Searched for: subject%3A%22internet%22
(1 - 2 of 2)
document
Pieters, W. (author), Barendse, Jeroen (author), Ford, Margaret (author), Heath, Claude P R (author), Probst, Christian W. (author), Verbij, Ruud (author)
The navigation metaphor for cybersecurity merges security architecture models and security economics. By identifying the most efficient routes for gaining access to assets from an attacker's viewpoint, an organization can optimize its defenses along these routes. The well-understood concept of navigation makes it easier to motivate and...
journal article 2016
document
Serracino Inglott, P. (author)
Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterious as popularly portrayed. Under a definition...
journal article 2013