HACKERS EN POLITIQUE Politisation Du Cyberespace Et Hacktivisme

Total Page:16

File Type:pdf, Size:1020Kb

HACKERS EN POLITIQUE Politisation Du Cyberespace Et Hacktivisme AIX-MARSEILLE UNIVERSITÉ INSTITUT D’ÉTUDES POLITIQUES D’AIX-EN-PROVENCE MÉMOIRE pour l’obtention du Diplôme HACKERS EN POLITIQUE Politisation du cyberespace et hacktivisme Par Madame Sophie ANDRIOL Mémoire réalisé sous la direction de Madame Stéphanie DECHEZELLES Année universitaire 2013-2014 L’IEP n’entend donner aucune approbation ou improbation aux opinions émises dans ce mémoire. Ces opinions doivent être considérées comme propres à leur auteur. MOTS CLEFS Hackers – Internet – Politique - Politisation Communauté – Mouvement social – Mobilisations Hacking – Hacktivisme – Activisme RÉSUMÉ Pirates des temps modernes ou corsaires du cyberespace ? Au-delà de l’anonymat cher aux hackers, ce travail de recherche sociologique a pour ambition de décrypter les modalités de leur entrée en politique. L’analyse des trajectoires individuelles des hackers et du spectre de leurs engagements permet de prendre la mesure de la politisation du mouvement et d’explorer ses modalités, du hacktivisme anonyme venant en aide aux populations des révolutions arabes, au militantisme partisan en Europe. Ainsi, au travers de l’étude des structures et des contextes qui portent le mouvement ou le condamnent, nous éclairons ici les dynamiques d’un processus de politisation qui ont fait d’un club de mordus de l’informatique d’une prestigieuse université américaine le mouvement protéiforme et engagé que l’on connaît aujourd'hui, sur la Toile comme dans les Parlements. REMERCIEMENTS J’adresse toute ma gratitude aux hackers et hackeuses qui ont m’ont généreusement accordé leur temps et leur confiance, et ont été une grande source d’inspiration. La réalisation de ce mémoire a dépendu de leur participation, et leur est donc dédiée. Toute ma reconnaissance à un comité de relecture aussi patient qu’efficace : Sylvie, Pauline, Marina, Papa, Maman. Mention spéciale enfin à mes amis, et spécialement à mes colocataires, qui m’ont patiemment supportée et soutenue tout au long de ce travail. SOMMAIRE INTRODUCTION Partie I – La naissance du hacktivisme et les déterminants du processus de politisation du mouvement hacker. A. La subversion au cœur de l’histoire du hacking. 1) L’éthique hacker et ses mythes fondateurs : naissance d’une culture. 2) De bidouilleurs en experts : utilisations et évolutions du mouvement. B. Des pranksters aux hacktivistes : redéfinition des représentations et basculement vers la politisation du hacking. 1) Privatisation et répression dans le cyberespace. 2) Les hackers entrent en résistance : débuts du hacktivisme. C. Influence rétroactive de l’éthique hacker avec les technologies développées. 1) Construction d’un outil à partir d’un imaginaire collectif. 2) Le hacktivisme marque-t-il un renouveau des mobilisations collectives ? Partie II – Engagement individuel et entreprises collectives du hacktivisme. A. Les degrés et processus d’engagement des hackers en politique : portraits, motivations et trajectoires personnelles. 1) Portrait sociologique du hacker. 2) Du hacker au hacktiviste : quels processus d’engagement ? B. Organisation des structures du hacktivisme et cadrage des mobilisations. 1) Maillage de la communauté dans l’espace physique. 2) Collectifs hacktivistes et formations politiques : figures de proue de la politisation du mouvement. C. Pratiques discursives et contextes politiques qui informent le hacktivisme. 1) Le hacktivisme impacté par des acteurs qui lui sont extérieurs et potentiellement antagonistes. 