Found: 58
Select item for more details and to access through your institution.
Retheorising Civil Disobedience in the Context of the Marginalised.
- Published in:
- Theoria: A Journal of Social & Political Theory, 2024, v. 70, n. 178, p. 1, doi. 10.3167/th.2024.7117801
- By:
- Publication type:
- Article
THE FACES OF HACKTIVISM BY THE ANONYMOUS COLLECTIVE IN THE CONTEXT OF RUSSIAN WAR AGAINST UKRAINE. COMPARISON BETWEEN 2014 AND 2022.
- Published in:
- Journal of Security & Sustainability Issues, 2023, v. 13, n. 1, p. 143, doi. 10.47459/jssi.2023.13.14
- By:
- Publication type:
- Article
La cultura hacker en las estrategias transmedia de las series de televisión: el caso de Mr. Robot (2015-2019).
- Published in:
- Zer: Journal of Communication Studies / Revista de Estudios de Comunicacion / Komunikazio Ikasketen Aldizkaria, 2022, v. 27, n. 52, p. 35, doi. 10.1387/zer.22991
- By:
- Publication type:
- Article
Cultura de la participación cívica: movilización transmedia y hacktivismo en comunidades de práctica (casos de fans y makers).
- Published in:
- Artnodes, 2022, n. 29, p. 1, doi. 10.7238/artnodes.v0i29.393059
- By:
- Publication type:
- Article
Hacktivism of the Anonymous Group as a Fighting Tool in the Context of Russia’s War against Ukraine.
- Published in:
- Future Human Image, 2022, v. 17, p. 39, doi. 10.29202/fhi/17/6
- By:
- Publication type:
- Article
HACKERS CÍVICOS: TECNOLOGIAS DIGITAIS COMO CONSTRUÇÃO COLETIVA DO MEIO URBANO NO BRASIL.
- Published in:
- Revista Brasileira de Estudos Urbanos e Regionais, 2022, v. 24, n. 1, p. 1, doi. 10.22296/2317-1529.rbeur.202222
- By:
- Publication type:
- Article
La condición transreal: información expandida y hacktivismo en el Media Art.
- Published in:
- Artnodes, 2021, n. 28, p. 1, doi. 10.7238/a.v0i28.377879
- By:
- Publication type:
- Article
Common Images: What Post-Media Does to Cinema.
- Published in:
- AugenBlick, 2021, n. 80, p. 67
- By:
- Publication type:
- Article
MUJERES HACKER, SABER-HACER Y CÓDIGO ABIERTO: TEJIENDO EL SUEÑO HACKFEMINISTA.
- Published in:
- Liminar, 2021, v. 19, n. 1, p. 57, doi. 10.29043/liminar.v19i1.806
- By:
- Publication type:
- Article
WHO WATCHES THE WATCH DOGS? HOW WATCH DOGS 2 REPRESENTS HACKER CULTURE AND HACKTIVISM.
- Published in:
- Media Studies / Mediální Studia, 2021, n. 1, p. 43
- By:
- Publication type:
- Article
Construtos audiovisuais de vigilância e privacidade: interfaces entre tecnocultura e tecnopolítica e os sentidos de hacktivismo em jogos digitais.
- Published in:
- Revista Fronteiras, 2020, v. 22, n. 3, p. 67, doi. 10.4013/fem.2020.223.06
- By:
- Publication type:
- Article
Cyber risk: Is your data retention policy helping or hurting?
- Published in:
- Bench & Bar of Minnesota, 2020, v. 77, n. 7, p. 8
- By:
- Publication type:
- Article
Digitalizando o cuidado: mulheres e novas codificações para a ética hacker.
- Published in:
- Cadernos PAGU, 2020, n. 59, p. 1, doi. 10.1590/18094449202000590005
- By:
- Publication type:
- Article
Network culture and the aesthetics of dissension.
- Published in:
- Escritura e Imagen, 2020, v. 16, p. 271, doi. 10.5209/esim.73038
- By:
- Publication type:
- Article
Anonymous's Glory.
