Academic literature on the topic 'Jihadist cyber - Digital identity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Jihadist cyber - Digital identity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Jihadist cyber - Digital identity"

1

Pradhuka, Briant Nor, Prahastiwi Utari, and Sudarmo Sudarmo. "Digital queer: identitas komunikasi genderqueer selebgram Mimi Peri." Jurnal Studi Komunikasi (Indonesian Journal of Communications Studies) 4, no. 1 (March 5, 2020): 143. http://dx.doi.org/10.25139/jsk.v4i1.1582.

Full text
Abstract:
Ahmad Jaelani, an Instagram influencer who adopted Mimi Peri as their new identity, plays a significant role in the emergence of digital queer phenomena in Indonesian cyber society. Ahmad Jaelani triggered the digital queer phenomena when he came out as gender queer. Jaelani’s brave act to adopt Mimi Peri identity resulted from various identity struggle. Before conforming to his new identity, he went through several stages, such as identity confusion, identity comparison, identity tolerance, identity acceptance, identity pride, and finally identity synthesis. He conveys his new identity through innovation and creativity, which are presented in several layers, such as personal layers, enactment layers, relational layers, and communal layers.
APA, Harvard, Vancouver, ISO, and other styles
2

Susanto, Edy, Lady Antira, Kevin Kevin, Edo Stanzah, and Assyeh Annasrul Majid. "MANAJEMEN KEAMANAN CYBER DI ERA DIGITAL." Journal of Business And Entrepreneurship 11, no. 1 (June 14, 2023): 23. http://dx.doi.org/10.46273/jobe.v11i1.365.

Full text
Abstract:
In this rapidly growing digital era, cyber security has become one of the most important aspects to pay attention to. Technological development information and communication has provided many benefits to our lives, they also present serious risks related to data security.. Cyber can be in the form of data theft, destruction systems, manipulation of information, or identity theft. First, cyberattacks are getting more complex and constantly evolving with time technology advances. Attackers can variety of methods and tools sophisticated way to exploit system vulnerabilities and gain access invalid. Second, cyber are often cross-border in nature, where attackers can operate overseas making difficult to identify and law enforcement. In addition, technological advances have also expanded attacks into new domains, such as the Internet of Things (IoT), autonomous vehicle systems, and artificial intelligence. Expanding connectivity between devices and internet-connected infrastructure increases security complexity cyber. However, it is important to remember that cyber security is not a challenge can't be overcome. In an effort to protect data and computer systems using various security strategies and measures can be implemented. With a combination of technical approaches, strong security policies, training user awareness, and cooperation between the parties involved, security cyber can be significantly improved.
APA, Harvard, Vancouver, ISO, and other styles
3

Mantello, Peter. "Fatal portraits: The selfie as agent of radicalization." Sign Systems Studies 49, no. 3-4 (December 31, 2021): 566–89. http://dx.doi.org/10.12697/sss.2021.49.3-4.16.

Full text
Abstract:
For the modern-day jihadist, the digital self-portrait or, more specifically, battlefield selfie is a popular tool for identity building. Similarly to the selfies taken by non-violent practitioners of self-capture culture, the jihadist selfie represents an alternative to the Cartesian formulation of a unitary and indivisible self. Rather, it is a product of social relations and performative actions, constituted in dialogue with others through very specific socio-cultural frameworks and expectations. However, unlike its non-violent Doppelgänger, the expectations of this dialogue are centred around a larger political agenda which actively seeks to reformat collective memories of imperial Islamic conquests and co-opt religion as a way to impose a moral order on its violence. Importantly, the battlefield selfie allows the jihadist easily to traverse the boundaries between two seemingly opposing belief systems. Although there exists a wealth of scholarship of self-capture culture, image sharing sites and micro-celebritism, their pervasive influence and practice on battlefield is understudied. This article draws from the personal histories of key Islamic extremists who were both lionized and demonized as a result of their battlefield micro-influencer practices. Today, however, the same individuals can achieve internet fame by participating in self-capture culture – posting selfies, videos or blogging. In other words, never before has a soldier’s public communication been so personal yet collective.
APA, Harvard, Vancouver, ISO, and other styles
4

Binhammad, Mohammad, Shaikha Alqaydi, Azzam Othman, and Laila Hatim Abuljadayel. "The Role of AI in Cyber Security: Safeguarding Digital Identity." Journal of Information Security 15, no. 02 (2024): 245–78. http://dx.doi.org/10.4236/jis.2024.152015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Khariroh, Riri. "Cyber Muslims." ISLAM NUSANTARA:Journal for the Study of Islamic History and Culture 3, no. 2 (July 31, 2022): 101–13. http://dx.doi.org/10.47776/islamnusantara.v3i2.375.