2) Lignes de tension au sein du mouvement en réaction aux prises de position des acteurs extérieurs. CONCLUSION INTRODUCTION A l’évocation du terme « hacker », l’écho est unanime : on parle des « pirates », des « Anonymous », de « vols de numéros de cartes bleues ». Et c'est en somme tout ce qu’on en verra si l’on se contente de regarder la surface de ce mouvement protéiforme : des informaticiens asociaux, ou de petits génies de l’Internet, qui passent leurs journées devant un ordinateur et s’amusent à infiltrer les réseaux de firmes multinationales ou les serveurs gouvernementaux, ou peut-être aussi cette image en vogue d’une armée de Chinois prêts à lancer des cyber attaques contre les Etats-Unis. C'est en tout cas ce que laissent croire les quelques reportages consacrés aux hackers diffusés aux heures de grande écoute. Aux hackers est associée tantôt une connotation péjorative, celle du cyber- terroriste tapi dans l’ombre, et qui menace de sa maligne virtuosité notre sécurité sur le Web, et tantôt l’image positive du héros du cyberespace1, qui fascine de par sa capacité hors normes à maîtriser les arcanes d’une science informatique que nous utilisons quotidiennement sans jamais l’avoir vraiment comprise. Et pourtant, appareillant de leur port d’attache suédois, les « pirates » sont passés à l’abordage du vaisseau amiral de l’Union Européenne, en installant dès 2009 deux émissaires au Parlement. D’ailleurs, en étant plus attentif, on remarque que des notions, telles que la neutralité du Net2, ou la libre circulation des données, commencent à émerger dans le débat public. On en a récemment entendu parler à l’occasion de l’accord entériné par le Parlement européen le 3 avril dernier3, mais avant cela autour de projets de lois dont on connaît davantage les acronymes que le contenu : PIPA, SOPA, ACTA… 1 Espace virtuel rassemblant la communauté des internautes et les ressources d’informations numériques accessibles à travers les réseaux d’ordinateurs (Larousse). 2 VION-DURY, Philippe. « Vainqueurs et losers : voilà à quoi ressemblerait un Internet sans neutralité ». Rue 89. 25 avril 2014 (Disponible à l’adresse : http://rue89.nouvelobs.com/2014/04/25/vainqueurs- loseurs-voila-a-quoi-ressemblerait-internet-sans-neutralite-251773) 3 FRADIN, Andréa. « La neutralité du Net adoptée au Parlement européen : d’accord, mais ça veut dire quoi ? ». Slate. 3 avril 2014 (Disponible à l’adresse : http://www.slate.fr/economie/85509/neutralite-du- net-adoptee-parlement-europeen-explication). 1 On a également pu être impressionné par les Anonymous déchaînant leur courroux numérique contre quiconque prétendait nuire à l’organisation Wikileaks (en l’occurrence les géants Paypal ou Visa), et les masques de Guy Fawkes envahir les rues. Au milieu de ce bouillonnement de revendications, difficile donc de faire la part de ce qui relève exactement du hacking, ou même de comprendre ce que « hacktivisme » signifie. On remarque cependant d’emblée la spécificité que revêtent ces mobilisations, qui sont canalisées et diffusées virtuellement, et qui ont pour objet l’Internet. Les hackers, pionniers de l’Internet et des nouvelles technologies, viennent aujourd'hui au secours des principes fondateurs de l’outil qu’ils ont créé, en s’appuyant sur ce vecteur pour organiser leurs mobilisations. On observe également la diversité des postures que semblent aujourd'hui contenir le « hacktivisme », notamment au travers des dénominations de black, white, grey, ou encore rainbow hats4. Face à ces nombreux questionnements autour du phénomène hacker, il semble nécessaire d’explorer ce système, et de tenter de comprendre en interrogeant les dynamiques du mouvement et les acteurs eux-mêmes, ce que sont précisément leurs revendications. § Internet dans le champ du politique : contexte et enjeux du sujet. Le mouvement hacker et le hacktivisme se développent principalement entre l’Europe et les Etats-Unis, ces puissances occidentales se situant du « bon côté » de la fracture numérique, et qui ont bénéficié pleinement des progrès de l’informatique. En effet aujourd'hui, le taux de pénétration d’Internet en Amérique du Nord est de 81%, et de 78% en Europe de l’Ouest, contre seulement 18% en Afrique ou 12% en Asie du Sud5. Le caractère massif de cet usage d’Internet, et le fait que notre vie s’organise toujours 4 Il est d’usage de nommer les hackers « chapeaux » noirs, blancs, gris ou multicolores, selon les intentions qu’on leur prête. Ainsi, un hacker considéré comme malveillant sera classé dans la catégorie « black hat ». 