Being Digital Citizens, Second Edition OPEN ACCESS PDF from Rowman

Total Page:16

File Type:pdf, Size:1020Kb

Being Digital Citizens, Second Edition OPEN ACCESS PDF from Rowman Being Digital Citizens, Second Edition OPEN ACCESS PDF from Rowman & Littlefield Being Digital Citizens, Second Edition OPEN ACCESS PDF from Rowman & Littlefield Being Digital Citizens, Second Edition OPEN ACCESS PDF from Rowman & Littlefield Being Digital Citizens Being Digital Citizens, Second Edition OPEN ACCESS PDF from Rowman & Littlefield Being Digital Citizens, Second Edition OPEN ACCESS PDF from Rowman & Littlefield Being Digital Citizens Second Edition Engin Isin and Evelyn Ruppert London • New York Being Digital Citizens, Second Edition OPEN ACCESS PDF from Rowman & Littlefield Published by Rowman & Littlefield International, Ltd. 6 Tinworth Street, London SE11 5AL, United Kingdom www.rowmaninternational.com Rowman & Littlefield International, Ltd. is an affiliate of Rowman & Littlefield 4501 Forbes Boulevard, Suite 200, Lanham, Maryland 20706, USA With additional offices in Boulder, New York, Toronto (Canada), and London (UK) www.rowman.com Copyright © 2020 by Engin Isin and Evelyn Ruppert All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means, including information storage and retrieval systems, without written permission from the publisher, except by a reviewer who may quote passages in a review. British Library Cataloguing in Publication Information A catalogue record for this book is available from the British Library ISBN: HB 978-1-78661-447-6 ISBN: PB 978-1-78661-448-3 Library of Congress Cataloging-in-Publication Data Names: Isin, Engin F. (Engin Fahri), 1959- | Ruppert, Evelyn Sharon, 1959- author. Title: Being digital citizens / Engin Isin and Evelyn Ruppert. Description: Second edition. | London ; New York : Rowman & Littlefield, [2020] | Includes biblio- graphical references and index. | Summary: "This book examines how citizens encounter and perform new sorts of rights, duties, opportunities and challenges through the Internet. By disrupt- ing prevailing understandings of citizenship and cyberspace, the authors highlight the dynamic relationship between these two concepts"-- Provided by publisher. Identifiers: LCCN 2019057075 (print) | LCCN 2019057076 (ebook) | ISBN 9781786614476 (cloth) | ISBN 9781786614483 (paperback) | ISBN 9781786614490 (epub) Subjects: LCSH: Internet in public administration. | Internet--Political aspects. Classification: LCC JF1525.A8 I68 2020 (print) | LCC JF1525.A8 (ebook) | DDC 323.6/502854678-- dc23 LC record available at https://lccn.loc.gov/2019057075 LC ebook record available at https://lccn.loc.gov/2019057076 TM The paper used in this publication meets the minimum requirements of American National Standard for Information Sciences Permanence of Paper for Printed Library Materials, ANSI/NISO Z39.48-1992. Being Digital Citizens, Second Edition OPEN ACCESS PDF from Rowman & Littlefield Contents Acknowledgements vii Preface to the Second Edition ix 1 Doing Things with Words and Saying Words with Things 1 2 Citizens and Cyberspace 17 3 Speech Acts and Digital Acts 45 4 Callings: Participating, Connecting, Sharing 67 5 Closings: Filtering, Tracking, Normalizing 95 6 Openings: Witnessing, Hacking, Commoning 123 7 Making Digital Rights Claims 149 8 Digital Citizens Yet to Come 173 Bibliography 195 Index 217 About the Authors 229 v Being Digital Citizens, Second Edition OPEN ACCESS PDF from Rowman & Littlefield Being Digital Citizens, Second Edition OPEN ACCESS PDF from Rowman & Littlefield Acknowledgements We are thankful for the insightful comments of four anonymous review- ers. We are grateful for the assistance of Margaret Cheesman who re- searched the literature citing the first edition of this book. We thank Rowman & Littlefield International for the invitation and support to pub- lish this revised and expanded second edition. We gratefully acknowl- edge the assistance and guidance of our editor Dhara Snowden, who made preparing the second edition a pleasure. We also acknowledge that the research leading to this book was supported by funding from the European Research Council (ERC) Consolidator Grant 615588 (Ruppert) including funds for Open Access publishing. vii Being Digital Citizens, Second Edition OPEN ACCESS PDF from Rowman & Littlefield Being Digital Citizens, Second Edition OPEN ACCESS PDF from Rowman & Littlefield Preface to the Second Edition Two documentaries on political struggles over digital life aptly bookend the period between the two editions of this book. Laura Poitras’s 2014 documentary, Citizenfour, provided an account of Edward Snowden’s re- lease of classified information from the National Security Agency (NSA) about how states and corporations are involved in mass surveillance and are spying on their own and other countries’ citizens. Karim Amer and Jehane Noujaim’s 2019 documentary, The Great Hack, covered Christo- pher Wylie’s disclosure that the personal information of up to 87 million users was harvested without their permission by a Cambridge academic and used by Cambridge Analytica to allegedly interfere in the 2016 US election and 2016 UK referendum. Although the former brought attention to the surveillance and data accumulation practices of states and corpora- tions, the latter highlighted how such accumulation is pervasive and in- cludes not only platform owners but also academics and other third par- ties. That two whistle-blowers were key to both disclosures is significant for stressing a central concern of this book: If the Internet, and how we are acting through it, decisively traverses the borders constituted by some two hundred states, who then are the subjects of digital politics? Beyond the spectacular acts of activists, how do subjects perform every- day acts through the Internet to make claims about its workings that traverse the orders and borders of modern law and politics? How are we to understand ourselves as collective political subjects with rights to speech, access, and privacy, a political subjectivity that expresses being with others that involves and provokes the cultivation of openness against closings of the Internet, when our rights are grounded in and emanate from being citizens of states? We explicitly call for and signify collective political subjects as ‘digital citizens’ who make rights claims by acting through the Internet or, as stated in the closing chapter of the first edition, digital citizens yet to come. The significance of this reflects the absence of theorizing the politi- cal subject of the Internet at the time of the first edition. Research was only then developing on the acts of people demanding digital and data rights and resisting and subverting the dispossessions and appropria- tions of states and corporations. That research documented, for example, how people use the Internet in creative ways to organize movements, uprisings, protests, and demonstrations; disrupt hegemonic platforms and develop open alternatives; and challenge authoritative accounts and ix Being Digital Citizens, Second Edition OPEN ACCESS PDF from Rowman & Littlefield x Preface to the Second Edition knowledge across borders and orders. But how these transversal acts signified the emergence of a new political subjectivity remained undevel- oped and references to the political subject as a citizen were ambiguous. That has now changed significantly. Although the figure of the citizen remains an ambiguous and underspecified subject of rights, much re- search now suggests the outlines of its emergence. Several books and edited collections, along with articles in major journals, address the polit- ical subject of the Internet through research that now more fully spans the Global North and South. Most significant is a growing body of research on how people act through the Internet to make claims for data and digital rights and justice. We are convinced that the framing in the first edition has proven effective and relevant for interpreting the empirical studies that this research documents. But in addition to providing a way to conceive of political subjectivity, a second aspect of the framing that remains relevant is the specification of cyberspace as a transversal space that people bring into being by acting through the Internet. However, although many studies seek to understand the space of digital politics, cyberspace as a transversal space that makes possible citizenship as a different kind of political subjectivity remains underspecified. If men- tioned, references continue to be made to ‘online’ space and digital rights as separate, if not independent from, physical ‘offline’ space and non-digital rights. Thus, a central aim of this book remains to provide a theoretical framing of both the figure of the citizen and the figure of cyberspace to think across the growing research on digital politics for resignifying digital citizens as political subjects of cyberspace that is dif- ferent from, but related to, citizens as political subjects of the state. We now outline the major changes made to chapters 1 to 7 of the first edition and provide a longer summary of chapter 8, which is new. We identify in chapter 1 actors such as Cambridge Analytica and Mark Zuckerberg who, for many people, do not require introduction and reflect the ubiquity of connected digital lives. These are spectacular ex- amples of actors who engage in what we refer to as acts of closing the Internet. Yet, we also draw attention to ordinary acts that have provided openings, gained prominence, and have become emblematic of digital politics such as how citizen subjects have resignified hashtags to both name
