Web defacements as a form of hacktivism are rarely archived and thus mostly lost for systematic study. When they find their way into web archives, it is often more as a by-product of a larger web archiving effort than as the result of a targeted effort. Aside from large collections there also exists a small scene of community-maintained cybercrime archives that archive hacked web sites, some of which are hacked in a hacktivist context. It is the purpose of this article to give an overview of the state and possibilities of using both archives for research. Such research may include qualitative and quantitative data analysis from a media and social studies perspective
There are various challenges with online data collection, from participant recruitment to ensuring ...
Although a relatively simple form of hacking, website defacement can have severe consequences both f...
Hackers tend to be portrayed as criminals or activists. In current digital media landscapes, however...
Web defacements as a form of hacktivism are rarely archived and thus mostly lost for systematic stud...
The idea of influencing public opinion through digital media is ubiquitous, yet little is known abo...
Aim/Purpose: This study aims to investigate various characteristics from both victims as defaced web...
Digital media and networks occupy an increasing central position within contemporary societies. This...
This article offers a reading of internet-based activism or \u2018hacktivism\u2019 as a phenomenon t...
Aim/Purpose This study aims to investigate various characteristics from both, victims - defaced webs...
This paper explores the concept of hacktivism, which is hacking for a political or social cause on t...
Background and aims: Cybercrime is an issue that increases year on year, however rarely are the mo...
After WikiLeaks released hundreds of thousands of classified U.S. government documents in 2010, the ...
The aim of this guide is to provide a starting point for using web archives as a source for social s...
Hackers have been present in computer networks from the moment networks began to exist. Beginning as...
ABSTRACT: The recognized correlation between the growing spread of violent extremist and terrorist c...
There are various challenges with online data collection, from participant recruitment to ensuring ...
Although a relatively simple form of hacking, website defacement can have severe consequences both f...
Hackers tend to be portrayed as criminals or activists. In current digital media landscapes, however...
Web defacements as a form of hacktivism are rarely archived and thus mostly lost for systematic stud...
The idea of influencing public opinion through digital media is ubiquitous, yet little is known abo...
Aim/Purpose: This study aims to investigate various characteristics from both victims as defaced web...
Digital media and networks occupy an increasing central position within contemporary societies. This...
This article offers a reading of internet-based activism or \u2018hacktivism\u2019 as a phenomenon t...
Aim/Purpose This study aims to investigate various characteristics from both, victims - defaced webs...
This paper explores the concept of hacktivism, which is hacking for a political or social cause on t...
Background and aims: Cybercrime is an issue that increases year on year, however rarely are the mo...
After WikiLeaks released hundreds of thousands of classified U.S. government documents in 2010, the ...
The aim of this guide is to provide a starting point for using web archives as a source for social s...
Hackers have been present in computer networks from the moment networks began to exist. Beginning as...
ABSTRACT: The recognized correlation between the growing spread of violent extremist and terrorist c...
There are various challenges with online data collection, from participant recruitment to ensuring ...
Although a relatively simple form of hacking, website defacement can have severe consequences both f...
Hackers tend to be portrayed as criminals or activists. In current digital media landscapes, however...