5 ROPARS, Fabian. « Tous les chiffres 2014 sur l’utilisation d’Internet, du mobile et des médias sociaux dans le monde », Blog du Modérateur, 8 janvier 2014 (Disponible à l’adresse : http://www.blogdumoderateur.com/chiffres-2014-mobile-internet-medias-sociaux/) 2 plus via les réseaux, indiquent en effet que l’Internet est devenu un territoire de luttes à part entière. Dans ce contexte, où la notion de mondialisation est portée à son paroxysme en abolissant presque totalement les frontières au sein du cyberespace, les différents enjeux de maîtrise des données personnelles, de vie privée ou encore de surveillance organisée par les pouvoirs publics se font jour. Ces questions ont été très médiatisées au travers des différents projets de lois qui ont récemment provoqué la levée de boucliers du mouvement hacktiviste. On a pu voir en 2011 aux Etats-Unis, sous la pression des industriels du disque et du cinéma, les propositions de loi Stop Online Piracy Act (SOPA) et Protect IP Act (PIPA)6 qui avaient pour cibles les sites de partage de contenu multimédia, tels que The Pirate Bay. Face à ces mobilisations d’une ampleur inédite sur la Toile comme dans les rues, et au lobbying hacktiviste, les soutiens à ces projets de loi se sont finalement amenuisés jusqu’à ce qu’ils soient retirés. Plus récemment, c'est l’Accord commercial anti-contrefaçon (ACTA)7 qui a fait parler de lui en Europe et aux Etats-Unis, et à l’occasion duquel les hacktivistes ont à nouveau signé une victoire retentissante. Il y a enfin eu l’affaire Snowden, du nom de cet informaticien américain qui a révélé au grand jour les écoutes et collectes de données opérées par les agences du Renseignement américain (la National Security Agency ou NSA) grâce aux programmes Prism et XKeyscore. La nouvelle cartographie des pouvoirs sur le cyberespace engage donc de nouveaux acteurs et de nouvelles communautés, dont l’unité de base est constituée d’internautes, autrement dit de citoyens du monde entier qui accèdent au Réseau à tout moment et y consultent, y reçoivent ou y échangent des informations.
Recommended publications
  • Romanian Political Science Review Vol. XXI, No. 1 2021
    Romanian Political Science Review vol. XXI, no. 1 2021 The end of the Cold War, and the extinction of communism both as an ideology and a practice of government, not only have made possible an unparalleled experiment in building a democratic order in Central and Eastern Europe, but have opened up a most extraordinary intellectual opportunity: to understand, compare and eventually appraise what had previously been neither understandable nor comparable. Studia Politica. Romanian Political Science Review was established in the realization that the problems and concerns of both new and old democracies are beginning to converge. The journal fosters the work of the first generations of Romanian political scientists permeated by a sense of critical engagement with European and American intellectual and political traditions that inspired and explained the modern notions of democracy, pluralism, political liberty, individual freedom, and civil rights. Believing that ideas do matter, the Editors share a common commitment as intellectuals and scholars to try to shed light on the major political problems facing Romania, a country that has recently undergone unprecedented political and social changes. They think of Studia Politica. Romanian Political Science Review as a challenge and a mandate to be involved in scholarly issues of fundamental importance, related not only to the democratization of Romanian polity and politics, to the “great transformation” that is taking place in Central and Eastern Europe, but also to the make-over of the assumptions and prospects of their discipline. They hope to be joined in by those scholars in other countries who feel that the demise of communism calls for a new political science able to reassess the very foundations of democratic ideals and procedures.
