Columbine Subculture as a Threat to Information Security
نویسندگان
چکیده
This study is based on the analysis of law enforcement practice, monitoring social networks, media materials and theoretical works Russian foreign scholars topic school shooting. The paper presents characteristics columbine subculture at present stage its development in Russian-speaking segment Internet. authors describe main provisions that form basis ideology shooting, substantiates this has an expressed political essence signs a terrorist ideology. analyse relationship between propaganda shooting other destructive subcultures (right-wing leftist-anarchism, incels, AUE (an extremist organization banned Federation), etc.). They come to conclusion Internet, one hand, intersects, merges with (sometimes diametrically opposed) movements promote hatred, enmity (or) violence, and, opposes itself ideologies.
منابع مشابه
Differential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملKnowledge Discovery as a Threat to Database Security
This chapter investigates the affect of knowledge discovery from databases on the security of databases. First, it examines the current concern with database systems for security from knowl edge discovery. Second, this chapter discusses some of the potential security risks associated with knowledge discovery. Third, some potential structure for the development of controls for such systems is e...
متن کاملInformation Disclosure as a Means to Security
In this paper we present a novel Stackelberg-type model of security domains: Security Assets aSsignment with Information disclosure (SASI). The model combines both the features of the Stackelberg Security Games (SSGs) model and of the Bayesian Persuasion (BP) model. More specifically, SASI includes: a) an uncontrolled, exogenous security state that serves as the Defender’s private information; ...
متن کاملUsers as the Biggest Threats to Security of Health Information Systems
There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...
متن کاملA Threat Tree for Health Information Security and Privacy
This paper begins a process of organizing knowledge of health information security threats into a comprehensive catalog. We begin by describing our risk management perspective of health information security, and then use this perspective to motivate the development of a health information threat tree. We describe examples of three threats, breaking each down into its key risk-related data attri...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SHS web of conferences
سال: 2022
ISSN: ['2261-2424', '2416-5182']
DOI: https://doi.org/10.1051/shsconf/202213400082