Recommended publications
  • UNITED STATES DISTRICT COURT NORTHERN DISTRICT of GEORGIA ATLANTA DIVISION in Re
    Case 1:17-md-02800-TWT Document 739 Filed 07/22/19 Page 1 of 7 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF GEORGIA ATLANTA DIVISION MDL Docket No. 2800 In re: Equifax Inc. Customer No. 1:17-md-2800-TWT Data Security Breach Litigation CONSUMER ACTIONS Chief Judge Thomas W. Thrash, Jr. PLAINTIFFS’ MOTION TO DIRECT NOTICE OF PROPOSED SETTLEMENT TO THE CLASS Plaintiffs move for entry of an order directing notice of the proposed class action settlement the parties to this action have reached and scheduling a hearing to approve final approval of the settlement. Plaintiffs are simultaneously filing a supporting memorandum of law and its accompanying exhibits, which include the Settlement Agreement. For the reasons set forth in that memorandum, Plaintiffs respectfully request grant the Court enter the proposed order that is attached as an exhibit to this motion. The proposed order has been approved by both Plaintiffs and Defendants. For ease of reference, the capitalized terms in this motion and the accompanying memorandum have the meaning set forth in the Settlement Agreement. Case 1:17-md-02800-TWT Document 739 Filed 07/22/19 Page 2 of 7 Respectfully submitted this 22nd day of July, 2019. /s/ Kenneth S. Canfield Kenneth S. Canfield Ga Bar No. 107744 DOFFERMYRE SHIELDS CANFIELD & KNOWLES, LLC 1355 Peachtree Street, N.E. Suite 1725 Atlanta, Georgia 30309 Tel. 404.881.8900 [email protected] /s/ Amy E. Keller Amy E. Keller DICELLO LEVITT GUTZLER LLC Ten North Dearborn Street Eleventh Floor Chicago, Illinois 60602 Tel. 312.214.7900 [email protected] /s/ Norman E.
    [Show full text]
  • Human Rights Protocol Considerations Research Group S
    Human Rights Protocol Considerations Research Group S. Abraham Internet-Draft CIS India Intended status: Informational MP. Canales Expires: January 16, 2018 Derechos Digitales J. Hall CDT O. Khrustaleva American University N. ten Oever ARTICLE 19 C. Runnegar ISOC S. Sahib Cisco Systems July 15, 2017 Implementation Report for HTTP Status Code 451 (RFC 7725) draft-451-imp-report-00 Abstract This report describes implementation experience between various components working with the HTTP Status Code 451 [RFC7725], a risk assessment and recommendation for improvements. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on January 16, 2018. Copyright Notice Copyright (c) 2017 IETF Trust and the persons identified as the document authors. All rights reserved. Abraham, et al. Expires January 16, 2018 [Page 1] Internet-Draft 451ImpReport July 2017 This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document.
    [Show full text]
  • Milk Tea Alliance 2.0: Towards Greater Political Leverage and Civic Awareness?
    ASIA CENTRE – Asia Study Centre 1 Commentary- N°2021-15 April 13, 2021 Milk Tea Alliance 2.0: Towards greater political leverage and civic awareness? By Judy TSENG Ting-Hsuan (曾婷瑄) Commentary N° 2021-15 – Milk Tea https://centreasia.eu/ Alliance 2.0: Towards greater political leverage and civil awareness? ASIA CENTRE – Asia Study Centre 2 Foreword Founded in 2005, Asia Centre is an independent research institute fostering debates and publications on international, strategic and economic relations, as well as current political and social transformations in the Asia Pacific region. Asia Centre’s fellows navigate both the academic world and the public and private decision-making centres, tackling significant regional issues and analyzing them in local and global perspectives. Asia Centre’s programmes are conceived for a large network of corporate partners and specialized research institutions from Europe, America and Asia. Joint operations led with those partners offer the opportunity to confront a wider range of ideas and issues. Focusing on the study of original sources, the works and conclusions of our researchers are widely published via Asia Centre’s own media and in the international press, journals and documentation. ASIA CENTRE [email protected] +33 1 7543 6320 https://centreasia.eu/ Commentary N° 2021-15 – Milk Tea https://centreasia.eu/ Alliance 2.0: Towards greater political leverage and civil awareness? ASIA CENTRE – Asia Study Centre 3 To quote this publication: Judy TSENG Ting-Hsuan, « Milk Tea Alliance 2.0: Towards greater political leverage and civil awareness », Article 2021-15, Asia Centre, April 13, 2021. About the author Judy TSENG Ting-Hsuan(曾婷瑄) , PhD, journalist.
