Article

Investing in a centralized cybersecurity infrastructure: Why "hacktivism" can and should influence cybersecurity reform

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

This Note recommends that Congress draft cybersecurity reform legislation in line with President Obama's May 2011 Cybersecurity Legislative Proposal, rather than the House Republican Cybersecurity Task Force's October 2011 Proposal. The former proposal's emphasis on centralized regulation under the Department of Homeland Security (DHS) more accurately accounts for the nature of threats posed in cyberspace, including hacktivist groups like the online hacker collective Anonymous who have become the most prominent actors in cyberspace over the last few years. This Note advocates that Congress expressly account for Anonymous in drafting cybersecurity legislation because doing so will deliver an array of otherwise-desirable policy goals. In arriving at these conclusions, this Note explores in detail the history of hacking, hacktivism, and Anonymous. Additionally, it briefly surveys the panoply of current legal mechanisms governing cyberspace. Finally, this Note will advocate for the inclusion of several key elements in any cybersecurity reform legislation, whether or not Congress chooses a DHS-centric model.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... Simultaneous investigations are carried out for development of new methods and models for support of making decisions on selection of strategies of IPS and CS funding. [10] states that making decisions on cyber security financing is a permanent task. At the same time, according to the analysis of a number of recent works [10][11][12] one common drawback in this investigation segment is the lack of comprehensive techniques for development of IPS and CS financing strategies, including those for PIS. ...
... [10] states that making decisions on cyber security financing is a permanent task. At the same time, according to the analysis of a number of recent works [10][11][12] one common drawback in this investigation segment is the lack of comprehensive techniques for development of IPS and CS financing strategies, including those for PIS. Besides, the models [13,14] describing strategies of investment into cyber security of information systems and technologies do not cover situations where there is uncertainty about the financial strategies of the attacking party. ...
... In particular, at this stage we tried to expand the model by considering the cases where there is no full information available on the financial state of the attacking party (hacker). In this context our model is different from the solutions offered by other authors [9][10][11][12]. ...
Article
Full-text available
Article describes the model developed for the module of port information system cyber security facilities funding decision making support system. The model is based on multistage game theory toolkit. The solution offered allows an opportunity for managers of information safety systems, particularly port information systems and technologies, to carry out preliminary assessment of financial strategies for development of effective cyber safety systems. The distinctive feature of the model is the assumption that the defending party does not have full information on the financing strategies of the attacking party and on the state of its financial resources used to break cyber security barriers of the port information system. The solution employs mathematical apparatus of bilinear turn-based multistage quality game with several terminal surfaces. A multiple-option simulation experiment was carried out to ensure validity of the model. The results of the experiment will also be described herein. Thus, in the article at the first time, decision of the game was shown for all cases of the correlation of game parameters for the protection side of the port information system (PIS) and hackers seeking to overcome the boundaries of cybersecurity. The solution found in the article will be useful for the created decision support system, in particular, for the situation when the attacker uses a mixed financial strategy of hacking the information system.
... President Obama went as far as announcing that "cyber attacks constitute one of the most serious economic and national security challenges we face as a nation" (Kelly 2012). In a recent interview with CBS News, an ex-anonymous hacktivist who turned into an FBI informant to escape prison time serves as a perfect example of the power that a single hacktivist can wield. ...
... Kelly explains the attack of hackers to government websites, and shows how the former provides citizens with software in order to circumvent the dictatorship's censorship; within a month of these attacks, the dictatorship fell (Kelly 2012). This software modality is also prevalent in countries such as China that enforce censorship of the Internet. ...
... The San Francisco Public Transportation system shut down cell phone activity in order to disrupt a planned protest that wanted to halt the subway trains. Anonymous hackers denounced this, and executed a series of cyber attacks that caused the closure of two downtown subway stations during rush hour (Kelly 2012). This is an adequate example as it shows how the limitations of physical protests are overcome by hacktivists who achieve their originally intended disruption. ...
... Thus, this review aims to draw attention to the abundance of scholarly work on the subject and to bring it into dialogue. In this diverse complex of literature Anonymous has been described as a vigilant movement (Serracino-Inglott, 2013), a fluid organisation (Dobusch and Schoeneborn, 2015), a meme complex (Jarvis 2014), a maze generating mazes (Coleman 2014), a hybrid between network and swarm (Wiedemann, 2014), a cloud (Milan, 2013b), E-bandits (Wong and Brown, 2013), cybercriminals (Kelly, 2012), a trolling identity (Phillips, 2012), an improper name (Deseriis, 2013) and an on-going flash mob (Hay-Jew, 2013). In what follows, I will add another term and describe Anonymous as a cyborg activist formation consisting of the reconfiguration of equality/hierarchy, reason/emotion, and nihilism/idealism. ...
... Krauth, 2012: 29). While some authors describe Anonymous' internal structure as direct democratic community of equals (Barnard-Wills, 2011: 20;Halupka and Star, 2011;Potter, 2015: 1;Wong andBrown, 2013: 1024), others paint a contrary picture of internal hierarchy, control and command (Hai-Jew, 2013: 76;Kelly, 2012Kelly, : 1682Koch, 2014: 464;Krauth, 2012: 28;Mansfield-Devine, 2011: 7) In principle, participation in Anonymous is open for everyone. The symbols of Anonymous, like the Guy Fawkes mask and the headless figure with a question mark, are available for anyone to use. ...