Full text
Abstract:
This new book is a study of Islam in the digital world, containing a collection of scientific articles written by 16 scholars about the increasingly interesting and complex phenomena of the global Islamic world. Most of the authors teach at various universities in the United States and Canada (North America), and the editor of this volume is Robert Rosehnal, Professor in the Department of Religion Studies and Founding Director of the Center for Global Islamic Studies at Lehigh University, Pennsylvania, USA. This interdisciplinary volume highlights cutting-edge research with unique perspectives and new insights into the evolving Islamic cyber landscape, presenting case studies from multiple geographic and cultural locations, and multiple languages ​​(Arabic, Persian, Indonesian and Spanish). The main sources of the authors, the analysis and interpretation they use is digital multimedia technology. These “virtual texts” include websites, podcasts, blogs, Twitter, Facebook, Instagram, YouTube, online magazines and discussion forums, and religious apps. Websites and social media platforms are living “texts” that are constantly evolving, shrinking, changing, and even disappearing, leaving no trace. In this sense, this book needs to be seen as a portrait—or, rather, a screenshot—of the complex and deformed cyber world of Islam at some point in its ongoing evolution. This book explores widely the digital expression of various Muslim communities in cyberspace, or iMuslims, related to the world of imams, clerics, and Sufis, feminists and fashionistas, artists and activists, spiritualists and online influencers. Several articles map the diversity and vibrancy of Islamic digital media against the backdrop of broader social trends in particular hot issues affecting Muslims living in Western countries: racism and Islamophobia, gender dynamics, celebrity culture, identity politics, and fashions of piety, and changing religious practices. The case studies presented in this book cover a wide cultural and geographical area, namely Indonesia, Iran, the Arab Middle East, and North America.
APA, Harvard, Vancouver, ISO, and other styles
6

Dahiya, Kashish. "Trends in Cyber Crime in India." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 6393–404. http://dx.doi.org/10.22214/ijraset.2023.53073.

Full text
Abstract:
Abstract: This research paper explores the trends in Cyber Crime in India, considering the country's rapidly growing digital landscape and the associated risks. The introduction provides an overview of the digital transformation in India and its dual impact, highlighting the alarming increase in Cyber Crime. One prominent trend discussed is the rise of phishing attacks, where cyber criminals employ deceptive tactics to trick individuals into revealing sensitive information. Another concerning trend is the proliferation of Ransomware attacks that target various sectors, causing significant financial losses and operational disruptions. Additionally, cyber fraud targeting financial transactions and digital payment systems has become prevalent. The paper also highlights the risks associated with social media platforms and online marketplaces, including identity theft and the sale of illegal goods and services. To address these escalating cyber threats, the paper emphasises the importance of prioritising cybersecurity measures, raising awareness about safe online practices, and establishing robust legal frameworks. The findings underscore the urgent need for individuals, organisations, and the government in India to work together to combat Cyber Crime effectively and secure the nation's digital future
APA, Harvard, Vancouver, ISO, and other styles
7

Shinkaretskaya, Galina Georgievna, and Alisa Mikhailovna Berman. "Cyber-attacks – an unlawful use of digital technologies." Международное право, no. 1 (January 2022): 40–50. http://dx.doi.org/10.25136/2644-5514.2022.1.37271.

