4 results

US hack shows data is the new frontier in cyber security conflict.

Other
Buchanan, W. J. (2015)
US hack shows data is the new frontier in cyber security conflict
More than four million personal records of US government workers are thought to have been hacked and stolen, it has been. With US investigators blaming the Chinese government ...

Self-efficacy as a factor in the evaluation of e-petitions.

Conference Proceeding
Cruickshank, P. & Smith, C. F. (2008)
Self-efficacy as a factor in the evaluation of e-petitions. In Parycek, P. (Ed.). Proceedings of EDEM 2009 - Conference on Electronic Democracy, 223-232. ISBN 978-3-85403-251-9
E-petitions are seen as one response to a perceived decline in public trust of political institutions and the associated symptoms of disengagement. In this paper, some current...

Future risks – Including the rise of the hacktivism.

Conference Proceeding
Buchanan, W. J. (2011)
Future risks – Including the rise of the hacktivism. In National Information Security Conference (NISC)
As organisations move towards infrastructures which are highly dependent on their Web infrastructure, they are now at great risk from external parties who can use a number of ...

Ashley Madison breach reveals the rise of the moralist hacker

Other
Buchanan, W. J. (2015)
Ashley Madison breach reveals the rise of the moralist hacker
There’s value in more than just credit card data, as Avid Life Media (ALM), parent company of the extramarital affair website Ashley Madison, has found out after being raided ...