... The analysis of 200 news articles about Anonymous reveals that in 58% of the cases Anonymous is portrayed as a "global threat" or a group of "malicious pranksters"; only 20% view them as a group of "legitimate activists". Examples of this co-construction of Anonymous are also found in the academic literature in the fields of law (Kelly, 2012;Padmanabhan, 2012) and technology studies (Pras et al., 2010), like the article by Mansfield-Devine (2011), which discusses whether Anonymous should be classified as a "serious threat or mere annoyance". Phillips (2012) describes how a FOX news report in 2007 was influential in coconstructing/securitising Anonymous. ...
Article
Full-text available
This article develops the concept of cyborg activism as novel configuration of democratic subjectivity in the Information Age by exploring the online collectivity Anonymous as a prototype. By fusing elements of human/machine and organic/digital, the cyborg disrupts modern logics of binary thinking. Cyborg activism emerges as the reconfiguration of equality/hierarchy, reason/emotion and nihilism/idealism. Anonymous demonstrates how through the use of contingent and ephemeral digital personae hierarchies in cyborg activism prove more volatile than in face-to-face settings. Emotions appear as an essential part of a politics of passion, which enables pursuing laughter and joy, expressing anger and experiencing empowerment as part of a reasoned, strategic politics. Anonymous’ political content reconfigures nihilist sentiments, frustration and political disenchantment, on one hand, with idealist world views, on the other. This enables the cohabitation and partial integration of a great diversity of political claims rooted in various ideologies.
... In addition, the centralized database management model to be utilized for the Cyber Identity Card scheme will also become a major threat to the country's long-term stability and peace (Kelly, 2012). The centralized management model may make an ideal target for cyber hackers (Samtani, Chinn, Chen & Nunamaker Jr, 2017). ...
Article
Full-text available
This work is licensed under a Creative Commons Attribution 4.0 International License. The license permits unrestricted use, distribution, and reproduction in any medium, on the condition that users give exact credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if they made any changes. Abstract This paper examines the potential risks and challenges posed by the proposed cyber identity card (CIC) scheme in China. It argues that this initiative presents a dual threat to both the Chinese government and citizens in terms of data security, privacy protection, and social stability. The centralized management of citizens' data online raises concerns about the vulnerability to cyber-attacks and the erosion of individual privacy rights. The paper also highlights the risks of further restricting citizens' freedom of expression and the potential for social unrest. It concludes by calling for a more open and democratic approach that allows for diverse voices and seeks a win-win solution for both the government and citizens.
... Incentivizing Privacy Best Practices While there has been a vast literature studying how to incentivize organizations to invest in cybersecurity [30,44,48,73], there has been comparatively less work analyzing economic incentives of organizations to invest in data privacy [4,47,91]. Instead, many organizations' policies and procedures surrounding data privacy are primarily driven by compliance with privacy regulation, either directly [3,37,76,81,89,91] or indirectly, e.g., via vendor requirements [7,64]. ...
Preprint
In the international development community, the term "digital public goods" is used to describe open-source digital products (e.g., software, datasets) that aim to address the United Nations (UN) Sustainable Development Goals. DPGs are increasingly being used to deliver government services around the world (e.g., ID management, healthcare registration). Because DPGs may handle sensitive data, the UN has established user privacy as a first-order requirement for DPGs. The privacy risks of DPGs are currently managed in part by the DPG standard, which includes a prerequisite questionnaire with questions designed to evaluate a DPG's privacy posture. This study examines the effectiveness of the current DPG standard for ensuring adequate privacy protections. We present a systematic assessment of responses from DPGs regarding their protections of users' privacy. We also present in-depth case studies from three widely-used DPGs to identify privacy threats and compare this to their responses to the DPG standard. Our findings reveal limitations in the current DPG standard's evaluation approach. We conclude by presenting preliminary recommendations and suggestions for strengthening the DPG standard as it relates to privacy. Additionally, we hope this study encourages more usable privacy research on communicating privacy, not only to end users but also third-party adopters of user-facing technologies.
... Web-hacking, email bombarding and sending viruses for this purpose are considered a form of hacktivist action (Denning, 2001). Although the goal is not to cause serious damage, hacktivist activities within the scope of cyber-crime exist (Kelly, 2012;Yegen, 2014). ...
... Web-hacking, email bombarding and sending viruses for this purpose are considered a form of hacktivist action (Denning, 2001). Although the goal is not to cause serious damage, hacktivist activities within the scope of cyber-crime exist (Kelly, 2012;Yegen, 2014). ...