- Published in:
- International Journal of Communication (19328036), 2020, v. 14, p. 3399
- By:
- Publication type:
- Article
SECURITY IN A DIGITAL WORLD.
- Published in:
- Harvard Political Review, 2018, v. 49, n. 4, p. 26
- By:
- Publication type:
- Article
Could the Issue of DPRK Hacking Benefit from Benign Neglect?
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2018, v. 19, p. 83, doi. 10.1353/gia.2018.0010
- By:
- Publication type:
- Article
Cyberterorismul şi utilizarea teroristă a internetului.
- Published in:
- Annals of the West University of Timisoara: Law Series / Analele Universitatii de Vest din Timisoara: Seria Drept, 2018, n. 2, p. 21
- By:
- Publication type:
- Article
A Game Theoretical Approach to Hacktivism: Is Attack Likelihood a Product of Risks and Payoffs?
- Published in:
- CyberPsychology, Behavior & Social Networking, 2018, v. 21, n. 2, p. 73, doi. 10.1089/cyber.2016.0706
- By:
- Publication type:
- Article
Hacktivists against Terrorism: A Cultural Criminological Analysis of Anonymous' Anti- IS Campaigns.
- Published in:
- International Journal of Cyber Criminology, 2018, p. 187, doi. 10.5281/zenodo.1467895
- By:
- Publication type:
- Article
The Rise of Chinese Cyber Warriors: Towards a Theoretical Model of Online Hacktivism.
- Published in:
- International Journal of Cyber Criminology, 2018, p. 230, doi. 10.5281/zenodo.1467901
- By:
- Publication type:
- Article
Beyond the Cyberheadlines: We break down the biggest cyberevents from the past year.
- Published in:
- Government Technology, 2017, v. 30, n. 7, p. 40
- By:
- Publication type:
- Article
#HackFutures: Futurist As Hacker.
- Published in:
- Journal of Futures Studies, 2017, v. 22, n. 1, p. 89, doi. 10.6531/JFS.2017.22(1).A89
- By:
- Publication type:
- Article
User-Generated Captions: From Hackers, to the Disability Digerati, to Fansubbers.
- Published in:
- M/C Journal, 2017, v. 20, n. 3, p. 1, doi. 10.5204/mcj.1259
- By:
- Publication type:
- Article
Hackers' Motivations: Testing Schwartz's Theory of Motivational Types of Values in a Sample of Hackers.
- Published in:
- International Journal of Cyber Criminology, 2017, v. 11, n. 1, p. 78, doi. 10.5281/zenodo.495773
- By:
- Publication type:
- Article
Efficient One-Sided Adaptively Secure Computation.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 1, p. 321, doi. 10.1007/s00145-015-9222-4
- By:
- Publication type:
- Article
The Alternative Epistemologies of Data Activism.
- Published in:
- Digital Culture & Society, 2016, v. 2, n. 2, p. 57, doi. 10.14361/dcs-2016-0205
- By:
- Publication type:
- Article
Hacktivism, Interrupted: Moving Beyond the "Hacker Ethic" to Find Feminist Hacktivism.
- Published in:
- International Journal of Critical Cultural Studies, 2016, v. 14, n. 1, p. 37
- By:
- Publication type:
- Article
Hacktivism, Interrupted: Moving Beyond the "Hacker Ethic" to Find Feminist Hacktivism.
- Published in:
- International Journal of Interdisciplinary Cultural Studies, 2016, v. 11, n. 1, p. 37
- By:
- Publication type:
- Article
Human Rights and Hacktivism: The Cases of Wikileaks and Anonymous.
- Published in:
- Journal of Human Rights Practice, 2015, v. 7, n. 3, p. 391, doi. 10.1093/jhuman/huv012
- By:
- Publication type:
- Article
Against Critique: Fluxus and the Hacker Aesthetic.
- Published in:
- Modernism/Modernity, 2015, v. 22, n. 4, p. 787, doi. 10.1353/mod.2015.0059
- By:
- Publication type:
- Article
A Few Things to Think About.