    [Show full text]
  • Open Innovation in the Proprietary World
    Round Table Open Innovation in the Proprietary World 19 March 2015 DiploFoundation, WMO Building, 7bis, Avenue de la Paix, Geneva, Switzerland Agenda 8:45 – 9:15 Registration 9:15– 9:30 Welcome & Introductions Joe Cannataci (Project Coordinator; University of Groningen), Oleksandr Pastukhov (Head of IPR project work package; University of Malta), Jovan Kurbalija (DiploFoundation) 9:30 – 10:30 Key-note address on Open Innovation v. ‘property logic’ Darren Todd (Author, “Pirate Nation”; Editor, Evolved Publishing) 10:30 – 10:45 Coffee break 10:45 – 11:30 Session 1: IP policies today – failing to understand innovation? Moderator: Bogdan Manolea (ApTI) Principal discussants: Rihards Gulbis (Ministry of Culture, Latvia), Jim Killock (Open Rights Group), Philippe Laurent (Marx, Van Ranst, Vermeersch & Partners) Special intervention on F/OSS in developing countries by Nnenna Nwakanma (World Wide Web Foundation) 11:30 – 12:45 Session 2: Business models for the Free/Open Source movement Moderator: Pedro Gomez (Hoplite Software) Principal discussants: Mario Pena (Safe Creative), Georg Greve (Free Software Foundation Europe), Giuseppe Mazziotti (Trinity College Dublin) 12:45 – 13:30 Lunch 13:30 – 14:30 Second key-note address on Creative Commons and Open Access initiatives George Greve (Free Software Foundation Europe) 14:30 – 15:15 Session 3: Open Data, Open Access and Open Education resources – key to Open Innovation Moderator: Oleksandr Pastukhov (Head of IPR project work package; University of Malta) Principal discussants: Claire Gallon (Libertic),
    [Show full text]
  • Best VPN Services in 2017 (Speed, Cost & Usability Reviews)
    10/8/2017 Best VPN Services in 2017 (Speed, Cost & Usability Reviews) Best VPN Services VPN Reviews & In-Depth Comparisons Brad Smith Sep 18, 2017 With the help of John & Andrey (https://thebestvpn.com/contact-us/), we’ve put together a list of best VPNs. We compared their download/upload speed, support, usability, cost, servers, countries and features. We also analyzed their TOS to see if they keep logs or not and whether they allow P2P and work with Netflix. here’s a link to the spreadsheet (https://docs.google.com/spreadsheets/d/11IZdVCBjVvbdaKx2HKz2hKB4F Z_l8nRJXXubX4FaQj4/) You want to start using a VPN, but don’t know which software/service to use? In this page, we’ve reviewed 30+ most popular VPN services (on going process). In order to find out which are best VPNs, we spent some time on research and speed testing: 1. Installed 30+ VPN software on our personal devices, such as Windows, Mac, Android and iOS and compared their usability. 2. Performed Download/Upload speed tests on speedtest.net to see which had best performing servers. 3. Double checked if they work with Netflix and allow P2P. 4. Read their TOS to verify if they keep logs or not. 5. Compared security (encryption and protocols). That means we’ve dug through a large number of privacy policies (on logging), checked their features, speed, customer support and usability. If you know a good VPN provider that is not listed here, please contact us and we’ll test it out as soon as possible. 5 Best VPNs for Online Privacy and Security Here are the top 5 VPN services of 2017 after our research, analysis, monitoring, testing, and verifying.