Chapter
Full-text available
This research was carried out to learn to what extent the musical sensations of individuals with autism who are interested in music can be improved with effective music education. An individual with autism who has an interest in music was selected for the research from a pilot study. During the research process, solfeggio, piano, and elementary vocal training lessons were given with the active participation of the individual. The research is an experimental study with a single subject. Action research, one of the qualitative research methods, was used in this study. To collect data, audio and visual materials, researcher observation form, expert opinion form, parent interview form, and descriptive analysis were used. A descriptive content analysis was performed on the collected data. The findings of the study reveal that the solfeggio, piano, and basic vocal training lessons given to individuals with autism are effective in improving their musical senses. In the light of this research, it is understood that a one-to-one, regular, and continuous musical education specific to individuals with autism will greatly contribute to the socio-cultural development of these individuals.
... This idea is deriving from the physical distance between the attacker and the target but also the inherent inability to actively see and frequently also identify the assailant. Hacking, as already highlighted in an earlier publication [16], relates to computer hacking [17], which can be considered as activities ranging from gaining unauthorized access to systems or data [18], to the production of free software [19], to manipulating technology for unorthodox means [20]. Hackers' representation has undergone a massive shift. ...
Chapter
The academic literature on terrorism is filled with references to online activities, and the equation of hacking and hacktivism (i.e., politically motivated hacking) with cyberterrorism. This perspective ignores differences in capacities, scope, and motives. Besides, scholarly research is lacking examinations of those perceived as alleged ‘security threats’. This chapter therefore uses interviews with self-identified hackers and hacktivists (N = 35) to address this gap. It examines the distinction between hacking, hacktivism, and cyberterrorism, and studies the discourses and practices of hackers and hacktivists. Building upon the theoretical concept of (in)securitisation and the method of thematic analysis, the findings provide insights into (a) perceptions of hackers and hacktivists by external actors and their (b) self-assessment that stands in contrast to the viewpoints expressed earlier. The results highlight interviewees' objections to the translation of hacking and hacktivism into violent acts of any nature, with participants articulating that the connection of these concepts poses threats to civil liberties and political rights online. The chapter therefore has implications both for academic as well as professional discourse. It seeks to foster a more reflected engagement with these concepts and points to the need for concrete terminological delineations.
... Let note that the structure of the model is static -decisions and results occur simultaneously, and dynamic effects, including the dependence of money on time, are not taken into account. Despite the fact that the Gordon -Loeb model after publication was recognized in the scientific community and supplemented by both other authors [4], [5], [6] and Lawrence Gordon and Martin Loeb themselves [7], many issues still have to be resolved. An indisputable fact is that the authors of the model for the first time thoroughly examined the problem and identified the vulnerability function, which is a key indicator of information security. ...
... Наприклад, додаткові відомості про нові технології злому, використовуваних хакерами, або пошук інсайдера в рамках ОбІ. В [4,5] показано, що однією з головних проблем при побудові комплексних СЗІ та КрБ, є вибір раціональної стратегії інвестування в подібні системи захисту ОбІ. Сформований в останні роки тренд на інтелектуалізацію підтримки прийняття рішень [6,7] в області завдань забезпечення кібербезпеки ОбІ, дозволив по-новому поглянути на досі невирішені завдання для подібних систем. ...
... While government officials urge the regulations as an essential gadget for critical infrastructure protection, private sector asserts the regulations as the obstacles before the innovations , (Orlowski, 2001). As an example, the Cybersecurity Act of 2012 failed to pass the US Senate as the result of this tension, although White House endorsed it (Kelly, 2012). ...
... However, this enjoyment usually takes the form of immediate and conspicuous consumption [19]. Notably, financial crime has no boundary, as it is common in developing countries, so also the crime is committed in a developed economy [19,20,21,22]. In another perspective financial crimes referred to a broad category of crimes against property, committed by individuals and organizations to obtain a personal or business advantage [23]. ...
Article
Full-text available
The goal is to survey big data techniques applications to financial crime prevention and detection in more than two decades. Also, to determine the industrial sector of financial crime that has gathered the most interest and which fields still lack research. The study describes the most common methods for detecting financial crime, indicating some of the current research problems, trends, and issues in big data application. Meanwhile, the survey focuses on financial crime detection techniques applied in several sectors such as banks, computer networks, insurance, securities, exchange commodities, stock markets and money laundering. The methods considered in the survey include; big data analytics foundational technologies and big data analytics emerging research. In most of the data-collection strategies and data analysis, there was a shift from traditional data collection method to computer-based methods. In the aspect of data analysis, there was an increase in the use of descriptive, inferential statistical analysis. We made an evaluation of the detecting techniques based on data analysis factors such as processing speed, latency, volume, performance, fault tolerance, scalability, and accuracy. Then we propose that anomaly, data-mining, clustering, hybrid-technologies, neural networks, rough clustering, k-Means clustering, neuro-fuzzy, genetic algorithms and fuzzy support vector machine models are performing better than other methods currently in practice. However, more research is required in big data infrastructures like hardware equipment, software licensing, and maintenance which are still very expensive. Likewise, further research is needed in the human analysis of big data approaches to financial crime detection because of the challenges of sorting out information.