Full text
Abstract:
This article notes that cyber-attacks, i.e. disruption of the information systems of persons, companies or countries, are a new type of criminal activity. International law does not yet have does not have normative documents that regulate the procedure of countering cyber-attacks. It is complicated by the fact that in the international law the grounds for taking coercive measures against other country is aggression (armed attack), which confers the right to individual or collective self-defense of the country. It is indicated that the doctrine legitimizes drawing parallels between common operation that are classified as the resorting to force, and the corresponding cyber operations. As the criterion of aggression, it is offered to use the assessment of the scale of attack and severity of consequences. The difficulty in qualifying the cyber-attack also lies in open architecture of the Internet, which allows billions of users worldwide to interact with each other. The aforementioned aspect also allows the hackers to hide their identity or even use someone else's device without their knowledge. All these difficulties aggravate if cyber operations are conducted by or on behalf of the countries. In fact, the cyber-attack participants do not bear any consequences for their actions. It is claimed that modern international law suggests both, intraterritorial or extraterritorial jurisdiction.
APA, Harvard, Vancouver, ISO, and other styles
8

Momcheva, Galina, Teodora Bakardjieva, Veselina Spasova, and Antonina Ivanova. "VARNA FREE UNIVERSITY’S PROJECTS FOR DEVELOPING OF CYBERSECURITY EDUCATION AND TRAINING – “CYBERMAGICIANS” PROJECT." Education and Technologies Journal 12, no. 2 (August 1, 2021): 516–18. http://dx.doi.org/10.26883/2010.212.3903.

Full text
Abstract:
Varna Free University has a tradition in teaching cyber security through bachelor’s, master’s and doctoral degrees and LLL (Lifelong Learning) courses for school teachers and students. The latest Cyberwizards project stems from the need to teach teachers and students how to protect themselves online, how to manage their digital identity, what types of information to publish. The university project aims to develop training courses and research methodologies to develop effective and sustainable cyber learning solutions aimed at digital protection and security.
APA, Harvard, Vancouver, ISO, and other styles
9

Chałubińska-Jentkiewicz, Katarzyna. "Digital Single Market. Cyber Threats and the Protection of Digital Contents: An Overview." Santander Art and Culture Law Review, no. 2 (6) (2020): 279–92. http://dx.doi.org/10.4467/2450050xsnr.20.020.13023.

Full text
Abstract:
Access to audio-visual and digitized heritage is crucial for the economy and overall well-being. It also offers important avenues for the development of creativity and intercultural dialogue, shaping people’s identity and contributing to cultural diversity. Yet the rise of the digital sector has also been accompanied by the proliferation of cyber or computer-related crime. Therefore, the harmonization of cybercrime legislation has widely been discussed in different international fora. At the same time, the protection of digital content has become a highly important issue in the context of the expanding policies aimed at ensuring public, open access to digitized resources for non-commercial, educational, and cultural purposes. This article offers an overview of these topical questions, with specific reference to the EU Digital Single Market.
APA, Harvard, Vancouver, ISO, and other styles
10

Betts, Lucy R., and Karin A. Spenser. "“A Large Can of Worms”." International Journal of Cyber Behavior, Psychology and Learning 5, no. 2 (April 2015): 15–29. http://dx.doi.org/10.4018/ijcbpl.2015040102.

Full text
Abstract:
Digital technology use is increasingly impacting on the lives of young people. To gain a deeper understanding of the perceived impact of young people's digital technology use, 2 focus groups were conducted with 14 teachers recruited from 2 schools. The focus groups were transcribed verbatim and analysed using Interpretative Phenomenological Analysis. The analysis revealed three themes: changing social dynamics, risk and (ir)responsible behaviour, and disclosure and reporting of cyber bullying. Participants discussed how digital technology was shaping young people's social identity and impacting on established norms when interacting in the social arena. A number of benefits were attributed to technology use but participants also recognised young people's naivety and tendency to anthropomorphise the internet. Finally, there was a perception that young people underreported their experiences of cyber bullying and some of the challenges faced when tackling cyber bullying were discussed.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Jihadist cyber - Digital identity"

1

Reyhan, Dilnur. "Le rôle des technologies d'information et de communication (TIC) dans la contruction des nouvelles diasporas : le cas de la diaspora Ouïghoure." Thesis, Strasbourg, 2017. http://www.theses.fr/2017STRAG003.

