1,422 research outputs found

    Respawn

    Get PDF
    In Respawn Colin Milburn examines the connections between video games, hacking, and science fiction that galvanize technological activism and technological communities. Discussing a wide range of games, from Portal and Final Fantasy VII to Super Mario Sunshine and Shadow of the Colossus, Milburn illustrates how they impact the lives of gamers and non-gamers alike. They also serve as resources for critique, resistance, and insurgency, offering a space for players and hacktivist groups such as Anonymous to challenge obstinate systems and experiment with alternative futures. Providing an essential walkthrough guide to our digital culture and its high-tech controversies, Milburn shows how games and playable media spawn new modes of engagement in a computerized world

    Terrorist Celebrity: Online Personal Branding and Jihadist Recruitment and Planning

    Get PDF
    Shifts in culture and technology have changed the manifestation of celebrity in modern society, culminating in the practice of internet microcelebrity, where one views followers as fans, produces content consistent with a personal brand, and engages in strategic interaction with devotees. This thesis examines how those effects have also changed how terrorists present themselves and operationalize celebrity status. An original typology of terrorist celebrity is presented: traditional, martyr, and internet micro-celebrity. Two in-depth case studies of terrorist micro-celebrities are analyzed: Anwar al-Awlaki of Al Qaeda in the Arabian Peninsula and Junaid Hussain of the Islamic State. The case studies are examined through content analysis of social media postings, personal chat transcripts, as well as mainstream media coverage of the individuals used to reconstruct their biographies. Following mainstream trends, these terrorist internet celebrities have built personal brands that target specific communities. Awlaki targeted English-speaking Muslims living in the West and IS foreign fighters like Hussain often target young people in the fighterโ€™s countries of origin. Their online personas are created to be relatable and engaging to those specific audiences. Ultimately, mainstream celebrity trends have bled into terrorist behavior. By creating brands and managing them through micro-celebrity practices, terrorists have effectively weaponized online celebrity, using it for recruitment and planning

    Spartan Daily, November 13, 2002

    Get PDF
    Volume 119, Issue 54https://scholarworks.sjsu.edu/spartandaily/10698/thumbnail.jp

    Cyber Security Politics

    Get PDF
    This book examines new and challenging political aspects of cyber security and presents it as an issue defined by socio-technological uncertainty and political fragmentation. Structured along two broad themes and providing empirical examples for how socio-technical changes and political responses interact, the first part of the book looks at the current use of cyber space in conflictual settings, while the second focuses on political responses by state and non-state actors in an environment defined by uncertainties. Within this, it highlights four key debates that encapsulate the complexities and paradoxes of cyber security politics from a Western perspective โ€“ how much political influence states can achieve via cyber operations and what context factors condition the (limited) strategic utility of such operations; the role of emerging digital technologies and how the dynamics of the tech innovation process reinforce the fragmentation of the governance space; how states attempt to uphold stability in cyberspace and, more generally, in their strategic relations; and how the shared responsibility of state, economy, and society for cyber security continues to be re-negotiated in an increasingly trans-sectoral and transnational governance space. This book will be of much interest to students of cyber security, global governance, technology studies, and international relations

    The Ticker, November 7, 2016

    Full text link
    The Ticker is the student newspaper of Baruch College. It has been published continuously since 1932, when the Baruch College campus was the School of Business and Civic Administration of the City College of New York

    The politics of cyberconflict: ethnoreligious conflicts in computer mediated environments

