Privacy enhancing technology adoption and its impact on SMEs' performance
As society places greater emphasis on information privacy and data protection,
organizations are increasingly adopting Privacy Enhancing Technologies (PETs) to …
organizations are increasingly adopting Privacy Enhancing Technologies (PETs) to …
The potential harms of the Tor anonymity network cluster disproportionately in free countries
E Jardine, AM Lindner… - Proceedings of the …, 2020 - National Acad Sciences
The Tor anonymity network allows users to protect their privacy and circumvent censorship
restrictions but also shields those distributing child abuse content, selling or buying illicit …
restrictions but also shields those distributing child abuse content, selling or buying illicit …
Preconditions for guardianship interventions in cyberbullying: Incident interpretation, collective and automated efficacy, and relative popularity of bullies
This paper examines the preconditions for direct and indirect interventions by guardians in
cyberbullying incidences and, conversely, when automated prevention and detection …
cyberbullying incidences and, conversely, when automated prevention and detection …
We are all (not) Anonymous: Individual-and country-level correlates of support for and opposition to hacktivism
L Ireland - New Media & Society, 2022 - journals.sagepub.com
Hacktivists oftentimes challenge or subvert existing power relations or structures and attempt
to promote reform. How the public perceives occurrences of hacktivism can influence the …
to promote reform. How the public perceives occurrences of hacktivism can influence the …
Big data analytics in e-government and e-democracy applications: privacy threats, implications and mitigation
Big data analytics can help governments and organisations to support democratic processes
through improving efficiency, effectiveness and transparency. A growing body of research …
through improving efficiency, effectiveness and transparency. A growing body of research …
Predicting online target hardening behaviors: An extension of routine activity theory for privacy-enhancing technologies and techniques
L Ireland - Deviant Behavior, 2021 - Taylor & Francis
Using representative survey data from Canada, the United States, Australia, the United
Kingdom, and five European Union member countries (n= 9,011), this paper predicts the use …
Kingdom, and five European Union member countries (n= 9,011), this paper predicts the use …
Future challenges and requirements for open source intelligence in law enforcement investigations: Results from a horizon scanning exercise
PS Bayerl, B Akhgar, A Raven, H Gibson… - Eur. L. Enf't Rsch. Bull., 2022 - HeinOnline
Abstract Open Source Intelligence (OS/NT) is a well-established, time-and resource-efficient
method in modern-day policing. At the same time, OS/NT is not immune from technological …
method in modern-day policing. At the same time, OS/NT is not immune from technological …
Support for vigilantism in cyberspace: exploring procedural justice, distributive justice, and legal legitimacy
L Ireland - Criminal Justice Studies, 2023 - Taylor & Francis
Vigilantism, harmful acts conducted in response to social deviance and criminal activities,
are increasingly happening in cyberspace. These cyber acts often have detrimental effects …
are increasingly happening in cyberspace. These cyber acts often have detrimental effects …
European Privacy by Design
N Mike - 2023 - phd.lib.uni-corvinus.hu
Three competing forces are shaping the concept of European Privacy by Design (PbD): laws
and regulations, business goals and architecture designs. These forces carry their own …
and regulations, business goals and architecture designs. These forces carry their own …
[图书][B] Piracy and Alternate Trade Routes in the Golden Age of Digital Media: A Qualitative Exploration of HTPC Communities and Users' Views of Digital Media …
OD Bowers - 2021 - search.proquest.com
Abstract Home Theater Personal Computer (HTPC) software platforms allow users to store
and access digital media content, however the platforms can be utilized with both licit and …
and access digital media content, however the platforms can be utilized with both licit and …