Full text
Abstract:
Cette thèse s’intéresse aux rôles des TIC dans la constitution de la diaspora ouïghoure. L’approche sociologique choisie a permis d’aborder cette question sous l’angle politique et communicationnelle mais aussi historique et géographique et de prendre en compte tant les aspects idéologiques, sociaux qu’institutionnels et organisationnels. Les communautés ouïghoures à l’étranger commencent à être visibles et créent des organisations officielles représentant leur cause. La première partie met en évidence un réseau complexe constitué des communautés ouïghoures institutionalisées qui sont en interaction entre elles et avec le pays d’origine à travers les TIC, le Congrès Mondial Ouïghour rassemblant la majorité de ces associations. La deuxième partie montre à travers les analyses quantitatives et qualitatives de la cartographie du web ouïghour 2010 et 2016, l’apport et des limites des TIC dans le processus de construction de la diaspora. Cette analyse croisée a permis dans la troisième partie de comprendre et d’interpréter les formes d’identités qui se construisent : identité ethno-nationale ou ethno-culturelle ou ethno- religieuse, et les compromis sociaux qui tentent de se déterminer par des processus de négociation dans l’espace virtuel et au sein des institutions. Ce travail de recherche dévoile les différentes finalités recherchées par les acteurs tant officiels que lambda et de voir dans quelle mesure de nouvelles formes de régulations sont susceptibles d’aboutir à un nouveau compromis entre les acteurs. Mais pour l’instant, il n’existe ni de stratégie commune, en particulier vis-à-vis des politiques à tenir face à la Chine, ni une identité commune, mais des identités de la migration ouïghoure
This thesis focuses on the constitutive role of Information and Communication Technologies (ICT) in the Uyghur diaspora. The sociological approach adopted in this thesis not only examines the aspects of politics and communication of this issue, but also allows a historical and geographical study which also takes into account the ideological, social, institutional and organizational points of view, as Uyghur communities abroad start to be visible and create formal organizations representing their cause. The first section of the thesis highlights, through ICT, a complex network of institutionalized Uyghur communities that interact with each other and their countries of origin, and demonstrates that the World Uyghur Congress is the most dominant of these associations. The second section shows, through quantitative and qualitative analysis of the mapping of the Uyghur web in 2010 and in 2016, the contributions and limitations of ICT in the diaspora construction process. This cross analysis sheds light in the third section on the forms of identities that are constructed, such as ethno-national, ethno-cultural or ethno-religious identity, and the social compromises tentatively formed through the negotiation process in virtual space and in the institutions. This study reveals the different purposes sought by both official and lambda actors and examines how new forms of regulation are likely to reach a new compromise between the actors. Presently, however, there is neither a common strategy, particularly vis-a-vis the political dealings with China, nor a common identity, but different identities of the Uyghur migration
APA, Harvard, Vancouver, ISO, and other styles
2

"A Cyber(space) of Their Own: Female Iberian and Latin American Artists and Writers of the Digital. A Transatlantic Analysis from Identity (De)Construction, Political Dissidence and Activism, to the Posthuman." Doctoral diss., 2019. http://hdl.handle.net/2286/R.I.53494.

Full text
Abstract:
abstract: As a result of social media platforms such as Facebook, Twitter and blogs, works can be distributed and viewed at a global scale with the simple click of the mouse. One can even visit entire museums and virtually walk through their collections without having to leave one’s own seat. Furthermore, new software, programs, and digital tools facilitate and make possible the ability to experiment and create one’s art in ways that were previously unimaginable or even unheard of. This is also true with the dissemination of one’s art and the visibility of contemporary artists who create works pertaining to the digital realm. However, the availability, usage, and training associated with such technologies do not come without its own implications and drawbacks. Unfortunately, there exists a great disparity not only with access and availability of the Internet at a global level, but also a digital divide, which indicates that the technologies and sciences are “gendered”—for instance, the male majority in STEM professions and fields of study. When considering the Humanities, specifically the genre of contemporary art and literature, women’s marginalization is witnessed there too, as distinguished canonical works belong to predominantly Caucasian, Anglo-Saxon men. In the digital age then, Iberian and Latin American women writers and artists face the challenge of visibility and recognition in two territories—technology and contemporary artistic creation—dominated by men. This study gathers contemporary female artists of digital works originating from North America, the Caribbean, South America, and Spain who utilize a wide variety of tools to conduct and create their artwork. The artists and authors analyzed in this project include: Teresa Serrano (México, D.F. 1936-), Adriana Calatayud (México, D.F. 1967-), Ana Mendieta (Havana, 1948-1985), Maritza Molina (Havana), Yasmín S. Portales Machado (Havana, 1980-), María María Acha-Kutscher (Lima, 1968-), Praba Pilar (Colombia), María Cañas (Seville, 1972-), and Pilar Albarracín (Arcena, Huelva 1968-), with the objective of investigating the manner in which digital tools are being used by these women artists and writers for the purpose visibility, identity (de)construction, as spaces of resistance, and to explore how those messages are transmitted and transformed through digital mediums.
Dissertation/Thesis
Doctoral Dissertation Spanish 2019
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Jihadist cyber - Digital identity"