    [Show full text]
  • A PRACTICAL METHOD of IDENTIFYING CYBERATTACKS February 2018 INDEX
    In Collaboration With A PRACTICAL METHOD OF IDENTIFYING CYBERATTACKS February 2018 INDEX TOPICS EXECUTIVE SUMMARY 4 OVERVIEW 5 THE RESPONSES TO A GROWING THREAT 7 DIFFERENT TYPES OF PERPETRATORS 10 THE SCOURGE OF CYBERCRIME 11 THE EVOLUTION OF CYBERWARFARE 12 CYBERACTIVISM: ACTIVE AS EVER 13 THE ATTRIBUTION PROBLEM 14 TRACKING THE ORIGINS OF CYBERATTACKS 17 CONCLUSION 20 APPENDIX: TIMELINE OF CYBERSECURITY 21 INCIDENTS 2 A Practical Method of Identifying Cyberattacks EXECUTIVE OVERVIEW SUMMARY The frequency and scope of cyberattacks Cyberattacks carried out by a range of entities are continue to grow, and yet despite the seriousness a growing threat to the security of governments of the problem, it remains extremely difficult to and their citizens. There are three main sources differentiate between the various sources of an of attacks; activists, criminals and governments, attack. This paper aims to shed light on the main and - based on the evidence - it is sometimes types of cyberattacks and provides examples hard to differentiate them. Indeed, they may of each. In particular, a high level framework sometimes work together when their interests for investigation is presented, aimed at helping are aligned. The increasing frequency and severity analysts in gaining a better understanding of the of the attacks makes it more important than ever origins of threats, the motive of the attacker, the to understand the source. Knowing who planned technical origin of the attack, the information an attack might make it easier to capture the contained in the coding of the malware and culprits or frame an appropriate response. the attacker’s modus operandi.
    [Show full text]
  • Social Responses to the AIDS Epidemic in Bushbuckridge, South Africa by Jonathan James
    Shared Secrets – Concealed Sufferings: Social Responses to the AIDS Epidemic in Bushbuckridge, South Africa by Jonathan James Stadler A thesis submitted in partial fulfilment of the requirements for the degree PhD In the Department of Anthropology at the UNIVERSITY OF PRETORIA FACULTY OF HUMANITIES SUPERVISOR: Fraser McNeil August 2011 © University of Pretoria Statement by Candidate I declare that the thesis, which I hereby submit for the degree D.Phil. (Anthropology) at the University of Pretoria, is my own work and has not previously been submitted by me for a degree at another university. Where secondary material is used, this has been carefully acknowledged and referenced in accordance with University requirements. I am aware of University policy and implications regarding plagiarism. Signature: _____________________________ Date: 25 August 2011 Dedication To my wife Conny for inspiration, insight, and encouragement, and our daughter Carla, for distraction and joy Abstract From the early 1990s, rates of HIV infection increased dramatically in South Africa and by the early 2000s, AIDS emerged as the main cause of death for adult South Africans. During the first half of the 2000s, the South African government’s response to this crisis was inadequate, marked by denial and delays in implementing prevention and treatment, resulting in thousands of preventable deaths. Yet, apart from the challenges posed by the predominantly urban-based Treatment Action Campaign (TAC), the absence of a social response to this crisis is notable, especially in rural settings. This scenario forms the broad backdrop to this ethnographic study that draws on participant observation and interviews undertaken over a three-year period (2002-2005) in KwaBomba village previously in the Gazankulu Homeland, now located in the Bushbuckridge municipality of the South African lowveld.
    [Show full text]
  • Edition No. 3 March 2019
    GDPR Today Edition No. 3 March 2019 European Commission urged to investigate Romanian GDPR implementation GDPR loopholes facilitate data exploitation by political parties Uber drivers demand their data After Brexit, the EU must decide if UK data protection is adequate 2 GDPR in Numbers 6 European Commission urged to investigate Romanian GDPR implementation 8 Spain: DPA limits the use of data in political campaigning 10 Netherlands: DPA rules websites must allow people to refuse tracking cookies 12 GDPR loopholes facilitate data exploitation by political parties 14 Privacy policies for Internet of Things devices must comply with GDPR 15 Uber drivers demand their data New evidence in AdTech complaint 15 EDPB: e-Privacy and GDPR work together 16 to protect people’s data 18 German competition regulator demands changes to Facebook’s use of personal data 20 After Brexit, the EU must decide if UK data protection is adequate 22 EDPS 2018 Annual Report highlights the power and limitation of data protection 24 GDPR Tools 25 EU National Data Protection Authority Contact Details Editorial Welcome to GDPR Today – your online hub for staying Not all is positive progress. It is disappointing that the tuned to the (real) life of EU data protection law. As you European Commission has still not yet taken action to know, every two months we publish statistics showing how ensure that Romania properly implements the GDPR. the GDPR is being applied across Europe. We also share There are also several countries which have yet to relevant news, from legal guidelines and decisions to publish any GDPR data.
    [Show full text]
  • Piracy Versus Privacy: an Analysis of Values Encoded in the Piratebrowser
    International Journal of Communication 9(2015), 818–838 1932–8036/20150005 Piracy Versus Privacy: An Analysis of Values Encoded in the PirateBrowser BALÁZS BODÓ University of Amsterdam, Institute for Information Law The Netherlands The PirateBrowser is a Web browser that uses Tor privacy-enhancing technology to circumvent nationally implemented Internet filters blocking access to The Pirate Bay. This article analyzes the possible consequences of a mass influx of copyright pirates into the privacy domain. The article addresses the effects of the uptake of strong privacy technologies by pirates on copyright enforcement and on free speech and privacy technology domains. Also discussed are the norms and values reflected in the specific design choices taken by the developers of the PirateBrowser. Keywords: piracy, privacy, Tor, privacy-enhancing technologies, policy Introduction Tor (The Onion Router), “endorsed by Egyptian activists, WikiLeaks, NSA, GCHQ, Chelsea Manning, Snowden” (Dingledine & Appelbaum, 2013), is a volunteer network of computers that relays Web traffic through itself to provide anonymous, unobserved, and uncensored access to the Internet. It has about 4,000 relays and about 1,000 exit nodes. Tor users connect to the network, and their Web traffic is channeled through the internal relays to reach its final destination through one of the exit nodes. This arrangement makes the identification and surveillance of Tor users difficult. Anonymity is promised by the difficulty of tracing the Web traffic that appears on the exit node back to the individual who initiated the traffic, as long as there is a sufficient number of internal hops in between. Protection from surveillance is granted by the fact that each link in the communication chain is encrypted.
    [Show full text]
  • The Future of the Internet (For PDF)
    TODAYS PREDICTIONS FOR TOMORROWS INTERNET JOSH PYORRE (SECURITY RESEARCHER) ▸ Cisco Umbrella ▸ NASA ▸ Mandiant THE WORLD IS A MAGICAL PLACE THE INTERNET IN THE 70’S THE INTERNET IN THE 70’S SMALL MAPPING OF ASN’S TO THEIR IPS TO GET A SENSE OF SCALE INTERNET SIZES TODAY INTERNET SIZES TODAY POODLE OCTOBER 14, 2014 BUG IN SSL VERSION 3.0 MITM 256 SSL 3.0 REQUESTS < 1 BYTE ENCRYPTED DATA HEARTBLEED APRIL 7, 2014 BUG IN OPENSSL BUFFER OVER-READ CLIENTS AND SERVERS POST DATA IN USER REQUESTS SESSION COOKIES/PASSWORDS PRIVATE KEYS YAHOO, IMGUR, STACK OVERFLOW, DUCKDUCKGO, PINTREST, REDDIT, AKAMAI, GITHUB, AMAZON WEB SERVICES, INTERNET ARCHIVE, SOUNDCLOUD, TUMBLR, STRIPE, ARS TECHNICA, SPARKFUN, PREZI, SOURCEFORGE, BITBUCKET, FREENODE, WIKIPEDIA, WUNDERLIST, LASTPASS AND A LOT MORE REVERSE HEARTBLEED AFFECTS MILLIONS OF APPS CAN READ CLIENT MEMORY HP SERVER APPS, FILEMAKER, LIBREOFFICE, LOGMEIN, MCAFEE, MSSQL, ORACLE PRODUCTS, PRIMAVERA, WINSCP, VMWARE PRODUCTS, DEBIAN, REDHAT, LINUX MINT, UBUNTU, CENTOS, ORACLE LINUX, AMAZON LINUX, ANDROID, AIRPORT BASE STATIONS, CISCO IOS, JUNIPER FIRMWARE, IPCOP, PFSENSE, DD-WRT ROUTER FIRMWARE, WESTERN DIGITAL DRIVE FIRMWARE… AND A LOT MORE SHELLSHOCK SEPT 14, 2014 BASH IS USED IN INTERNET-FACING SERVICES CGI WEB SERVERS OPENSSH SERVERS DHCP CLIENTS BASH IS USED IN INTERNET-FACING SERVICES PROCESSES REQUESTS ATTACKER CAN SEND EXTRA DATA SECURE HASHING ALGORITHM 3B260F397C573ED923919A968A59AC6B2E13B52D = I HOPE THIS PRESENTATION ISN'T BORING SHA-1 ▸ Dates back to 1995 ▸ Known to be vulnerable to theoretical
    [Show full text]
  • Effective Crisis Response Communication and Data Breaches: a Comparative Analysis of Corporate Reputational Crises