    [Show full text]
  • European Union Launches Full Scale War Against Internet Privacy with #Chatcontrol (Eprivacy Derogation)
    European Union launches full scale war against internet privacy with #ChatControl (ePrivacy Derogation) On July 6, 2021, the European Union voted on the new “ChatControl” proposal. With a shocking number of 537 Members of the European Parliament voting in favor, 133 voting against and 20 abstentions, it was approved. The proposal was put forward under the banner of “emergency measures” and it allows internet companies to scan users’ private messages for material containing child sex abuse. This controversial decision is supposed to fix problems with the European Electronics Communications Code, which came into force last December. The so called “e-Privacy Interim Regulation” (2020/0259(COD)) requires online messenger and email service providers to automatically scan private message content in real time for suspicious text and image content using error-prone artificial intelligence. All cases identified by AI would be automatically disclosed to investigative authorities in the EU, without the individuals concerned knowing about it. This is intended to counter the spread of child pornography on the internet, at least that is the story behind it. But the EU’s plans for ChatControl have beenconfirmed to violate fundamental rights by a former judge of the European Court of Justice. The delegation of the European Pirate Party inserted in the Greens / EFA group has strongly condemned what it considers automated mass surveillance, which as they say means the end of privacy in digital correspondence. German Pirate Party Member of the European Parliament Patrick Breyer plans to take legal action against the regulation and is looking for victims of abuse who would file such a complainant.
    [Show full text]
  • The Swedish General Election 2014 and the Representation of Women
    Research and Information Service Research Paper 1 October 2014 Michael Potter The Swedish General Election 2014 and the Representation of Women NIAR 496-14 This paper reviews the Swedish general election of September 2014 from the perspective of the representation of women in politics. Paper 93/14 01 October 2014 Research and Information Service briefings are compiled for the benefit of MLAs and their support staff. Authors are available to discuss the contents of these papers with Members and their staff but cannot advise members of the general public. We do, however, welcome written evidence that relates to our papers and this should be sent to the Research and Information Service, Northern Ireland Assembly, Room 139, Parliament Buildings, Belfast BT4 3XX or e-mailed to [email protected] NIAR 496-014 Research Paper Key Points This paper seeks to explain the relatively high proportion of female political representatives in Sweden (45% in national and 43% in local legislatures) through analysis of the general election to the Swedish parliament (Riksdag) on 14 September 2014. Some contributory factors to consider are as follows: Context – Sweden has a range of provisions to facilitate women’s participation in wider society and to promote gender equality, for example: o Equality mainstreaming in government policy, including in budgets o Relatively generous parental leave, part of which must be taken by the second parent o Public childcare provision o Legislation considered conducive to the protection and autonomy of women o Statutory
    [Show full text]
  • Dear President of the European Parliament, Dear President of The
    Dear President of the European Parliament, Dear President of the European Council, Dear President of the European Commission and Dear President of the French Republic, We all have a responsibility for the shared future of Europe. In this time of crisis, it is high time to re-evaluate some of the rules we have upheld till now and focus on the most important aspects of the European project, which will help us move forward. An unprecedented health crisis is currently affecting millions of people in Europe and tragically taking thousands of lives. However, this is not the end. The economic crisis will crush the hopes and dreams of generations of Europeans. We sincerely hope that we will all do whatever is in our power not to leave anyone behind. We firmly believe that the European Parliament needs to take on its responsibility and share the burden since it is the highest European directly elected body. We need to be part of the solution, not part of the problem. If we want the people to have confidence and trust in the European project, we need to show them that we are also ready to make concessions. Therefore, we would like to ask you to do everything in your power to change the treaties in order to have just a single seat of the Parliament in Brussels. This call has again gained a large majority of support in the 2018 Parliament discharge resolution adopted on 13 May 2020 and shall now be taken into account and acted upon. The financial and environmental costs of moving the Parliament are, especially in these times of digitally connected Europe, extremely high and hard to justify.