1

Cyber Zen. Routledge, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Selby, Nick, and Heather Vescent. Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse. Weldon Owen, Incorporated, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

author, Vescent Heather, Chow Eric illustrator, and Buckley Conor illustrator, eds. The cyber attack survival manual: Tools for surviving everything from identity theft to the digital apocalypse. Weldon Owen, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Grieve, Gregory Price. Cyber Zen: Imagining Authentic Buddhist Identity, Community, and Practices in the Virtual World of Second Life. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Grieve, Gregory Price. Cyber Zen: Imagining Authentic Buddhist Identity, Community, and Practices in the Virtual World of Second Life. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Grieve, Gregory Price. Cyber Zen: Imagining Authentic Buddhist Identity, Community, and Practices in the Virtual World of Second Life. Routledge, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and Beyond. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Jihadist cyber - Digital identity"

1

Ladouceur, Rachel, and Fehmi Jaafar. "Cyber Influence Stakes." In Blockchain and Artificial Intelligence-Based Solution to Enhance the Privacy in Digital Identity and IoT, 155–74. Boca Raton: CRC Press, 2023. http://dx.doi.org/10.1201/9781003227656-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vasileva, Violeta. "Application of a Human-Centric Approach in Security by Design for IoT Architecture Development." In Communications in Computer and Information Science, 13–22. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09357-9_2.

Full text
Abstract:
AbstractThe aim of this paper is to show the need for a comprehensive approach to studying cybersecurity in order to get a focus on both, technological factors and the human aspect in development a user level of IoT Reference Architecture. The author presents a methodology for researching the capacity of users to manage their digital identity and operate in a safe and secure cyber-physical environment. For this purpose, an approach is proposed, that is based on a defined survey research targeting personnel and individual users operating in cyber-physical environment. Based on the analysed survey results and formed observations, the paper suggests solutions for improving the competences of users in cyberspace and increase their cyber awareness. As a practical implementation of the proposed methodology, the author presents a developed Cyber Awareness platform. Its main purpose is to provide information and resources on cybersecurity and IoT security, and to be the main point of knowledge access. The portal also provides opportunities to test users’ cyber knowledge, participate in public survey related to cyber topics, share and exchange information, opinions and useful practices on cyber incidents and cyber knowledge.
APA, Harvard, Vancouver, ISO, and other styles
3

Jones, David Martin. "Surveillance and Resistance." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 122–43. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9661-7.ch007.

Full text
Abstract:
This chapter provides readers with an overview and discussion of the manner in which the Internet and social media has facilitated movements, ranging from Aryan Nations and the various European Defence Leagues, to the Global Jihadist Movement and anarchist groups. As the phenomenon of netwar and online recruitment evolved after 9/11, extremist movements motivated by illiberal and apocalyptic ideologies have found the Internet a congenial space for organization, dissemination, education and radicalization. This chapter examines the difficulty liberal political democracies have in censoring these groups and the ideas they promote. Civil rights organizations immediately condemn state electronic surveillance as an invasion of civil liberties, and present the liberal democrat with an acute moral and political dilemma. This chapter finally considers the tactics democratic states might prudently adopt in order to preserve the national interest.
APA, Harvard, Vancouver, ISO, and other styles
4

McNeal, Ramona Sue, and Mary Schmeida. "Digital Paranoia." In Cyber Law, Privacy, and Security, 1295–312. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch064.

