Becoming a hacktivist. Examining the motivations and the processes that prompt an individual to engage in hacktivism
M Romagna, RE Leukfeldt - Journal of Crime and Justice, 2024 - Taylor & Francis
Hacktivism is a rising phenomenon in the cyber landscape combining elements of the
hacking subculture with ideologically motivated agendas inspired both by traditional …
hacking subculture with ideologically motivated agendas inspired both by traditional …
[PDF][PDF] Computer science trends and innovations in computer engineering against the backdrop of Russian armed aggression
BVZ Kanstantsin, S Andrii, I Ruslan, S Dmytro - IJCSNS, 2022 - researchgate.net
Relevance. The research implemented in this article focuses on the problem of freeing the
cyber-digital space of Ukraine from the parasitic influences of digital means, the developers …
cyber-digital space of Ukraine from the parasitic influences of digital means, the developers …
Harnessing Machine Learning for Effective Cyber security Classifiers
T Jena, A Shankar, A Singhdeo - Asian Journal of …, 2023 - research.send4journal.com
Machine learning has emerged as a transformative force, innovating diverse industries
through its capacity to infuse meaningful insights from large datasets. It plays a pivotal role in …
through its capacity to infuse meaningful insights from large datasets. It plays a pivotal role in …
Effectiveness of Russia's cyberaggression against Ukraine in 2022/2023
A Bógdał-Brzezińska - Przegląd Geopolityczny, 2023 - ceeol.com
The purpose of this article is to examine the determinants and evaluate the effectiveness of
the impact of cyber measures used during the Russian-Ukrainian war. The analysis is …
the impact of cyber measures used during the Russian-Ukrainian war. The analysis is …
Hacking Threat in Arab Cyberspace: Appraisal Analysis on Al-Hakirz Al-Muslimun's Hacktivism Narratives
This research aims to describe the negotiation of the attitude of the hacker group الهاكرز
المسلمون (al-hākirz al-muslimūn)'Muslim hackers'(MH) in the narrative of their hacking …
المسلمون (al-hākirz al-muslimūn)'Muslim hackers'(MH) in the narrative of their hacking …
Play for Ukraine: wargaming as a resistance pleasure
O Usachova - Culture, Theory and Critique, 2023 - Taylor & Francis
This contribution addresses the significance of information and gaming technologies,
particularly in the context of Ukrainian military resistance to the 2022 Russian invasion …
particularly in the context of Ukrainian military resistance to the 2022 Russian invasion …
Assessment of the Cybersecurity of Ukrainian Public Companies Listed on the Warsaw Stock Exchange SA
A Szczepańska-Przekota - Applied Cybersecurity & Internet Governance, 2024 - ceeol.com
Nowadays, the number of sophisticated cyberattacks targeting critical infrastructure or
banking systems is increas-ing. Cases of successful attacks are not uncommon, as statistics …
banking systems is increas-ing. Cases of successful attacks are not uncommon, as statistics …
DISCURSIVE STRATEGIES IN HACKTIVISM DISCOURSE: REVEALING IDEOLOGY IN AL-HAKIRZ AL-MUSLIMUN'S HACKING THREAT
This study explores the underlying ideology in the hacktivism discourse of al-hākirz al-
muslimūn (MH), a group of Muslim hackers. The objective was to uncover the discursive …
muslimūn (MH), a group of Muslim hackers. The objective was to uncover the discursive …
Cyber Dominance as a National Security Strategy: Sweden's Approach and Global Implications
D Latinwo - 2024 - diva-portal.org
This thesis examines the role of cyber dominance in national security, how the development
of cyber capabilities has become a centre of focus in the international system, and how it is …
of cyber capabilities has become a centre of focus in the international system, and how it is …
IT Army of Ukraine as Complex Adaptive System
J Merilehto - 2023 - jyx.jyu.fi
This thesis explores the activities and properties of the IT Army of Ukraine (ITAU) through the
lens of Complex Adaptive Systems (CAS) theory. As an ad-hoc state sponsored cybergroup …
lens of Complex Adaptive Systems (CAS) theory. As an ad-hoc state sponsored cybergroup …