Levesque, 2006 - Google Patents
Hacktivism: The how and why of activism for the digital ageLevesque, 2006
- Document ID
- 8639157703136057106
- Author
- Levesque M
- Publication year
- Publication venue
- The International Handbook of Virtual Learning Environments
External Links
Snippet
On the main floor of the Munk Centre for International Studies, a formal reception is taking place: The topic of discussion is internet accountability. The political figures that are participating in the reception have arrived at the University of Toronto wearing suits and ties …
- 238000005516 engineering process 0 abstract description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations contains provisionally no documents
- H04L12/18—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
- H04L12/1895—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast for short real-time information, e.g. alarms, notifications, alerts, updates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations contains provisionally no documents
- H04L12/18—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
- H04L12/1859—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast adapted to provide push services, e.g. data channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/5855—Message switching systems, e.g. electronic mail systems with selective forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Real-time or near real-time messaging, e.g. instant messaging [IM] interacting with other applications or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/24—Presence management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/22—Tracking the activity of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/14—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with selective forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/02—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with automatic reactions or user delegation, e.g. automatic replies or chatbot
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/40—Services or applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/06—Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zeebaree et al. | Social media networks security threats, risks and recommendation: A case study in the kurdistan region | |
| Gharibi et al. | Cyber threats in social networking websites | |
| Lin et al. | At the nexus of cybersecurity and public policy: Some basic concepts and issues | |
| Pande | Introduction to cyber security | |
| Chen et al. | Privacy issues and solutions in social network sites | |
| Algarni et al. | Social engineering in social networking sites: Phase-based and source-based models | |
| Thakral et al. | Cybersecurity and ethics for IoT system: A massive analysis | |
| Clark | The role of trust in cyberspace | |
| Connolly et al. | The evolving threat of ransomware: From extortion to blackmail | |
| Kaur | Cyber security challenges in the latest technology | |
| US20080320102A1 (en) | Information retrieval system | |
| Kerr | Authoritarian management of (cyber-) society: Internet regulation and the new political protest movements | |
| Agarwal et al. | Security and Privacy in Social Network | |
| Adeleke | Personal protection of privacy in the information age | |
| Antipova | Cyberattacks on business website: case study | |
| Ahmad et al. | Addressing anonymous abuses: Measuring the effects of technical mechanisms on reported user behaviors | |
| Kizza | Ethical, privacy, and security issues in the online social network ecosystems | |
| Levesque | Hacktivism: The how and why of activism for the digital age | |
| Azeez et al. | Grid security loopholes with proposed countermeasures | |
| Wright | Security, privacy, and anonymity | |
| Pilania et al. | Securing confidential information on WhatsApp with blockchain technology | |
| Kizza | Cyberspace and the Changing Frontiers of Ethics | |
| Kundu et al. | Analysis of security and privacy in social media platforms | |
| Ananthan et al. | Challenges and Issues in Implementing Personal Data Protection. | |
| Singh | The Cybercrime Spectrum: Understanding Digital Threats and Security |