... Informal groups may work together to achieve a common goal in a semi-organized, impermanent manner, but may not be part of a larger organization. For instance, hacktivists, including Anonymous, have become an important concern for organizational and government security (Kelly, 2012); Wikileaks is another example. Groups may work together to use social engineering attacks (Beznosov and Beznosova, 2007;Fulton, Lawrence, and Clouse, 2013), such as phishing, to obtain unauthorized access to systems and networks. ...
Article
Full-text available
Cyber defense competitions (CDCs) simulate a real-world environment where the competitors must protect the information assets of a fictional organization. These competitions are becoming popular at the high school and college levels, as well as in industry and governmental settings. However, there is little research to date on the learning outcomes associated with CDCs or the long-term benefits to the participants as they pursue future educational, employment, or military goals. For this exploratory research project, we surveyed 11 judges and mentors participating in a well-established high school CDC held in the southeastern United States. Then, we developed a set of recommended learning outcomes for CDCs, based on importance of the topic and participant preparedness for future information-security related endeavors. While most previous research has focused on technology issues, we analyzed technological, human, and social topics to develop a comprehensive set of recommendations for future CDCs.
... It is interesting in this regard that one of the key characteristics of activist/hacktivist groups or gatherings, such as Anonymous, is "a hallmark tone of moral retribution . . . an unrelenting moral stance on issues and rights, regardless of direct provocation" (Kelly, 2012(Kelly, , p. 1680). This moral orientation seems consistent with the importance of communal social emotions in responding to pop-up warnings. ...
Article
Full-text available
We measured reported User Affective Experience (UAX) anticipated to pop-up warnings that unexpectedly appear during computer use. Such warnings, designed to protect the user, are often ignored; suggesting the influence of non-rational factors. Emotions can both enhance and undermine effective decision making, but they in the decision literature are typically defined and measured simply in terms of positive and negative valence. We examined discrete emotions anticipated when pop-up warnings appear, including specific positive, negative, individualist, and prosocial emotions based upon affective neuroscience. Forty-five emotions associated with receiving warnings associated with failing to update software, both in relaxed online sessions and sessions involving time and attention pressures, were assessed for underlying measurement structure. 400 participants were recruited via Mechanical Turk, and reported about specific emotions presented in random order. Exploratory Structural Equation Modeling (ESEM) analyses revealed four reliable latent factors for relaxed (R) and pressured (P) conditions: Positive Affect, Anxiety, Hostility, and Loneliness. P conditions were higher in reported Anxiety, Hostility, and Loneliness; and lower in reported Positive Affect. Men reported higher feelings of Hostility and Loneliness; women reported higher Anxiety. Implications are discussed for designing pop-up warnings and also more generally regarding conceptualizing and measuring user experience (UX)
... To address this gap, I conducted an inductive field study of the Anonymous online community-a collective of Internet trolls, hackers and pranksters best known for their transgressive hijinks and for supporting high-profile social change efforts over the past decade (e.g., Wikileaks, Arab Spring, Occupy Wall Street). Anonymous has been described as "an internet gathering" with "a very loose and decentralized command structure that operates on ideas rather than directives" (Kelly, 2012) and has become a community in which a "sea of voices, all experimenting with new ways of being in the world" (Norton, 2012), weigh in on a range of global conflicts and social issues. I capture Anonymous's transition from a recreational community to one that, through engagement in increasingly ambitious projects and experimentation with ways of organizing, became an enduring assembly of tricksters and activists. ...
Article
Online communities have displaced or become complements to organizations such as churches, labor unions and political groups which have traditionally been at the center of collective action. Yet, despite their growing influence and support of faster, cheaper and more flexible organizing, few empirical studies address how online communities are built and become enduring agents of social change. Using Internet-based ethnographic methods, this inductive field study examines how an online community called Anonymous transitioned from being a small gathering of contributors focused on recreation to becoming a community of trolls, activists and hackers incubating myriad projects. Findings reveal that the interplay of digital technology and a culture of transgression supported experimentation that culminated with the adoption of a resilient organizing platform that enabled several community factions to coexist in continuous engagement. This paper infuses community building research with an important emphasis on the role of the techno-cultural, highlighting how online formation and maintenance processes are shaped and shape mutually contingent technologies and cultures.
... The gradual rise in activity by the international online network of activists and hacktivists that act under the name of Anonymous reinforces the public sphere denouncement of cybersecurity initiatives advanced by state rhetoric. Established in 2004, Anonymous's initial purposes were to establish an online entertainment community (Kelly 2012(Kelly : 1663(Kelly -1665. By 2009, however, Anonymous had developed into an organized hacktivist community making use of cyber protest to instigate political and social statements against cyber-surveillance and cyber-censorship. ...
Article
Full-text available
This study explores the relative contributions of state rhetoric, the public sphere and corporate elite interests towards the construction of the 2010 US National Security Strategy (NSS). Interpreted thusly, the evolution in the US securitisation agenda illustrates the social construction of US securitisation strategy as a national artefact seemingly informed by local interests but framed within international uncertainty. Exploring the relative contributions of state rhetoric, the public sphere and corporate elite interests thusly, indicates that different threat matrixes emerge from the social forces that propel the 2010 NSS into being. The research, in accordance with its approach, finds that the focus of securing the threat of risk to national interests and assets within international uncertainty, results in the form of US securitisation strategy not fully realising its function of securitisation. Through deliberating on how and why particular threats are prioritised above others to the nation-state, this article seeks to motivate further research into the social construction of policy priorities to better understand how and why threat matrixes shift in the 21st Century.