Full text
Abstract:
Participation in social networks, forums, and other discussion groups is a growing trend in the United States. Aside from the benefits of online social media, there is a growing concern about privacy and safety from the devolvement of personal information online. As a result of this unfriendly social media climate, Americans are taking measures to protect personal identity and to avoid surveillance by others. The purpose of this chapter is to analyze factors predicting which groups are most concerned about Internet privacy. In addition, this chapter explores how concerns regarding Information privacy are impacting usage of social network sites. We explore these questions using multivariate regression analysis and individual level data from the Pew Internet and American Life Project. Our findings suggest that those with the greatest fears regarding online privacy are not staying offline but are taking necessary precautions to address concerns.
APA, Harvard, Vancouver, ISO, and other styles
5

Kirwan, Gráinne, and Andrew Power. "Identity Theft and Online Fraud." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 94–112. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-350-8.ch006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nisa, Eva. "Muslims Enacting Identity." In The Oxford Handbook of Digital Religion, C33.S1—C33.S9. Oxford University Press, 2022. http://dx.doi.org/10.1093/oxfordhb/9780197549803.013.33.

Full text
Abstract:
Abstract This chapter discusses the intersections between gender issues, religious identity, and cyber-activism. The main discussion focuses on women, particularly due to the pervasive unequal offline and online power dynamics between men and women. It focuses on how Muslim women enact their identities through the Internet and various social media platforms. What does it mean for them to be active in these various forms of advanced communication technology? The chapter argues that although the Internet and social media has enabled Muslim women from varied Islamic currents—liberal, progressive, and ultra-conservative—to self-present themselves and enable them to speak from a position of religious authority, their online presence is not a direct sign of weakened Muslim patriarchy. Despite development in the gender digital divide, alternative and social media, offered through the Internet’s presence and affordability, remain gendered.
APA, Harvard, Vancouver, ISO, and other styles
7

Ejazi, Farzaneh. "Performance of Virtual Terrorism in Cyber Space." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 224–36. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-9755-2.ch013.

Full text
Abstract:
In the 1980s, Barry Collin coined the term virtual terrorism. Nowadays virtual terrorism is very common all over the world. Virtual terrorism threatened computers, networks, and the information stored. Virtual terrorism makes new opportunity for terrorists such as hide identity, no geographical restrictions, international advertising and membership, and targeting more people. They hack into computers and mobile phones. Virtual terrorism can be controlled remotely. The variety and number of virtual terrorist attacks is enormous. Virtual terrorists use pseudonyms, and their true identities are not traced. Virtual terrorists do not want a lot of forces for their activities. Virtual terrorists just need laptops and Wi-Fi. In this research, the question is how virtual identity and internet are so essential for terrorists. In sociological studies, virtual identity is one of the most important and key issues. Virtual terrorists use this virtual and hidden identity to destroy a country's infrastructure. They are sure that there are no borders or checkpoints in cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
8

Tellería, Ana Serrano. "The Role of the Profile and the Digital Identity on the Mobile Content." In Cyber Law, Privacy, and Security, 1645–64. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch080.

Full text
Abstract:
The (re)construction of the user profile and the digital identity resulting from both conscious and unconscious activity on the Internet is directly linked to the process of creation and diffusion of content. Many times, neither the users-prosumers are aware of this process nor are the authors cognizant of the original content, as new authors – humans as well as machines - cover the relations established between the users, their content, their activity online and the combination of these. Big data and information economy are not just consequences of the possibility of collecting as much information as possible about users. Instead, they provide a quasi unlimited means of mapping and shaping every movement of our behavior and lives through devices and technologies. Therefore, the aim of this chapter is to understand how users handle this liquid ecosystem and its relationship with the evolution of mobile content, considering the different rhythms and dimensions.
APA, Harvard, Vancouver, ISO, and other styles
9

Pereira, Filipa da Silva, Marlene Alexandra Veloso de Matos, and Álvaro Miguel do Céu Gramaxo Olivei Sampaio. "Cyber-Crimes against Adolescents." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 211–30. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6324-4.ch014.

Full text
Abstract:
At young ages there is an increase in reports of intimidation, harassment, intrusion, fear, and violence experienced through Information Technologies (IT). Hacking, spamming, identity theft, child pornography, cyber bullying, and cyber stalking are just few examples of cyber-crimes. This chapter aims to contribute, from a psychological and design perspective, to an integrative viewpoint about this complex field of cyber-crime. In this chapter, the most common types of cyber-crimes, epidemiological data, and the profiles of cyber victims and aggressors' are approached. The studies that identify the factors contributing to IT misuse and to growing online vulnerability, principally in adolescents, are also discussed. Likewise, the central explanatory theories for the online victimization and the risk factors for victimization and perpetration online are addressed. Finally, some cyber-crime prevention strategies are anticipated, in particular among young people, seeking to provide clues to the consolidation of recent policies, namely at the digital design level.
APA, Harvard, Vancouver, ISO, and other styles
10

Saharan, Sameer, Shailja Singh, Ajay Kumar Bhandari, and Bhuvnesh Yadav. "The Future of Cyber-Crimes and Cyber War in the Metaverse." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 126–48. IGI Global, 2023. http://dx.doi.org/10.4018/979-8-3693-0220-0.ch007.

