Privacy enhancing technology adoption and its impact on SMEs' performance

T Hasani, D Rezania, N Levallet… - International …, 2023 - journals.sagepub.com
As society places greater emphasis on information privacy and data protection,
organizations are increasingly adopting Privacy Enhancing Technologies (PETs) to …

The potential harms of the Tor anonymity network cluster disproportionately in free countries

E Jardine, AM Lindner… - Proceedings of the …, 2020 - National Acad Sciences
The Tor anonymity network allows users to protect their privacy and circumvent censorship
restrictions but also shields those distributing child abuse content, selling or buying illicit …

Preconditions for guardianship interventions in cyberbullying: Incident interpretation, collective and automated efficacy, and relative popularity of bullies

L Ireland, J Hawdon, B Huang, A Peguero - Computers in human behavior, 2020 - Elsevier
This paper examines the preconditions for direct and indirect interventions by guardians in
cyberbullying incidences and, conversely, when automated prevention and detection …

We are all (not) Anonymous: Individual-and country-level correlates of support for and opposition to hacktivism

L Ireland - New Media & Society, 2022 - journals.sagepub.com
Hacktivists oftentimes challenge or subvert existing power relations or structures and attempt
to promote reform. How the public perceives occurrences of hacktivism can influence the …

Big data analytics in e-government and e-democracy applications: privacy threats, implications and mitigation

P Mavriki, M Karyda - International Journal of Electronic …, 2022 - inderscienceonline.com
Big data analytics can help governments and organisations to support democratic processes
through improving efficiency, effectiveness and transparency. A growing body of research …

Predicting online target hardening behaviors: An extension of routine activity theory for privacy-enhancing technologies and techniques

L Ireland - Deviant Behavior, 2021 - Taylor & Francis
Using representative survey data from Canada, the United States, Australia, the United
Kingdom, and five European Union member countries (n= 9,011), this paper predicts the use …

Future challenges and requirements for open source intelligence in law enforcement investigations: Results from a horizon scanning exercise

PS Bayerl, B Akhgar, A Raven, H Gibson… - Eur. L. Enf't Rsch. Bull., 2022 - HeinOnline
Abstract Open Source Intelligence (OS/NT) is a well-established, time-and resource-efficient
method in modern-day policing. At the same time, OS/NT is not immune from technological …

Support for vigilantism in cyberspace: exploring procedural justice, distributive justice, and legal legitimacy

L Ireland - Criminal Justice Studies, 2023 - Taylor & Francis
Vigilantism, harmful acts conducted in response to social deviance and criminal activities,
are increasingly happening in cyberspace. These cyber acts often have detrimental effects …

European Privacy by Design

N Mike - 2023 - phd.lib.uni-corvinus.hu
Three competing forces are shaping the concept of European Privacy by Design (PbD): laws
and regulations, business goals and architecture designs. These forces carry their own …

[图书][B] Piracy and Alternate Trade Routes in the Golden Age of Digital Media: A Qualitative Exploration of HTPC Communities and Users' Views of Digital Media …

OD Bowers - 2021 - search.proquest.com
Abstract Home Theater Personal Computer (HTPC) software platforms allow users to store
and access digital media content, however the platforms can be utilized with both licit and …