... In 2003 the hacktivist group Anonymous was founded, an international network of activist and hacktivist entities. The group became known for a series of well--publicized stunts and distributed denial--of--service attacks on government, religious, and corporate websites (Kelly, 2012). At this moment, there are regulations for hacking and it is considered as a violation of the law. ...
... Anonymous (Anonymous, 2014a) describe themselves as "a decentralized network of individuals focused on promoting access to information, free speech, and transparency" (http:www.anonanalytics.com). According to Kelly (2009) "even under the discrete umbrella of hacktivism, however, Anonymous has a distinct makeup: a decentralized (almost non-existent) structure, unabashed moralistic/political motivations, and a proclivity to couple online cyberattacks with offline protests" (p. 1668). ...
Chapter
Full-text available
Social media has become a major aspect of online activity, and thus an essential part of cybercrime and cyber terrorism-related operations. As LEA’s (law enforcement agencies) focus upon cybercrime and cyber terrorism threats increase, so does the requirement to consider the potential application of social media as a vital aspect of any cyber defense strategy. This chapter considers social media's role in society and the characteristics that influence the way people use it. A number of case study scenarios are presented to demonstrate the potential application of social media in combatting a variety of criminal threats including human trafficking, hostage situations, and other organized crime. Each scenario considers the potential impact of a number of example technologies such as text mining, NLP (natural language processing) and sentiment analysis supported by an understanding of the relevance of people's usage characteristics and behaviors within social media.
... Anonymous (Anonymous, 2014a) describe themselves as "a decentralized network of individuals focused on promoting access to information, free speech, and transparency" (http:www.anonanalytics.com). According to Kelly (2009) "even under the discrete umbrella of hacktivism, however, Anonymous has a distinct makeup: a decentralized (almost non-existent) structure, unabashed moralistic/political motivations, and a proclivity to couple online cyberattacks with offline protests" (p. 1668). ...
Chapter
Situational understanding and attack attribution of cybercrimes is one of the key problems defined by the U.S. Department of Homeland Security (2009) for cyber security research. In particular, situational understanding is critical for a number of reasons: improved systems security; improved defense against future attacks; attack attribution; identification of potential threats; improved situational awareness. This paper shows that a clearer understanding of the motivations and intentions behind cybercrimes/cyber terrorism can lead to clearer situational understanding and awareness. Five pertinent real-life scenarios are considered and a taxonomy which focuses on the motivations and intent of the cybercrimes is outlined. The development of the taxonomy highlights a clear need to create an agreed set of definitions and understandings for improved cyber security defense. The very fact that the hacking is happening across times zones and jurisdictions means that it is easier for hackers, hacktivists, and cyber criminals, etc., to continue their attacks. There is a need for clear communication strategies and intelligence about the attacks to be shared between not only by affected countries/governments, but also networks across the globe to strengthen security networks against future attacks and risks. A knowledge repository of cybercrime, which makes use of this simple taxonomy design, could help toward strengthening the plight against cybercrime.
... However, online anonymity can also have detrimental effects in the society. Examples of this include anonymous hacking [12], and communication by terrorists [13]. ...
Article
Full-text available
The Dining Cryptographer network (or DC-net) is a privacy preserving communication protocol devised by David Chaum for anonymous message publication. A very attractive feature of DC-nets is the strength of its security, which is inherent in the protocol and is not dependent on other schemes, like encryption. Unfortunately the DC-net protocol has a level of complexity that causes it to suffer from exceptional communication overhead and implementation difficulty that precludes its use in many real-world use-cases. We have designed and created a DC-net implementation that uses a pure client-server model, which successfully avoids much of the complexity inherent in the DC-net protocol. We describe the theory of DC-nets and our pure client-server implementation, as well as the compromises that were made to reduce the protocol’s level of complexity. Discussion centers around the details of our implementation of DC-net.
