare and constitutes the basis for the creation of a method that will attempt to categorize and rank cyber operations in terms of their intensity and seriousness.

Details

Information & Computer Security, vol. 24 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 December 1995

Michael A. Covington

As the set of people using computers becomes larger and less cohesive, it is becoming important to educate users about their ethical responsibilities. Design of an effective…

1934

Abstract

As the set of people using computers becomes larger and less cohesive, it is becoming important to educate users about their ethical responsibilities. Design of an effective campus computer ethics policy requires awareness of numerous cultural, technical and legal issues. Especially important are the cultural splits between power users and utilitarian users, and between “old world” and “new world” philosophies of computer ethics. Discusses those issues and presents the University of Georgia’s ethics policy as a model to aid those developing similar policies at other institutions.

Details

Internet Research, vol. 5 no. 4
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 11 October 2018

Ahmed Al-Rawi, Jacob Groshek and Li Zhang

The purpose of this paper is to examine one of the largest data sets on the hashtag use of #fakenews that comprises over 14m tweets sent by more than 2.4m users.

2064

Abstract

Purpose

The purpose of this paper is to examine one of the largest data sets on the hashtag use of #fakenews that comprises over 14m tweets sent by more than 2.4m users.

Design/methodology/approach

Tweets referencing the hashtag (#fakenews) were collected for a period of over one year from January 3 to May 7 of 2018. Bot detection tools were employed, and the most retweeted posts, most mentions and most hashtags as well as the top 50 most active users in terms of the frequency of their tweets were analyzed.

Findings

The majority of the top 50 Twitter users are more likely to be automated bots, while certain users’ posts like that are sent by President Donald Trump dominate the most retweeted posts that always associate mainstream media with fake news. The most used words and hashtags show that major news organizations are frequently referenced with a focus on CNN that is often mentioned in negative ways.

Research limitations/implications

The research study is limited to the examination of Twitter data, while ethnographic methods like interviews or surveys are further needed to complement these findings. Though the data reported here do not prove direct effects, the implications of the research provide a vital framework for assessing and diagnosing the networked spammers and main actors that have been pivotal in shaping discourses around fake news on social media. These discourses, which are sometimes assisted by bots, can create a potential influence on audiences and their trust in mainstream media and understanding of what fake news is.

Originality/value

This paper offers results on one of the first empirical research studies on the propagation of fake news discourse on social media by shedding light on the most active Twitter users who discuss and mention the term “#fakenews” in connection to other news organizations, parties and related figures.

Details

Online Information Review, vol. 43 no. 1
Type: Research Article
ISSN: 1468-4527

Keywords

Abstract

Details

Digital Activism and Cyberconflicts in Nigeria
Type: Book
ISBN: 978-1-78756-014-7

Article
Publication date: 16 July 2009

Shahid Bux and Sarah Coyne

The London bombings on 7 July 2005 highlighted the prevailing terrorist threat to the UK. The present study addressed the psychological response of a community (n=294) indirectly…

Abstract

The London bombings on 7 July 2005 highlighted the prevailing terrorist threat to the UK. The present study addressed the psychological response of a community (n=294) indirectly exposed to the attacks to discern the broader impact and effects of terrorism. Qualitative content analysis was used to develop a profile of emotions and responses to the attacks. This was supplemented by the use of linguistic analysis demonstrating the enormous heterogeneity and complexity of responses to terrorism. In light of previous work on the wider impact of terrorism, the present study highlighted a relatively restrained impact of terrorism. Notwithstanding this observation, responses were marked by negative emotions, with increased use of references to others than for self. Responses also highlighted the use of psychological distancing more among white than Asian respondents, and the importance of religion, both as a supportive factor and perceived cause of the attacks, with references more prevalent among Asian respondents. Although the ubiquitous nature of negative emotions also slightly heightened reports of perceived risk, the ability of respondents to use methods of social orientation helped their ability to recover, and may be crucial in helping harness unified community‐based responses to terrorism.

Details

Journal of Aggression, Conflict and Peace Research, vol. 1 no. 2
Type: Research Article
ISSN: 1759-6599

Keywords

Article
Publication date: 1 November 2008

James S. Damico, Mark Baildon and Karen L. Lowenstein

This article examines the ways in which the authors of a text set of children’s literature constructed the United States government’s decision to drop the atomic bomb on Hiroshima…

Abstract

This article examines the ways in which the authors of a text set of children’s literature constructed the United States government’s decision to drop the atomic bomb on Hiroshima and Nagasaki during World War II. Analysis of this text set reveals the ways agency is mostly absent, displaced, or obscured through the grammatical devices of nominalization and passivization. Nominalization refers to an author’s use of verbs as nouns, and passivization refers to an author’s use of passive verbs without the presence of agents. To support teachers and students toward investigations of how authors use nominalization and passivization to construct historical events in different ways, five guiding questions about agency are presented. Grappling with these kinds of questions can engender critical reading practices of which readers can more actively enact their own agency as readers of history and as citizens in a democracy.

Details

Social Studies Research and Practice, vol. 3 no. 3
Type: Research Article
ISSN: 1933-5415

Book part
Publication date: 28 November 2017

Sonja Boon and Beth Pentney

In this chapter, we reflect on the possibilities of craftivism — yarn bombing, specifically — in a fourth-year undergraduate seminar on feminist praxis. We suggest that knitting…

Abstract

In this chapter, we reflect on the possibilities of craftivism — yarn bombing, specifically — in a fourth-year undergraduate seminar on feminist praxis. We suggest that knitting in the classroom, as an ‘everyday [act] of defiance’ (Baumgardner & Richards, 2000, p. 283), opens a productive space for complex and challenging conversations, in the process enabling not only different ways of listening, but also different ways of learning. Knitting, as a meditative and embodied practice, encourages and supports critical attentiveness. We also argue that craftivism can operate to make change in a way that emphasizes collaboration, non-violence and critical self-reflection. Social change, in a craftivist framework, happens in the everyday, and perhaps more radically, within the domestic spaces of the normatively feminine. Finally, our project demonstrated that knitting as feminist praxis serves a bridging function: we contend that systems of power may be challenged through knitting-as-protest, and that students may be able to practice engaged citizenship as they navigate the slippery borders between public and private, and academic and community-based feminisms.

Details

Global Currents in Gender and Feminisms
Type: Book
ISBN: 978-1-78714-484-2

Keywords

1 – 10 of 486