12 research outputs found

    Exploring Deviant Hacker Networks (DHN) On Social Media Platforms

    Get PDF
    Online Social Networks (OSNs) have grown exponentially over the past decade. The initial use of social media for benign purposes (e.g., to socialize with friends, browse pictures and photographs, and communicate with family members overseas) has now transitioned to include malicious activities (e.g., cybercrime, cyberterrorism, and cyberwarfare). These nefarious uses of OSNs poses a signi_cant threat to society, and thus requires research attention. In this exploratory work, we study activities of one deviant groups: hacker groups on social media, which we term Deviant Hacker Networks (DHN). We investigated the connection between different DHNs on Twitter: how they are connected, identified the powerful nodes, which nodes sourced information, and which nodes act as “bridges” between different network components. From this, we were able to identify and articulate specific examples of DHNs communicating with each other, with the goal of committing some form of deviant act online. In our work, we also attempted to bridge the gap between the empirical study of OSNs and cyber forensics, as the growth of OSNs is now bringing these two domains together, due to OSNs continuously generating vast amounts of evidentiary data

    Exploring Deviant Hacker Networks (DHM) on Social Media Platforms

    Get PDF
    Online Social Networks (OSNs) have grown exponentially over the past decade. The initial use of social media for benign purposes (e.g., to socialize with friends, browse pictures and photographs, and communicate with family members overseas) has now transitioned to include malicious activities (e.g., cybercrime, cyberterrorism, and cyberwarfare). These nefarious uses of OSNs poses a significant threat to society, and thus requires research attention. In this exploratory work, we study activities of one deviant groups: hacker groups on social media, which we term Deviant Hacker Networks (DHN). We investigated the connection between different DHNs on Twitter: how they are connected, identified the powerful nodes, which nodes sourced information, and which nodes act as bridges between different network components. From this, we were able to identify and articulate specific examples of DHNs communicating with each other, with the goal of committing some form of deviant act online. In our work, we also attempted to bridge the gap between the empirical study of OSNs and cyber forensics, as the growth of OSNs is now bringing these two domains together, due to OSNs continuously generating vast amounts of evidentiary data

    Table of Contents

    Get PDF

    Back Matter

    Get PDF

    Front Matter

    Get PDF

    Professor Frank Breitinger\u27s Full Bibliography

    Get PDF

    Attitudes on International Standards for Criminal Hacking in the Public and Private Sector

    Get PDF
    There is a current gap in the literature regarding uniform and consistent standards and policies for addressing criminal hacking at the international level. The purpose of this quantitative dissertation was to explore the relationship between individuals in the public and private sectors and their attitudes toward the need for international law defining criminal hacking and the penalties associated with the act. Since the advent of information and communication technologies, there has been a need to address security holistically. The security and sustainability of evolving technologies are examined in light of the threat landscape of criminal hacking, privacy concerns, and policies and laws. Role theory in connection with empathy served as the theoretical base for the research. Data were collected through an anonymous survey of 228 respondents from cybersecurity related organizations from public and private employment sectors. The data analyses resulted in no significance among the groups of employment sectors and the independent and dependent variables, although there were statistically significant results between age groups, gender, infrastructure affiliation, and hacking ability among the questions of the study. Proactively addressing and securing global societies from criminal hacking is paramount in helping to alleviate escalating economic and personal losses among organizations and individuals worldwide. The research insights can be used for positive social change in drafting and implementing cyber policies and laws for criminal hacking among local, state, national, and international bodies

    Radio After Radio: Redefining radio art in the light of new media technology through expanded practice

    Full text link
    I have been working in the field of radio art, and through creative practice have been considering how the convergence of new media technologies has redefined radio art, addressing the ways in which this has extended the boundaries of the art form. This practice-based research explores the rich history of radio as an artistic medium and the relationship between the artist and technology, emphasising the role of the artist as a mediator between broadcast institutions and a listening public. It considers how radio art might be defined in relation to sound art, music and media art, mapping its shifting parameters in the digital era and prompting a consideration of how radio appears to be moving from a dispersed „live‟ event to one consumed „on demand‟ by a segmented audience across multiple platforms. Exploring the implications of this transition through my radio practice focuses upon the productive tensions which characterise the artist‟s engagement with radio technology, specifically between the autonomous potentialities offered by the reappropriation of obsolete technology and the proliferation of new infrastructures and networks promised by the exponential development of new media. Switch Off takes as its overarching theme the possible futures for FM radio, incorporating elements from eight „trace‟ stations, produced as a series of radio actions investigating these tensions. Interviews have been conducted with case study subjects Vicki Bennett, Anna Friz, LIGNA, Hildegard Westerkamp and Gregory Whitehead, whose work was chosen as being exemplary of the five recurrent facets of radio arts practice I have identified: Appropriation, Transmission, Activism, Soundscape and Performance. These categories are derived from the genealogy of experimental radiophonic practice set out in Chapter One

    Taking English Planning Law Scholarship Seriously

    Get PDF
    Planning is at the heart of the response to many of the significant challenges of our time, from the climate and environmental crises to social and economic inequalities. It is embedded in, as well as partially constituting, our democratic systems, so that the challenges of democratic decision-making in a complex society cannot be avoided when thinking about planning. Planning law raises some of the most fundamental questions faced by legal scholars, from the legitimacy of authority to the relationship between public and private rights and interests. And yet, planning law has been relatively neglected by legal scholars. The objective of Taking English Planning Law Scholarship Seriously is to create space for planning law scholarship in all of its variety, and for curiosity about law in all of its complexity. The chapters reflect this diversity and complexity, covering a range of the objects of planning (from housing to energy to highways) and a multiplicity of planning tasks and tools (from compulsory purchase to contracting to planning inquiries)

    Taking English Planning Law Scholarship Seriously

    Get PDF
    Planning is at the heart of the response to many of the significant challenges of our time, from the climate and environmental crises to social and economic inequalities. It is embedded in, as well as partially constituting, our democratic systems, so that the challenges of democratic decision-making in a complex society cannot be avoided when thinking about planning. Planning law raises some of the most fundamental questions faced by legal scholars, from the legitimacy of authority to the relationship between public and private rights and interests. And yet, planning law has been relatively neglected by legal scholars. The objective of Taking English Planning Law Scholarship Seriously is to create space for planning law scholarship in all of its variety, and for curiosity about law in all of its complexity. The chapters reflect this diversity and complexity, covering a range of the objects of planning (from housing to energy to highways) and a multiplicity of planning tasks and tools (from compulsory purchase to contracting to planning inquiries)
    corecore