    Get PDF
    This thesis argues that it is important to distinguish between two different phenomena in cyberpolitical spaces: First of all, between ethnic or religious groups fighting over in cyberspace, as they do in real life (Ethnoreligious cyberconflict) and second, between a social movement and its antagonistic institution (Sociopolitical cyberconflict). These different kinds of cyberconflict can be explained in the context of international conflict analysis for ethnoreligious cyberconflict and social movement theory for sociopolitical cyberconflict, while keeping in mind that this takes place in a media environment by using media theory. By combining elements of these approaches and justifying the link to cyberconflict, it is possible to use them as a theoretical light to look at the environment of Cyberconflict (CC) and analysis of incidents of CC. Consequently, this work looks at the leading groups using the internet either as weapon or a resource against governments, while also looking at networks, international organisations and new social movements. Searching for a satisfactory theoretical framework, I propose the following parameters to be looked at while analysing cyberconflicts: 1. Environment of Conflict and Conflict Mapping (real and virtual). The world system generates an arborescent apparatus, which is haunted by lines of flight, emerging through underground networks connected horizontally and lacking a hierarchic centre (Deleuze and Guattari). The structure of the internet is ideal for network groups, (a global network with no central authority) has offered another experience of governance (no governance), time and space (compression), ideology (freedom of information and access to it), identity (multiplicity) and fundamentally an opposition to surveillance and control, boundaries and apparatuses. 2. Sociopolitical Cyberconflicts: The impact of ICTs on: a. Mobilising structures (network style of movements using the internet, participation, recruitment, tactics, goals), b. Framing Processes (issues, strategy, identity, the effect of the internet on these processes), c. Political opportunity structure (the internet as a component of this structure), d. hacktivism. 3. Ethnoreligious Cyberconflicts: a. Ethnic/religious affiliation, chauvinism, national identity, b. Discourses of inclusion and exclusion, c. Information warfare, the use of the internet as a weapon, propaganda and mobilisational resource d. Conflict resolution depends on legal, organisational framework, number of parties issues, distribution of power, values and beliefs. 4. The internet as a medium: a. Analysing discourses (representations of the world, constructions of social identities and social relations), b. Control of information, level of censorship, alternative sources, c. Wolsfeld: Political contest model among antagonists: the ability to initiate and control events, dominate political discourse, mobilise supporters, d. Media effects on policy (strategic, tactical, and representational)

    A Comparative Study on Cybersecurity Act Implemented in the United States and China