Book
Full-text available
Anonymität entwickelt sich im 20. Jahrhundert zu einem markanten Begriff der Gesellschaftsbeobachtung, der Utopie anderer Existenzweisen und der Gefährdung von Ordnung. Die Gesellschaft des 20. Jahrhunderts erscheint mitunter als eine immense Hotelhalle, in der sich die Menschen bezugslos tummeln. Die Zonen des Anonymen gelten gleichermaßen als unfassbar wie auch als Kristallisationspunkte, wo neue Formen des Sozialen entstehen. Dergestalt lenken sie den Blick einer neuartigen Sociology Noir auf sich, mehr noch, über die Fotografie, die namenlose Menschen auf neue Weise in Szene setzt, entwickelt sich eine eigentliche Ästhetik des Anonymen an der alltäglichen Bruchstelle von Individuum und Gesellschaft. Allein, die wissenschaftliche Bestimmung des Phänomens des Anonymen erweist sich als unmöglich: »Das Anonyme, das begriffen würde, wäre es nie gewesen«, so Jaspers. Genau in dieser Unmöglichkeit liegt gleichzeitig auch der Kern einer Utopie, eines Jenseits der gesellschaftlichen Ordnung. Anonymität erweist sich zusehends als eine Maschine zur Erzeugung von Fiktionen. Avantgarde-Bewegungen beginnen mit der Anonymität zu experimentieren – und scheitern. So droht die Anonymitätsvorstellung mehr und mehr zum Mythos zu werden, und Foucaults Ruf, »wir müssen die Anonymität erobern«, lockt in eine Falle, wie die aussichtslose Suche nach Anonymität in den Adressräumen des Cyberspace zeigt. Denn was Anonymität selbst anonymisiert ist die Tatsache, dass sie stets einer Ordnung entspringt und mehr noch über Verrätselung dabei hilft, diese Ordnung an neue Realitäten anzupassen. Anonymität und moderne Gesellschaft sind so auf das Engste miteinander verbunden. Das Widerständige, so die These in diesem Band, liegt in den Namen selbst.
Chapter
Full-text available
Anonymität entwickelt sich im 20. Jahrhundert zu einem markanten Begriff der Gesellschaftsbeobachtung, der Utopie anderer Existenzweisen und der Gefährdung von Ordnung. Die Gesellschaft des 20. Jahrhunderts erscheint mitunter als eine immense Hotelhalle, in der sich die Menschen bezugslos tummeln. Die Zonen des Anonymen gelten gleichermaßen als unfassbar wie auch als Kristallisationspunkte, wo neue Formen des Sozialen entstehen. Dergestalt lenken sie den Blick einer neuartigen Sociology Noir auf sich, mehr noch, über die Fotografie, die namenlose Menschen auf neue Weise in Szene setzt, entwickelt sich eine eigentliche Ästhetik des Anonymen an der alltäglichen Bruchstelle von Individuum und Gesellschaft. Allein, die wissenschaftliche Bestimmung des Phänomens des Anonymen erweist sich als unmöglich: »Das Anonyme, das begriffen würde, wäre es nie gewesen«, so Jaspers. Genau in dieser Unmöglichkeit liegt gleichzeitig auch der Kern einer Utopie, eines Jenseits der gesellschaftlichen Ordnung. Anonymität erweist sich zusehends als eine Maschine zur Erzeugung von Fiktionen. Avantgarde-Bewegungen beginnen mit der Anonymität zu experimentieren – und scheitern. So droht die Anonymitätsvorstellung mehr und mehr zum Mythos zu werden, und Foucaults Ruf, »wir müssen die Anonymität erobern«, lockt in eine Falle, wie die aussichtslose Suche nach Anonymität in den Adressräumen des Cyberspace zeigt. Denn was Anonymität selbst anonymisiert ist die Tatsache, dass sie stets einer Ordnung entspringt und mehr noch über Verrätselung dabei hilft, diese Ordnung an neue Realitäten anzupassen. Anonymität und moderne Gesellschaft sind so auf das Engste miteinander verbunden. Das Widerständige, so die These in diesem Band, liegt in den Namen selbst.
Chapter
This article describes how as access to the Internet has increased, cybersecurity has become important, with businesses and the government spending much time and resources to combat cyber attacks. The purpose of this article was to review the existing literature related to cybersecurity. Specifically, the review synthesizes the empirical research in (1) various types of cyber attacks, (2) contributing factors related to cybersecurity behavior, and (3) strategy to improve cybersecurity behavior. The most developed line of research in this area has been focusing on the strategies to improve cybersecurity behavior, showing a questionable trend of quickly creating solutions before fully conceptualizing the problem.
Chapter
This article describes how as access to the Internet has increased, cybersecurity has become important, with businesses and the government spending much time and resources to combat cyber attacks. The purpose of this article was to review the existing literature related to cybersecurity. Specifically, the review synthesizes the empirical research in (1) various types of cyber attacks, (2) contributing factors related to cybersecurity behavior, and (3) strategi to improve cybersecurity behavior. The most developed line of research in this area has been focusing on the strategies to improve cybersecurity behavior, showing a questionable trend of quickly creating solutions before fully conceptualizing the problem.
Chapter
This article describes how as access to the Internet has increased, cybersecurity has become important, with businesses and the government spending much time and resources to combat cyber attacks. The purpose of this article was to review the existing literature related to cybersecurity. Specifically, the review synthesizes the empirical research in (1) various types of cyber attacks, (2) contributing factors related to cybersecurity behavior, and (3) strategies to improve cybersecurity behavior. The most developed line of research in this area has been focusing on the strategies to improve cybersecurity behavior, showing a questionable trend of quickly creating solutions before fully conceptualizing the problem.