    [Show full text]
  • World Trademark Review's 50 Market Shapers
    Feature By Trevor Little World Trademark Review’s 50 market shapers To mark World Trademark Review’s 50th edition, we on the basis of their daily work, but rather for their contributions identify 50 of the people, companies, cases and big- to particular debates (after all, if you are seeking potential legal picture issues that have defined the market on which partners, we offer the World Trademark Review 1000 – The World’s Leading Trademark Professionals for just that purpose). The list is we have been reporting for the last eight years presented alphabetically and is therefore ranked in no particular order; but it does provide a snapshot of the industry in which we all operate. Before we reveal the 50, it is important to acknowledge the single biggest influence on our evolution to date: you. Since World Trademark Review first hit subscribers’ desks in 2006, Without the loyalty of our subscribers, the World Trademark many aspects of the trademark world have changed beyond Review platform would not be where it is today, and you have measure. However, peruse that first issue and what instantly stands been integral to every step that we have taken along the way. out is how much remains familiar. The cover story focused on And I say ‘platform’ rather than ‘magazine’ quite deliberately. the fight between Anheuser-Busch and Bude jovický Budvar over Although the inaugural issue of World Trademark Review was the Budweiser brand – a battle that would rage on for a further published in April 2006, we can trace the origins of the title back eight years.
    [Show full text]
  • K:\Buchanan\Mkelley\Order Opinions\Wikileaks\11-Dm-3
    Case 1:11-dm-00003-TCB Document 38 Filed 03/11/11 Page 1 of 20 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division ) ) ) ) ) In Re: §2703(d) Order; 10GJ3793 ) Miscellaneous No. 1:11dm00003 ) ) ) ) ) ) MEMORANDUM OPINION This matter came before the Court the Motion of Real Parties in Interest Jacob Appelbaum, Birgitta Jonsdottir, and Rop Gonggrijp to Vacate December 14, 2010 Order (“Motion to Vacate”, Dkt. 1) and Motion of Real Parties in Interest Jacob AppelBaum, Rop Gonggrijp, and Birgitta Jonsdottir for Unsealing of Sealed Court Records. (“Motion to Unseal”, Dkt. 3). For the following reasons, petitioners’ Motion to Vacate is DENIED, and petitioners’ Motion to Unseal is DENIED in part, GRANTED in part, and taken under further consideration in part. BACKGROUND Petitioners are Twitter users associated with account names of interest to the government. Petitioner Jacob Appelbaum (Twitter name “ioerror”) is a United States citizen and resident, described as a computer security researcher. (Pet. Motion to Unseal at 3). Rop Gonggrijp (Twitter name “rop_g”) is a Dutch citizen and computer security specialist. Id. Birgitta Case 1:11-dm-00003-TCB Document 38 Filed 03/11/11 Page 2 of 20 Jonsdottir (Twitter name “birgittaj”) is an Icelandic citizen and resident. She currently serves as a member of the Parliament of Iceland. Id. On December 14, 2010, upon the government’s ex parte motion, the Court entered a sealed Order (“Twitter Order”) pursuant to 18 U.S.C. § 2703(d) of the Stored Communications Act, which governs government access to customer records stored by a service provider.
    [Show full text]
  • Encore the ANNUAL RESEARCH MAGAZINE of the ALEXANDER VON HUMBOLDT INSTITUTE for INTERNET and SOCIETY
    encore THE ANNUAL RESEARCH MAGAZINE OF THE ALEXANDER VON HUMBOLDT INSTITUTE FOR INTERNET AND SOCIETY VOLUME 2015 encore THE ANNUAL RESEARCH MAGAZINE OF THE ALEXANDER VON HUMBOLDT INSTITUTE FOR INTERNET AND SOCIETY VOLUME 2015 EDITORIAL Jeanette Hofmann, Director of the Humboldt Institute for Internet and Society Not a day goes by without news about the digitalisation of our everyday life, its great promises but also its clashes with established norms and values. Are we ready for chips to be implanted under our skin? Do we embrace the idea of a decentralised digital currency? Will we be outperformed by the miracles of artificial intelligence and what can we expect from algorithmic regulation? Schumpeter’s “creative destruction” challenges us to shed new light on all the things we usually take for granted and to ask ourselves how we can give direction to the ongoing processes of transformation that modern societies face. As an interdisciplinary research institute, the Alexander von Humboldt Institute for Internet and Society (HIIG) contributes in many ways to address these big questions. First of all, the HIIG has established itself as an important node in a growing network of researchers in the area of Internet and society. In 2015, Julian Staben, one of our first PhD students, submitted his thesis; many more will follow him in 2016. In view of the completion of our first generation of doctoral students, we revised our research programme and placed greater emphasis on interdisciplinary and cross-divisional issues. In addition to the Digitaler Salon, by now a well-established monthly discussion panel co-organised with DRadio Wissen, we organised a number of public and academic events.