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ตญ์ œ๋Œ€ํ•™์› ๊ตญ์ œํ•™๊ณผ(๊ตญ์ œ์ง€์—ญํ•™์ „๊ณต), 2020. 8. ์‹ ์„ฑํ˜ธ.The past decade in cyberspace witnessed state-mediated attack in pursuance of accomplishing ones political end. Once limited to opportunistic private criminal groups, the concept of cyberattack transformed into a countrys important means to bolster national security and further propagate national stance in cyberspace. Henceforth, cyberspace emerges as compelling security realm. When compared to traditional security environment, judging the situation is convoluted on account of the unique characteristics of cyberspace. Under the amorphous nature of cyberspace, if anything, nations become more nationalized. The nature of cyber realm characterized by innate openness and hyper-connectivity will trigger structural change in cybersecurity landscape. Thus the thesis argues that although nations will actively interact and engage in collective initiatives fueled by the rising voice of forming global governance for cybersecurity, the overriding state sovereignty in the end would breed discord in the cyber era. Every move in cyberspace rests upon a nations political end thereby taking account of geopolitical interests assumes greater importance since invisible borderline matters. Given the nations inclination to utilize cyber capabilities for political ends, what happens in conventional security realm can also occur in cyberspace. The thesis chooses the US and China, allegedly Group of Two (G2), to study how both country take governmental measures vis-ร -vis cybersecurity. Two great powers, with no doubt, are the pioneers in this emerging security realm. Not only both actively engage in building up cyber capabilities but also actively engage in appealing for cooperation to its allies. By conducting a comparative study on Cybersecurity Act of 2015 in the US and Cybersecurity Law of the PRC in 2016, the thesis aims to demonstrate how G2 implement legal regulation to safeguard domestic information infrastructure amidst the rising cyber threats posed by both state and non-state actors. In doing so, the thesis will research how respective country exerts its national interests in cyberspace while cooperate with other countries to defend global security. The thesis will add a new dimension on current cybersecurity studies by filling the gaps in previous literature. The thesis will contribute in understanding Sino-US relation regarding hegemonic competition in cyberspace and further propose the prospects of nations in the cyber era.์ง€๋‚œ ์‹ญ ๋…„์˜ ์‚ฌ์ด๋ฒ„ํ™˜๊ฒฝ์€ ์ •์น˜์  ๋ชฉ์ ์„ ์ด๋ฃจ๊ธฐ ์œ„ํ•œ ์ˆ˜๋‹จ์œผ๋กœ์จ ๊ตญ๊ฐ€ ์ฃผ๋„์˜ ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์ด ์ฃผ๋ฅผ ์ด๋ฃฌ๋‹ค. ํ•œ๋•Œ ๊ธฐํšŒ์ฃผ์˜์  ๋ฒ”์ฃ„์ง‘๋‹จ์— ๊ตญํ•œ๋œ ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์€ ์ด์ œ ํ•œ ๊ตญ๊ฐ€์˜ ์ •์น˜์  ๋ชฉ์  ๋‹ฌ์„ฑ, ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„์—์„œ์˜ ์ •์น˜์  ์„ ์ „์˜ ์ค‘์š”ํ•œ ์ˆ˜๋‹จ์œผ๋กœ ์ด์šฉ๋œ๋‹ค. ์ด์— ๋”ฐ๋ผ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์€ ๊ทธ ๊ท€์ถ”๊ฐ€ ์ฃผ๋ชฉ๋˜๋Š” ์‹ (ๆ–ฐ)์•ˆ๋ณด์˜์—ญ์œผ๋กœ ๊ธ‰๋ถ€์ƒํ•˜๊ณ  ์žˆ๋‹ค. ์ „ํ†ต์  ์•ˆ๋ณด ์˜์—ญ๊ณผ ๋น„๊ตํ–ˆ์„ ๋•Œ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์˜ ๋…ํŠนํ•œ ํŠน์„ฑ์œผ๋กœ ๋ง๋ฏธ์•”์•„ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ํ™˜๊ฒฝ์„ ๊ฐ€๋Š ํ•˜๋Š” ๊ฒƒ์€ ํ›จ์”ฌ ๋ณต์žกํ•˜๋‹ค. ๊ฐœ๋ฐฉ์„ฑ๊ณผ ์ดˆ์—ฐ๊ฒฐ์„ฑ์œผ๋กœ ํŠน์ง•๋˜๋Š” ๋ฌด์ •ํ˜•์˜ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„์—์„œ ์—ญ์„ค์ ์ด๊ฒŒ๋„ ๊ตญ๊ฐ€๋Š” ๋”์šฑ ๊ตญ๊ฐ€์ฃผ์˜์ ์ธ ๊ฒฝํ–ฅ์„ ๋ณด์ธ๋‹ค. ์•ˆ์ „ํ•œ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ํ™˜๊ฒฝ ์ˆ˜๋ฆฝ์„ ์œ„ํ•ด ๊ธ€๋กœ๋ฒŒ๊ฑฐ๋ฒ„๋„Œ์Šค ๊ตฌ์ถ•์˜ ํ•„์š”์„ฑ์— ๋”ํ•ด ๊ฐ ๊ตญ๊ฐ€๋“ค์ด ๊ณต๋™์˜ ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ๋ฅผ ์œ„ํ•ด ํ˜‘๋ ฅํ•จ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  ๋” ์šฐ์„ ์‹œ๋˜๋Š” ์ฃผ๊ถŒ๊ตญ๊ฐ€์˜ ์ด์ต์€ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์ด๋ผ๋Š” ์‹ (ๆ–ฐ)์•ˆ๋ณด ์˜์—ญ์—์„œ์˜ ๊ฐˆ๋“ฑ์„ ์ดˆ๋ž˜ํ•  ๊ฒƒ์ด๋‹ค. ์ด๋Š” ๊ถ๊ทน์ ์œผ๋กœ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ์ „๋ง์˜ ๊ตฌ์กฐ์  ๋ณ€ํ™”๋ฅผ ๋ถ€์ถ”๊ธด๋‹ค. ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„ ํ•˜์— ํ•œ ๊ตญ๊ฐ€์˜ ์ •์น˜์  ํ–‰์œ„๊ฐ€ ๊ฒฐ๊ตญ ํŠน์ˆ˜ํ•œ ๋ชฉ์ ์— ๋‹ฌ๋ ค์žˆ์Œ์— ๊ธฐ์ธํ•ด ์ด ์‹ (ๆ–ฐ)์•ˆ๋ณด ์˜์—ญ์˜ ์ดํ•ด์— ์•ž์„œ ์ง€์ •ํ•™์  ์ด์ต๊ด€๊ณ„์˜ ์ดํ•ด๊ฐ€ ์š”๊ตฌ๋œ๋‹ค. ์‚ฌ์ด๋ฒ„ ์—ญ๋Ÿ‰์„ ํ•œ ๊ตญ๊ฐ€์˜ ์ •์น˜์  ๋ชฉ์  ๋‹ฌ์„ฑ์˜ ์ˆ˜๋‹จ์œผ๋กœ ์ด์šฉํ•˜๋ ค๋Š” ์ง€๋‚œ ์‹ญ ๋…„์˜ ๊ฒฝํ–ฅ์€ ์ „ํ†ต์  ์•ˆ๋ณด์˜์—ญ ์ฐจ์›์—์„œ ๋ฐœ์ƒํ•˜๋˜ ์ผ์ด ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์— ๋˜ํ•œ ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ์Œ์„ ์‹œ์‚ฌํ•œ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์€ ๋ฏธ๊ตญ๊ณผ ์ค‘๊ตญ์ด ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ๊ด€๋ จ ์–ด๋– ํ•œ ์ •๋ถ€์ฐจ์›์˜ ์กฐ์น˜๋ฅผ ์ทจํ•˜๋Š” ์ง€ ์—ฐ๊ตฌํ•จ์— ๋ชฉ์ ์„ ๋‘”๋‹ค. ์–‘๊ตญ์€ ์‚ฌ์ด๋ฒ„ ์—ญ๋Ÿ‰ ๋ฐœ์ „์— ๊ตญ๊ฐ€์  ํˆฌ์ž๋ฅผ ์•„๋ผ์ง€ ์•Š์„ ๋ฟ ์•„๋‹ˆ๋ผ ๋™๋งน๊ตญ๋“ค์—๊ฒŒ๋„ ํ˜‘๋ ฅ์„ ์ด‰๊ตฌํ•˜๋ฉฐ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์ด๋ผ๋Š” ์‹ (ๆ–ฐ)์•ˆ๋ณด์˜์—ญ์— ๊ฐ€์žฅ ์ ๊ทน์„ฑ์„ ๋ ๋Š” ๊ตญ๊ฐ€์ด๋‹ค. ๋ฏธ๊ตญ์˜ 2015๋…„ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด๋ฒ•๊ณผ ์ค‘๊ตญ์˜ 2016๋…„ ์‚ฌ์ด๋ฒ„๋ณด์•ˆ๋ฒ•์„ ๋น„๊ต ์—ฐ๊ตฌํ•ด ๋ณธ ๋…ผ๋ฌธ์€ ์–‘๊ตญ์ด ๊ตญ๋‚ด์˜ ์ •๋ณด ์ธํ”„๋ผ ๋ณดํ˜ธ๋ฅผ ์œ„ํ•ด ์–ด๋– ํ•œ ๋ฒ•์  ๊ทœ์ œ๋ฅผ ๋งˆ๋ จํ–ˆ๋Š”์ง€ ์‚ดํŽด๋ณด๊ณ ์ž ํ•œ๋‹ค. ๋˜ํ•œ ๊ฐ๊ตญ์ด ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์—์„œ ์–ด๋–ป๊ฒŒ ๊ตญ์ต์„ ํ–‰์‚ฌํ•˜๋ฉฐ ๋™์‹œ์— ๋ฒ”์ง€๊ตฌ์  ์ฐจ์›์˜ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด๋ฅผ ์œ„ํ•ด ์–ด๋– ํ•œ ํ˜‘๋ ฅ ๋งค์ปค๋‹ˆ์ฆ˜์„ ์ถ”๊ตฌํ•˜๋Š”์ง€ ์—ฐ๊ตฌํ•œ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์€ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด๋ฅผ ๋ฏธโˆ™์ค‘ ๊ฒฝ์Ÿ๊ตฌ๋„์˜ ๊ด€์ ์—์„œ ์žฌํ•ด์„ํ•˜๋ฉฐ ๋” ๋‚˜์•„๊ฐ€ ๊ฑฐ์‹œ์ ์œผ๋กœ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด๋ฅผ ์ „๋งํ•œ๋‹ค๋Š” ์ ์—์„œ ํ˜„์žฌ์˜ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ์—ฐ๊ตฌ์— ๊ธฐ์—ฌํ•œ๋‹ค.I. Introduction 1 1. Research Background 1 2. Argument Overview 3 3. Significance of the topic 5 4. Methodology 8 II. Literature Review 10 1. Sino-US relation and Cybersecurity 10 2. Previous studies on cybersecurity 16 3. Cybersecurity and relevant legal regulation 25 a. The United States 25 b. China 29 4. Limitations of prior research 32 III. The United States 34 1. An overview of national security and cyberspace 34 a. Cybersecurity environment 34 b. Cybersecurity strategy guideline 37 2. Information security and regulatory regime 41 a. Definition of Critical Information Infrastructure 41 b. The evolution of discussion on information security 45 3. Cybersecurity Act of 2015 48 IV. China 51 1. An overview of national security and network security 51 a. The development process of informatization 51 b. Cybersecurity strategy guideline 54 2. Network security and regulatory regime 57 a. Cybersecurity environment 57 b. Definition of Critical Information Infrastructure and regulatory regime 59 3. Cybersecurity Law of the PRC 62 V. Analysis 64 1. Thesis findings 64 a. The US model of protecting homeland cybersecurity 66 b. Chinese model of controlling mainland network security 68 2. Implications and prospects of nations in the cyber era 69 a. Cybersecurity as a shared problem 69 b. Race to cyber supremacy 72 VI. Conclusion 75 Bibliography 78 Abstract in Korean 91Maste