Full text
Abstract:
The future of cybercrimes and cyber warfare in the metaverse is a topic of concern. Understanding the emerging landscape is crucial. With technological advancements and the pervasive influence of the metaverse, new cyber threats have emerged. This chapter provides an overview of challenges and ramifications associated with cybercrimes and cyber warfare in the metaverse. It explores evolving cyber threats in the metaverse, considering AI, machine learning, and quantum computing. Cybercrimes include virtual asset theft, identity theft, phishing, harassment, and online extortion. Cyber warfare in the metaverse involves state-sponsored attacks, espionage, information warfare, and manipulation of virtual defense systems. Robust cybersecurity measures, collaboration among stakeholders, and cyber literacy are essential to mitigate risks.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Jihadist cyber - Digital identity"

1

Holm, Eric. "Identity crime: The challenges in the regulation of identity crime." In 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE, 2012. http://dx.doi.org/10.1109/cybersec.2012.6246078.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nirkhi, S. M., R. V. Dharaskar, and V. M. Thakre. "Analysis of online messages for identity tracing in cybercrime investigation." In 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE, 2012. http://dx.doi.org/10.1109/cybersec.2012.6246131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Holm, Eric, and Geraldine Mackenzie. "The importance of mandatory data breach notification to identity crime." In 2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE, 2014. http://dx.doi.org/10.1109/cybersec.2014.6913963.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Moore, Erik. "Managing the loss of control over cyber identity." In 2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC). IEEE, 2016. http://dx.doi.org/10.1109/dipdmwc.2016.7529395.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Alkhalifah, Ali, and John D'Ambra. "The role of Identity Management Systems in enhancing protection of user privacy." In 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE, 2012. http://dx.doi.org/10.1109/cybersec.2012.6246091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sheik, A. T., C. Maple, G. Epiphaniou, and U. I. Atmaca. "A Comparative Study of Cyber Threats on Evolving Digital Identity Systems." In Competitive Advantage in the Digital Economy (CADE 2021). Institution of Engineering and Technology, 2021. http://dx.doi.org/10.1049/icp.2021.2428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Agbaje, Micheal, Oludele Awodele, and Chibueze Ogbonna. "Applications of Digital Watermarking to Cyber Security (Cyber Watermarking)." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2138.

Full text
Abstract:
Cyber security is generally an extension of the traditional information technology (IT) security that is aimed at protecting systems, applications and data that exposed to a variety of forms of attack via the internet, ranging from data theft and espionage to corruption of data and denial of service attacks. There is a need for an increase in cyber security research due to losses from sabotage being experienced by nations, businesses and individuals from various cybercrime attacks. This paper takes a look at the applications digital watermarking to the process of protection in cyber space called cyber watermarking particularly focusing on theft of information (identity & credit card theft).The methodology of the research is through literature search and case study. The rest of the paper presents a brief overview of the digital watermarking and issues in cyber security.
APA, Harvard, Vancouver, ISO, and other styles
8

Abubakar, Aisha, Pooneh Bagheri Zadeh, Helge Janicke, and Richard Howley. "Root cause analysis (RCA) as a preliminary tool into the investigation of identity theft." In 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, 2016. http://dx.doi.org/10.1109/cybersecpods.2016.7502349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Saragih, Taruly Karlina, Eric Tanuwijaya, and Gunawan Wang. "The Use of Blockchain for Digital Identity Management in Healthcare." In 2022 10th International Conference on Cyber and IT Service Management (CITSM). IEEE, 2022. http://dx.doi.org/10.1109/citsm56380.2022.9935935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhu, Jiali, and Zhenxin Wu. "An Open Sharing Method for Digital Heritage Assets Based on Self-Sovereign Identity Technology." In 2023 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2023. http://dx.doi.org/10.1109/csr57506.2023.10224909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography