Hacktivism

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 2 of 3 - About 28 Essays
  • Superior Essays

    Meet Brian Thomas Mettenbrink, an unsuspecting 20-year-old computer geek from Nebraska. He looks just like you and me, acts just like you and me, but yet there is a defining difference about him that separates us: he will be serving a year sentencing in a federal prison for his relation to the 2008 DDoS (distributed denial-of-service) attack on the Church of Scientology’s website called Project Chanology. The goal of a DDoS attack is to overwhelm the targeted website with repeated access…

    • 1865 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    This book can be analyzed using a number of sociological techniques. The material the authors discuss is about the social interaction of humans in cyberspace. Therefore this material can be discussed using a variety of sociological concepts. Some concepts that can be used are Conflict Theory, Functionalist Theory, power and authority, social norms, social movements, culture, ethnocentrism, social deviance and symbols. Max Weber’s idea of legitimatized power can be used to analyze this text.…

    • 1378 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Cyber Crimes consist of illegal activity conducted on a computer. Traditional crimes may be committed while using a computer, but cyber crime consists of more specific types of crimes, such as phishing schemes and viruses. Cyber Crime consist some special characteristics, which are as followed. 2.3.1. Low risk High Rewarding Ventures The most striking feature of cyber crimes is that they are relatively easy to commit, difficult to detect and even harder to prove. The cyber criminals with basic…

    • 1076 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The year of 2008, the group became increasingly associated with international hacktivism, often with the goal of promoting freedom of speech and liberty of justice. Therefore, Anonymous have gained national attention in 2008 when the group had hacked many churches and people have learned who this enormous hacktivist group is and what they do. which is a modern form of protesters in which very intelligent programmers use their hacking skills to fight back against social and political injustice.…

    • 311 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    However, with such methods comes conflict and opposition. One controversial method of protest is “hacktivism”, a combination of the words “hacking” and “activism”. This term refers to the act of hacking or breaking into a computer system for a politically or socially motivated purpose. Many times, it is difficult for activists in small numbers to make…

    • 1703 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Hard to argue otherwise. Of particular consequence, however, hacktivism requires doing something ‘potentially illegal’ based on speculation or conjecture. As Anonymous ‘suspects’ certain Twitter users to be ISIS recruiting syndicates, they still must properly ‘identify’ the ‘target’. Yet hactivism is about demonstrating…

    • 609 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    press-political relationship. These are considered as strengths of Zayani’s work as it favours a certain perspective compared to other sources which enables varied opinion. The weakness of the journal is that there is a bias opinion based pro “hacktivism” although, there is no professional bias opinion. Therefore, this is the weakness of the source as it lacks specific professional opinion, affecting the strong bias un-professional opinion of the…

    • 1025 Words
    • 5 Pages
    Improved Essays
  • Brilliant Essays

    User Liberties/Rights Assessment USCENTCOM and ultimately the 160th Signal Brigade is responsible for maintaining communications in a very dynamic and high risk environment. The mission is to maintain our human rights and defend against terrorism. This mission needs to transfer to defending rights on in cyberspace. Policies confronting challenges of preserving core rights and liberties is part of the commitment. Safeguarding these vital rights and fundamental freedoms and privileges is…

    • 1749 Words
    • 7 Pages
    Brilliant Essays
  • Superior Essays

    Why Commit Cybercrime

    • 915 Words
    • 4 Pages

    What motivates an individual to commit cybercrime? The six main reasons are: 1. Boredom 2. Challenge 3. Revenge 4. Greed 5. Sexual 6. Political and religious These reasons are all considered to be interference with the lawful use of a computer (Britz, 2013, p.76). Cybercrimes require less planning and resources and lessen the chance of being caught (Motives, 2016). Boredom is a motive that might start off a life of cybercrime. Trying to get into a forbidden system could be seen as a quest…

    • 915 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Hackers Threat Analysis

    • 1037 Words
    • 5 Pages

    Introduction To understand threat actors and their motivation to hack into a system, we have first to examine their background, psychological factors and culture environment. Understanding threat actors include elements such as personality characteristics, motivations, and what drives or influence these criminals. Hackers break into systems for profit, thrills, bragging rights, and curiosity. There are several psychological factors which can often motivate hackers which can be money, fame,…

    • 1037 Words
    • 5 Pages
    Improved Essays
  • Page 1 2 3