Article
Data breaches are an increasingly common event across businesses globally. Many companies have been subject to large-scale breaches. Consequently, the exposure of 37 million customers of the Ashley Madison website is not an extraordinary event in and of itself. However, Ashley Madison is an online dating website predominantly known for facilitating extramarital affairs. Therefore, the nature of this website (and business) is very different from those that have previously been breached. This article examines one of the media discourses surrounding the victims of the Ashley Madison data breach. It particular, it illustrates examples of victim blaming evident in the print media towards individuals (or customers) who had their personal details exposed. Importantly, it highlights the emerging tension within this particular case, of the strong victim blaming narrative contrasted against those who attempted to challenge this discourse and refocus attention on the actual offenders, and the criminality of the act. The article concludes that victims of this data breach were exposed to victim blaming, based on the perceived immorality of the website they were connected to and their actions in subscribing, rather than focusing on the data breach itself, and the blatant criminality of the offenders who exposed the sensitive information.
Article
This article describes how as access to the Internet has increased, cybersecurity has become important, with businesses and the government spending much time and resources to combat cyber attacks. The purpose of this article was to review the existing literature related to cybersecurity. Specifically, the review synthesizes the empirical research in (1) various types of cyber attacks, (2) contributing factors related to cybersecurity behavior, and (3) strategi to improve cybersecurity behavior. The most developed line of research in this area has been focusing on the strategies to improve cybersecurity behavior, showing a questionable trend of quickly creating solutions before fully conceptualizing the problem. Copyright © 2017, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Article
Holocaust denial has long been ignored by much of the academic community to prevent directing much attention toward it. To try and garner legitimacy, the leaders of the Holocaust denial movement constructed a pseudoacademic framework to promote Holocaust denial as an alternative yet viable view. In the last twenty years Holocaust denial has spread this framework on the Internet with success, as antisemitic works like the Journal for Historical Review are now accessible by an exponentially larger audience at a fraction of the cost. Shortly following the appearance of Holocaust denial online, websites specifically devoted to responding to and refuting Holocaust denial followed in their wake. These websites, while useful archives of material, lack the necessary structure and design to engage with the new mass of Holocaust deniers that have growth out of the deniers’ “colonization” of the Internet. Ultimately, a new strategy must be devised to properly challenge the rise of Holocaust denial online, especially as younger generations are coming online earlier and social media allows for the virtually effortless spread of information.Keywords: 1977 Human Rights Act, 1975 Racial Discrimination Act, antisemitism, Deborah Lipstadt, Ernst Zündel, Frederick Toben, Hate Speech Laws, Holocaust denial, Internet, Nizkor
Article
Critical infrastructures are vital assets for public safety, economic welfare and/or national security of countries. Today, cyber systems are extensively used to control and monitor critical infrastructures. A considerable amount of the infrastructures are connected to the Internet over corporate networks. Therefore, cyber security is an important item for the national security agendas of several countries. The enforcement of security principles on the critical infrastructure operators through the regulations is a still-debated topic. There are several academic and governmental studies that analyze the possible regulatory approaches for the security of the critical infrastructures. Although most of them favor the market-oriented approaches, some argue the necessity of government interventions. This paper presents a three phased-research to identify the suitable regulatory approach for the critical infrastructures of Turkey. First of all, the data of the critical infrastructures of Turkey are qualitatively analyzed, by using grounded theory method, to extract the vulnerabilities associated with the critical infrastructures. Secondly, a Delphi survey is conducted with six experts to extract the required regulations to mitigate the vulnerabilities. Finally, a focus group interview is conducted with the employees of the critical infrastructures to specify the suitable regulatory approaches for the critical infrastructures of Turkey. The results of the research show that the critical infrastructure operators of Turkey, including privately held operators, are mainly in favor of regulations.
Article
The Foreign Commerce Clause has been lost, subsumed by its interstate cousin, and overshadowed in foreign relations by the treaty power. Consistent with its original purpose and the implied, but unrefined view asserted by the judiciary, this Article articulates a broader and deeper Foreign Commerce power than is popularly understood. It reframes doctrinal considerations for a reinvigorated Foreign Commerce Clause - both as an independent power and in alliance with other coordinate foreign affairs powers - and demonstrates that increasing global complexity and interdependence makes broad and deep federal authority under this power crucial to effective and efficient action in matters of national concern.
Book
The first generation of Digital Natives (DNs) is now growing up. However, these digital natives were rather late starters since; their exposure to computers started when they could master the mouse and the penetration of computers in educational institutions was still very low. Today, a new breed of digital natives is emerging. This new breed includes those individuals who are being introduced from their first instances to the world of wireless devices. One year olds manage to master the intuitive touch interfaces of their tablets whilst sitting comfortably in their baby bouncers. The controller-less interfaces allow these children to interact with a machine in a way which was unconceivable below. Thus, our research investigated the paradigm shift between the different generations of digital natives. We analysed the way in which these two generations differ from each other and we explored how the world needs to change in order to harness the potential of these new digital natives.
Article
Full-text available
Cyber weapons now are an extension of state power. In hopes of gaining a strategic advantage, many countries including the United States, Russia and China are developing offensive cyber-capabilities to disrupt political, economic, and social institutions in competitor nations. These activities have lead to a cyber arms race that is spiraling out of control. This imminent global threat challenges the international community to be proactive. The purpose of this paper is to propose an international convention to throttle the development, proliferation and use of cyber weapons before they cause electronic Armageddon. We begin by examining three successful efforts in arms control and use the lessons learned to draft a convention that can serve as a starting point for formal multilateral negotiations.