    [Show full text]
  • European Parliament Elections 2009 RESEARCH PAPER 09/53 17 June 2009
    European Parliament Elections 2009 RESEARCH PAPER 09/53 17 June 2009 Elections to the European Parliament were held across the 27 states of the European Union between 4 and 7 June 2009. The UK elections were held concurrently with the county council elections in England on 4 June. The UK now has 72 MEPs, down from 78 at the last election, distributed between 12 regions. The Conservatives won 25 seats, both UKIP and Labour 13 and the Liberal Democrats 11. The Green Party held their two seats, while the BNP won their first two seats in the European parliament. Labour lost five seats compared with the comparative pre-election position. The Conservatives won the popular vote overall, and every region in Great Britain except the North East, where Labour won, and Scotland, where the SNP won. UKIP won more votes than Labour. UK turnout was 34.5%. Across Europe, centre-right parties, whether in power or opposition, tended to perform better than those on the centre-left. The exact political balance of the new Parliament depends on the formation of Groups. The UK was not alone in seeing gains for far-right and nationalistic parties. Turnout across the EU was 43%. It was particularly low in some of the newer Member States. Part 1 of this paper presents the full results of the UK elections, including regional analysis and local-level data. Part 2 presents summary results of the results across the EU, together with country-level summaries based on data from official national sources. Adam Mellows-Facer Richard Cracknell Sean Lightbown Recent Research
    [Show full text]
  • The Prospect of Extraditing Julian Assange
    NORTH CAROLINA JOURNAL OF INTERNATIONAL LAW Volume 37 Number 3 Article 7 Spring 2012 The Prospect of Extraditing Julian Assange Molly Thebes Follow this and additional works at: https://scholarship.law.unc.edu/ncilj Recommended Citation Molly Thebes, The Prospect of Extraditing Julian Assange, 37 N.C. J. INT'L L. 889 (2011). Available at: https://scholarship.law.unc.edu/ncilj/vol37/iss3/7 This Note is brought to you for free and open access by Carolina Law Scholarship Repository. It has been accepted for inclusion in North Carolina Journal of International Law by an authorized editor of Carolina Law Scholarship Repository. For more information, please contact [email protected]. The Prospect of Extraditing Julian Assange Cover Page Footnote International Law; Commercial Law; Law This note is available in North Carolina Journal of International Law: https://scholarship.law.unc.edu/ncilj/vol37/iss3/ 7 The Prospect of Extraditing Julian Assange Molly Thebes t I. Introduction .......................... ...... 889 II. Is Julian Assange a Journalist .......... ...... ......... 894 III. The Feasibility of Extraditing Journalists ....... ...... 898 A. Sweden ........................... ..... 899 B. Iceland.............903 1. Libel Tourism .................... ..... 904 2. Source Protection.. ................. ..... 906 3. Whistleblower Protections.....................907 4. International Effect of the Initiative ...... .... 908 5. Limitations of the Initiative .......... ...... 909 C. European Media Laws ................ ..... 911 IV. Conclusion............... ................. 913 I. Introduction The legal battle over the custody of Julian Assange has been well publicized in the media, with both Sweden and the United States vying for authority over the WikiLeaks founder and ex- computer hacker.' While the United States is seeking jurisdiction over Assange for his well-documented involvement in the unauthorized acquisition and dissemination of a quarter of a million diplomatic cables2 and tens of thousands of wartime tB.A.