    The Politicization of Art on the Internet: From net.art to post-internet art

    Get PDF
    Este estudo tem como objetivo apresentar uma breve perspetiva sobre as manifestaรงรตes socioculturais que se propagaram a partir do surgimento da Web; tendo como principal foco de anรกlise o desenvolvimento da produรงรฃo de Internet Arte na Europa e na Amรฉrica do Norte ao longo dos รบltimos 30 anos. Estruturado como um estudo de caso, trรชs conceitos-chave fundamentam a base desta pesquisa: uma breve histรณria da Internet, o desenvolvimento do termo hacker e a produรงรฃo de arte web-based; da net.art atรฉ a Arte Pรณs-Internet. Em abordagem cronolรณgica, estes campos serรฃo descritos e posteriormente utilizados como guias para um final encadeamento comparativo que visa sustentar a hipรณtese da gradual dissoluรงรฃo de um ciberespaรงo utรณpico atรฉ o distรณpico cenรกrio corporativo que constitui a Internet dos dias atuais.This study aims to present a brief perspective of the sociocultural manifestations that emerged after the Web birth, focusing on the development of Internet Art and the countercultural movements that emerged inside Europe and North America over the last 30 years. Under a case study structure, three fundamental subjects will be firstly explained: Internet history, the development of hacker concept and the web-based Art transformations: from net.art till Post-Internet Art. Chronologically described, these fields will lead to a final comparison of chained events that aim to sustain the hypothesis of the gradual dissolution of the early cyberspace utopias till the dystopic scene existent in nowadays Internet

    Daily Eastern News: October 20, 2010

    Get PDF
    https://thekeep.eiu.edu/den_2010_oct/1012/thumbnail.jp
    • โ€ฆ
    corecore