Article
Although scholars recognize the importance of understanding the range of structures that precede the emergence of social movements, there has been little effort to elucidate how collective actors step past the bounds of subcultures and organize loosely bounded networks to incite social change. This inductive case study sheds light on this process by tracing how Anonymous, a dispersed online network of pranksters anchored in a highly oppositional subculture, became an insurgency seeking to dismantle the Church of Scientology. Findings reveal a process model of how, following a trigger event that led them to mobilize, Anonymous sought out balance between the competing sentiments of internal and external audiences, undergoing changes in membership and collective action frames that led to the displacement of a founding ethos, factionalization and eventual demobilization.
Conference Paper
The landscape for Incident Response (IR), Disaster Recovery (DR), and Business Continuity Planning (BCP) for social media is changing and growing as the growth of social media itself is just now reaching puberty. An examination of responses by companies and entities to hacking based on current events and social reception will be measured with a forecast towards future implications of the IR/DR/BCP community. Recent Information Security (IS) topics including Firesheep, Photobucket, Facebook, Twitter, Apple, LinkedIn, eHarmony, and Sony's PlayStation Network (PSN) will be used as a backdrop to display the different ways entities have responded to intrusive behavior and what the results were.
Article
Cyber weapons now are an extension of state power. In hopes of gaining a strategic advantage, many countries including the United States, Russia and China are developing offensive cyber capabilities to disrupt political, economic, and social institutions in competitor nations. These activities have led to a cyber arms race that is spiraling out of control. This imminent global threat challenges the international community to be proactive. The purpose of this article is to propose an international convention to throttle the development, proliferation and use of cyber weapons before they cause electronic Armageddon. We begin by examining three successful efforts in arms control and use the lessons learned to draft a convention that can serve as a starting point for formal multilateral negotiations.
Article
Recent scholarship on theories of criminal punishment has increasingly focused on retributivist justifications for punishment. While within this retributivist camp opinions differ as to the particulars of such policies, there is general agreement that criminals getting what they deserve, that is, their "just deserts," should be the underlying goal and rationale of the criminal justice system. From this point, these scholars argue that a criminal should receive punishment according to what the criminal deserves. Some forms of retributivism, however, have attempted to draw support from other theories of criminal punishment. By borrowing elements of other theories, specifically utilitarian theories, scholars have attempted to bolster support for retributivist policies. A particularly well received form of retributivism and the focus of this Comment, "limiting retributivism," argues that a range of punishments will fall within the criminal's just deserts, and that utilitarian concepts can alter the punishment within the aforementioned range. This Comment scrutinizes limiting retributivism's appeal to utilitarian theories of punishment to determine if such a system of punishment can achieve many of the outcomes sought by utilitarian theories, specifically deterrence. This Comment argues that the answer to this question, while complex, is ultimately no. I begin my inquiry by expounding on the history of retributive and utilitarian theories of punishment, and the specific concepts of limiting retributivism and what "factors" exist in determining a criminal's just deserts. Then, I shift focus and analyze the practical effects of these factors in light of recent behavioral psychology and behavioral law and economics research on cognitive biases. Subsequently, I describe why these insights into human psychology and the effects of cognitive biases, as applied to the retributive factors in determining just deserts, will actually lead to under-deterrence of criminal activity. I develop this point by acknowledging that while this research also questions utilitarianism's proposal for deterrence through ex ante incentives, the under-deterrence effect of limiting retributivism is far higher than that of utilitarianism. I also highlight why such under-deterrence is fundamentally contrary to utilitarian goals of punishment. I end by arguing that, given the insights of behavioral psychology, utilitarian goals of punishment are not sufficiently accomplished under limiting retributivism. A more pure form of utilitarianism is required to achieve utilitarian goals with hard and fast criminal rules with no appeal to or use of other theories of punishment. I also propose that utilitarians, in collaboration with behavioral law and economics scholars, can further understanding of how the criminal law may incorporate behavioral psychology insights to create more effective ex ante incentives.
Article
This Article argues that the void for vagueness doctrine requires courts to adopt narrow interpretations of the Computer Fraud and Abuse Act. On its face, the CFAA has become extraordinarily broad. Recent amendments indicate that Congress has largely abandoned the job of identifying what conduct involving computers should or should not be a federal crime. Congress has broadened the statute so far that the courts must now narrowly construe the statute to save its constitutionality. This Article demonstrates how courts should narrowly construe the statute under the void for vagueness doctrine by focusing on two recent criminal prosecutions: United States v. Drew, which considered whether Terms of Service violations trigger CFAA liability, and United States v. Nosal, which asked whether it violates the CFAA for employees to access their employers’ computers in ways contrary to their employers’ interests. These two prosecutions show the critical role of vagueness doctrine in interpreting the CFAA, pointing to a future of judicial narrowing of the statute.