    [Show full text]
  • Conference Reader
    GREENS MEET CHANGEMAKERS BRUSSELS, 3-5 FEBRUARY 2017 The Greens I EFA in the European Parliament Dear participants, Welcome to the European Ideas Lab - the Greens’ conference to meet the change- makers! Thank you very much for making your way to Brussels - we are really looking forward to getting to know more about you, your projects and your ideas. We have been working on this programme since the summer, when we started mapping the many initiatives, struggles, mobilisations, associations, and endeav- ors aimed at reversing the negative trends at work in today’s Europe. The current challenge is to connect these initiatives, these struggles, and these “changemak- ers” at European level. We spent a lot of time getting in touch with many people and organizations, some already known to us, some new. Little by little, every- thing took shape. Now you are here and we are particularly happy to share this moment with you. In this reader, you will nd: information about the European Greens; practical info to help you get the most out of the conference; the aims and general principles of the conference; and the programme of this rst European Ideas Lab. In a separate folder, you will nd a ‘Who’s Who’. For us, this conference is a rst of this kind and we have tried our best to t all needs. However, any remaining questions, remarks, complaints and suggestions, are welcome ([email protected]). Enjoy, The European Ideas Lab Organising Team CONTENT 03 About the Greens 04 The Greens/EFA in the European Parliament 05 What is the European Green Party 06 - 09 Practical Information 10 - 13 About the conference 14 - 24 Workshops 25 - 38 Programme ABOUT THE GREENS GREENS’ PRINCIPLES HAVE BEEN LAID OUT AND SYNTHETISED IN THE CHARTER OF THE GLOBAL GREENS.
    [Show full text]
  • The Impact of Wikileaks on the Public Opinion of Online Privacy
    Pace University DigitalCommons@Pace Honors College Theses Pforzheimer Honors College 2019 The mpI act of Wikileaks on the Public Opinion of Online Privacy Hazel Small Pace University Follow this and additional works at: https://digitalcommons.pace.edu/honorscollege_theses Part of the Business Commons Recommended Citation Small, Hazel, "The mpI act of Wikileaks on the Public Opinion of Online Privacy" (2019). Honors College Theses. 255. https://digitalcommons.pace.edu/honorscollege_theses/255 This Thesis is brought to you for free and open access by the Pforzheimer Honors College at DigitalCommons@Pace. It has been accepted for inclusion in Honors College Theses by an authorized administrator of DigitalCommons@Pace. For more information, please contact [email protected]. The Impact of Wikileaks on the Public Opinion of Online Privacy Hazel Small Global Marketing Management Advisor: Vishal Lala Pace University Lubin School of Business May 2019 1 Abstract This paper explores the relationship between Wikileaks and online privacy concerns. The goal of the research was to establish that the public’s concern about their online privacy was increased after reading about a relevant leak by posing a hypothesis and testing it. To do this, an A/B test survey was created and distributed through various social media platforms. The results were then statistically evaluated using a t-test for testing the equality of the means of independent samples. We did not have enough evidence to reject the null hypothesis in most cases, and therefore could not establish a correlation between Wikileaks publications and an increase in online privacy concerns. However, the paper proposes a follow-up hypothesis in which the goal was to establish that Wikileaks causes an increase in government distrust.
    [Show full text]
  • D6.3.1 Launch Event
    FP7 – CAPS - 2013 D-CENT D6.3.1 Launch Event Project no. 610349 D-CENT Decentralised Citizens ENgagement Technologies Specific Targeted Research Project Collective Awareness Platforms D6.3.1 Launch Event Version Number: 2 Lead beneficiary: FVH Due Date: 31 Mar 2014 Author(s): Kaisa Eskola (FVH), Kelly Armstrong (Nesta) Editors and reviewers: Francesca Bria (Nesta) Dissemination level: PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) Approved by: Date: This report is currently awaiting approval from the EC and cannot be not considered to be a final version. Page 1 of 27 FP7 – CAPS - 2013 D-CENT D6.3.1 Launch Event Contents 1. Background .................................................................................................................................................................... 4 2. Objectives ...................................................................................................................................................................... 5 3. Invitation & Agenda ...................................................................................................................................................... 6 3.1 Invitation .................................................................................................................................................................
    [Show full text]