Search results
1 – 10 of 114Using the Internet as a means of registering discontent with politicians, policies and groups is a growing phenomenon. There are various ways of manifesting protest on the…
Abstract
Using the Internet as a means of registering discontent with politicians, policies and groups is a growing phenomenon. There are various ways of manifesting protest on the Internet, including building protest sites, cyber‐squatting, defacing Web sites and organising denial of service attacks. Some of these methods are extremely effective, being cheap to use and requiring limited technical ability. Others err on the wrong side of the law and involve full‐scale hacking. Overall, hacktivism can be a productive part of the political process.
Details
Keywords
Matthew Warren and Shona Leitch
The aim of the paper is to assess the hacktivist group called the Syrian Electronic Army and determine what their motivations in terms of ethical and poetical motivations.
Abstract
Purpose
The aim of the paper is to assess the hacktivist group called the Syrian Electronic Army and determine what their motivations in terms of ethical and poetical motivations.
Design/methodology/approach
This paper looks at chronological examples of Syrian Electronic Army activities and assess them using a developed hacktivist criteria to try and gain a greater understanding of the motivations of the Syrian Electronic Army. The paper uses a netnography research approach.
Findings
This paper determines that the Syrian Electronic Army is motivated to protect the Syrian Government. This protection is highlighted by the new media and social media organisations that the Syrian Electronic Army attacks online.
Research limitations/implications
This paper focuses only on one group the Syrian Electronic Army.
Practical implications
A greater understanding of the Syrian Electronic Army.
Social implications
A greater understanding of the development of hacktivism.
Originality/value
A unique study into the motivation of the Syrian Electronic Army.
Details
Keywords
A research project exploring emerging student needs explored six aspects of student life: living, learning, working, playing, connecting and participating. Participating is…
Abstract
Purpose
A research project exploring emerging student needs explored six aspects of student life: living, learning, working, playing, connecting and participating. Participating is explored here. This aspect focuses on the ways that students may become active citizens by participating in civic life. Insights are gained as to how students may engage with universities and governments and how they will contribute to the public sphere. Themes such as voting, (h)activism, transparency and digital strategies to improve governance are explored. This paper aims to summarize two scenarios about the Participating domain from the Student Needs 2025+ project and highlight implications for the future of higher education.
Design/methodology/approach
A modified version of the University of Houston’s “Framework Foresight” method was used to explore the future of six aspects of future student life.
Findings
The ability of students and citizens to innovate and affect change should not be underestimated. The maker movement and the “life hacking” meme are symbols of the hidden societal energy available to governments to improve the world and solve our pressing issues. For this to be effective, the role of the hacker, and hacktivism in general as a form of civic participation, should be reframed as a positive contributor of change. The relationship between governing bodies and activism is at a crossroads. The current age of interconnectivity offers tremendous potential for governing bodies to include civil contributions and innovation in a powerful, net-positive way. However, the status quo is so often the opposite and those who are being governed are perceived as a threat. There is a need for key players and leaders to creatively act according to innovative paradigms and principles that strategically reconcile the hacked and the hacking for the greater good of society.
Research limitations/implications
In terms of research limitations, the paper is focused on the needs of students and does not purport to be an exhaustive analysis of all of the issues influencing higher education. It views the future of higher education through the lens of students and their emerging needs.
Originality/value
This paper explores student life in its totality as a way to more accurately identify student needs in the future.
Details
Keywords
The changing nature of cybercrime -- and law enforcement response.
Details
DOI: 10.1108/OXAN-DB234015
ISSN: 2633-304X
Keywords
Geographic
Topical
Caner Asbaş and Şule Tuzlukaya
A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change…
Abstract
A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change, disable or eliminate information, or to breach computer information systems, computer networks, and computer infrastructures. Cyberattackers gain a benefit from victims, which may be criminal such as stealing data or money, or political or personal such as revenge. In cyberattacks, various targets are possible. Some potential targets for businesses include business and customer financial data, customer lists, trade secrets, and login credentials.
Cyberattackers use a variety of methods to gain access to data, including malware such as viruses, worms, and spyware and phishing methods, man-in-the-middle attacks, denial-of-service attacks, SQL injection, zero-day exploit, and DNS tunneling.
Related to cyberattack, the term cyberwarfare is gaining popularity nowadays. Cyberwarfare is the use of cyberattacks by a state or an organization to cause harm as in warfare against another state's or organization's computer information systems, networks, and infrastructures.
Military, civil, and ideological motivations, or hacktivism can be used to launch a cyberwarfare. For these reasons, cyberwarfare may be used to conduct espionage, sabotage, propaganda, and economic disruption.
Considering highly digitalized business processes such as e-mails, digital banking, online conference, and digital manufacturing methods, damage of cyberwarfare to businesses and countries are unavoidable. As a result, developing strategies for defending against cyberattacks and cyberwarfare is critical for businesses. The concepts of cyberattack and cyberwarfare, as well as business strategies to be protected against them will be discussed in this chapter.
Details
Keywords
Craig A. Talmage, Kaleb Boyl and T. Alden Gassert
Entrepreneurship is ubiquitous, but it is not unequivocally a human force for social and economic good. Critical perspectives of the entrepreneur, entrepreneurship, and…
Abstract
Entrepreneurship is ubiquitous, but it is not unequivocally a human force for social and economic good. Critical perspectives of the entrepreneur, entrepreneurship, and entrepreneurial success (and failure) are evolving in the scholarly literature. Dark side theory has emerged as a language for critiquing the dominant narratives of entrepreneurship portrayed in scholarship, education, planning, policy, and other forms of practice. This chapter draws from dark side entrepreneurship theory, Baumolian entrepreneurship, and exemplars of counterculture to craft language for an emerging theory of misfit entrepreneurship, which consists of misfit entrepreneurs and alternative enterprises. Alternative enterprises and misfit entrepreneurs are conceptualized, and literary examples (i.e., Robin Hood and Song Jiang) and modern-day examples (i.e., Hacker groups) are supplied. The unique actions and impacts of misfit entrepreneurs and alternative enterprises are offered for discussion. This new theory of misfit entrepreneurship leaves readers with exploratory questions that enhance critical perspectives and modern understandings of entrepreneurship today.
Details
Keywords
The empirical record of cyberattacks features much computer crime, espionage and hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose of…
Abstract
Purpose
The empirical record of cyberattacks features much computer crime, espionage and hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose of this article is to explain the absence of serious adverse consequences to date and the durability of this trend.
Design/methodology/approach
This paper combines concepts from international relations theory and new institutional economics to understand cyberspace as a complex global institution with contracts embodied in both software code and human practice. Constitutive inefficiencies (market and regulatory failure) and incomplete contracts (generative features and unintended flaws) create the vulnerabilities that hackers exploit. Cyber conflict is a form of cheating within the rules, rather than an anarchic struggle, more like an intelligence-counterintelligence contest than traditional war.
Findings
Cyber conflict is restrained by the collective sociotechnical constitution of cyberspace, where actors must cooperate to compete. Maintenance of common protocols and open access is a condition for the possibility of attack, and successful deceptive exploitation of these connections becomes more difficult in politically sensitive situations as defense and deterrence become more feasible. The distribution of cyber conflict is, thus, bounded vertically in severity but unbounded horizontally in the potential for creative exploitation.
Originality/value
Cyber conflict can be understood with familiar political economic concepts applied in fresh ways. This application provides counterintuitive insights at odds with prevalent threat narratives about the likelihood and magnitude of cyber conflict. It also highlights the important advantages of strong states over the weaker non-state actors widely thought to be empowered by cyberspace.
Details
Keywords
The purpose of this paper is to identify how the management structure of cybercriminals has changed and will continue to be revised in the future as their criminal business models…
Abstract
Purpose
The purpose of this paper is to identify how the management structure of cybercriminals has changed and will continue to be revised in the future as their criminal business models are modified. In the early days of hacktivism, a distinction was made between a “hacker” and a “cracker”. The hacker was considered someone who was interested in the vulnerabilities in a computer system, but they were not out to exploit these vulnerabilities for illicit gains. Today, this is no longer true, as loosely coordinated gangs of computer hackers exploit vulnerabilities of financial institutions and the public to steal and transfer money across borders without difficulty.
Design/methodology/approach
The paper reviews legal cases dealing with the computer theft of assets from financial institutions and individuals. The focus is on external exploits of hackers not on employee’s theft of assets. It explores the management structure used by cybercriminals who have been caught and prosecuted by legal authorities in the USA and other countries. The paper discusses how this management structure has evolved from older traditional crime business models based on “family” relationships to morphing criminal gangs based in Russia, the Ukraine and other locations almost untouchable by the US legal authorities. These new criminal networks are based on knowledge relationships and quickly disappearing network connections. The paper concludes with a discussion regarding the management structure cybercriminals will follow in the future, as they continue their criminal activities.
Findings
The study provides indications of a trend toward more complex management and organizational structures among cybergangs.
Originality/value
Although there are many annual studies identifying the growth of cybercrime and the types of attacks being made, but there is not even a single study that shows how the cybercrime business model has changed over the past 20 years. From that perspective, the paper provides information of a changing and more effective business model for cyberattacks.
Details
Keywords
David Douglas, José Jair Santanna, Ricardo de Oliveira Schmidt, Lisandro Zambenedetti Granville and Aiko Pras
This paper aims to examine whether there are morally defensible reasons for using or operating websites (called ‘booters’) that offer distributed denial-of-service (DDoS) attacks…
Abstract
Purpose
This paper aims to examine whether there are morally defensible reasons for using or operating websites (called ‘booters’) that offer distributed denial-of-service (DDoS) attacks on a specified target to users for a price. Booters have been linked to some of the most powerful DDoS attacks in recent years.
Design/methodology/approach
The authors identify the various parties associated with booter websites and the means through which booters operate. Then, the authors present and evaluate the two arguments that they claim may be used to justify operating and using booters: that they are a useful tool for testing the ability of networks and servers to handle heavy traffic, and that they may be used to perform DDoS attacks as a form of civil disobedience on the internet.
Findings
The authors argue that the characteristics of existing booters disqualify them from being morally justified as network stress testing tools or as a means of performing civil disobedience. The use of botnets that include systems without the permission of their owners undermines the legitimacy of both justifications. While a booter that does not use any third-party systems without permission might in principle be justified under certain conditions, the authors argue that it is unlikely that any existing booters meet these requirements.
Practical/implications
Law enforcement agencies may use the arguments presented here to justify shutting down the operation of booters, and so reduce the number of DDoS attacks on the internet.
Originality/value
The value of this work is in critically examining the potential justifications for using and operating booter websites and in further exploring the ethical aspects of using DDoS attacks as a form of civil disobedience.
Details
Keywords