    Michael Schonheit s2135485 Master’s Thesis 02/10/2020 Effective Crisis Response Communication and Data Breaches: a comparative analysis of corporate reputational crises Master’s Thesis Crisis and Security Management Table of Contents 1 1 Introduction 2 Literature Review 2.1 Placing data breaches within the cybersecurity discourse 6 2.2 Paradigm Shift: From Prevention to Mitigation 10 2.3 Data breach by Hacking: A Taxonomy of Risk Categories 12 2.4 Economic and reputational Impact on organizations 15 2.5 Theoretical and empirical communication models for data breaches 16 3 Theoretical Framework 3.1 Organizational Crises: An introduction to framing and perceived responsibility 21 3.2 Attribution Theory and SCCT 23 3.3 Crisis Types and Communication Response Strategies 24 3.4 Intensifying Factors: Crisis Severity, Crisis History, Relationship Performance 25 3.5 Communication Response Strategies 27 3.6 SCCT Recommendations and Data Breaches 30 3.7 SCCT and PR Data Breaches by Hacking 32 4 Methodology 4.1 Operationalizing SCCT in the Context of Data Breaches 35 4.2 Stock Analysis and News Tracking: Assessing cases on varying degrees of reputation recovery 36 4.3 Refining the Case Selection Framework and the Analysis Process 40 4.4 Intra-periodic Analysis and Inter-periodic Analysis 43 5 Analysis 5.1 Narrowing the Scope: Building the Comparative Case Study 44 5.2 Statistical Recovery: Stock and Revenue Analysis 49 5.3 News Media Tracking and Reputation Index Scores 58 6 Discussion 6.1 Intra-periodic Analysis: Assessing Organizational Responses 72 6.2 Inter-periodic analysis: Verifying the Initial Propositions 74 7 Conclusions 77 8 Appendix 79 9 Bibliography 79 1.
    [Show full text]
  • THE ARMENIAN Ctator Volume LXXXVII, NO
    MAY 27, 2017 Mirror-SpeTHE ARMENIAN ctator Volume LXXXVII, NO. 45, Issue 4489 $ 2.00 NEWS The First English Language Armenian Weekly in the United States Since 1932 INBRIEF Flights Launched DC Police Arrest Between Yerevan and Turkish Guards Tel Aviv YEREVAN (Public Radio of Armenia) — The For Attacking Armenia Aircompany carried the first passengers from Yerevan to Tel Aviv this week. Demonstrators The maiden flight was preceded by a presenta- tion at Zvartnots Airport. Attending the event were Sergey Avetisyan, chief Turkey Chides US Envoy of the General Department of Civil Aviation of Over Handling of Brawl at Armenia, Andranik Shkhyan, deputy general man- Washington Protest ager of Armenia International Airports and Robert Oganesyan, CEO of Armenia Aircompany, directors ISTANBUL (New York Times and of tourism agencies and others. Washington Post) — The Turkish Foreign Avetisyan emphasized the importance of Ministry summoned the American ambas- Yerevan-Tel Aviv flights and wished the Air sador in Ankara on Monday, May 22, to Company safe and effective flights. The Yerevan-Tel Aviv flights will run twice a week complain about the detention of two President Trump and First Lady Melania visited the Church of the Holy Sepulchre. Turkish security officers outside the on Thursdays and Sundays. Turkish Embassy in Washington the prior week, a Turkish official said. Trump Visits Church of the Holy Sepulchre in L.A. Chamber Cancels The detentions occurred about two Jerusalem, Meets Armenian Patriarch hours after Turkish government body- Turkey Business Forum guards were filmed assaulting several pro- JERUSALEM (Armenpress) — US President Donald Trump visited the Church After Protest Beating (RUDAW PHOTO) of the Holy Sepulchre in Jerusalem on Monday, May 15.
    [Show full text]