- Published in:
- 2015
- By:
- Publication type:
- Editorial
UNMASKING HACKTIVISM.
- Published in:
- Government Technology, 2015, v. 28, n. 6, p. 14
- By:
- Publication type:
- Article
Cyber Conflicts: Addressing the Regulatory Gap.
- Published in:
- 2015
- By:
- Publication type:
- Editorial
Elementos Anarquistas no Cotidiano de Uma Organização Contemporânea: o Caso da Casa da Cultura Digital de Porto Alegre.
- Published in:
- GESTÃO.Org: Revista Eletrônica de Gestão Organizacional, 2015, v. 13, n. 1, p. 11
- By:
- Publication type:
- Article
A Right to Cybercounter Strikes: The Risks of Legalizing Hack Backs.
- Published in:
- IT Professional, 2015, v. 17, n. 1, p. 30, doi. 10.1109/MITP.2015.1
- By:
- Publication type:
- Article
Hacktivism -- Political Dissent in the Final Frontier.
- Published in:
- New England Law Review, 2015, v. 49, n. 2, p. 259
- By:
- Publication type:
- Article
Looking for Insurgency in Cyberspace.
- Published in:
- Central European Journal of International & Security Studies, 2014, v. 8, n. 4, p. 56
- By:
- Publication type:
- Article
Entangled Agencies: New Individual Practices of Human-Technology Hybridism Through Body Hacking.
- Published in:
- NanoEthics, 2014, v. 8, n. 3, p. 275, doi. 10.1007/s11569-014-0204-z
- By:
- Publication type:
- Article
Ethical Issues in Cyborg Technology: Diversity and Inclusion.
- Published in:
- NanoEthics, 2014, v. 8, n. 3, p. 303, doi. 10.1007/s11569-014-0206-x
- By:
- Publication type:
- Article
Abstract hacktivism as a model for postanarchist organizing.
- Published in:
- Ephemera: Theory & Politics in Organization, 2014, v. 14, n. 4, p. 765
- By:
- Publication type:
- Article
The Greening of Canadian Cyber Laws: What Environmental Law can Teach and Cyber Law can learn.
- Published in:
- International Journal of Cyber Criminology, 2014, v. 8, n. 2, p. 111
- By:
- Publication type:
- Article
"It Doesn't Have to Be This Way": Hacker Perspectives on Privacy.
- Published in:
- Social Justice, 2014, v. 41, n. 3, p. 29
- By:
- Publication type:
- Article
Hacker who Targeted WikiLeaks is Going after Edward Snowden.
- Published in:
- International Policy Digest, 2014, v. 1, n. 5, p. 26
- By:
- Publication type:
- Article
For the Lulz: Anonymous, Aesthetics, and Affect.
- Published in:
- TripleC (Cognition, Communication, Co-Operation): Open Access Journal for a Global Sustainable Information Society, 2014, v. 12, n. 1, p. 238, doi. 10.31269/vol12iss1pp238-264
- By:
- Publication type:
- Article
Cypherpunk.
- Published in:
- 2013
- By:
- Publication type:
- Book Review
HACKTIVISM AND THE FIRST AMENDMENT: DRAWING THE LINE BETWEEN CYBER PROTESTS AND CRIME.
- Published in:
- Harvard Journal of Law & Technology, 2013, v. 27, n. 1, p. 301
- By:
- Publication type:
- Article
Framing the Contested History of Digital Culture.
- Published in:
- Radical History Review, 2013, n. 117, p. 5, doi. 10.1215/01636545-2210446
- By:
- Publication type:
- Article
Networked Resistance: The Case of WikiLeaks.
- Published in:
- Journal of Computer-Mediated Communication, 2013, v. 18, n. 4, p. 420, doi. 10.1111/jcc4.12024
- By:
- Publication type:
- Article
Editorial Preface.
- Published in:
- PsychNology Journal, 2013, v. 11, n. 1, p. 7
- By:
- Publication type:
- Article