Anonymous: serious threat or mere annoyance?

نویسنده

  • Steve Mansfield-Devine
چکیده

Anonymous originates from the 4chan. org message board, an ‘anything goes’ website that allows users to post images and comments without registering. They can use names (any names) or they can post without identifying themselves, in which case the posting is labelled ‘Anonymous’. The site became a rallying point for a series of (mostly juvenile) pranks and campaigns. Before the Wikileaks-related activities, Anonymous was best known for Operation Payback in which it attacked the Recording Industry Association of America (RIAA) and other organisations connected with copyright protection and music and software anti-piracy efforts. The anti-copyright activities of Operation Payback continue to this day, in a somewhat spasmodic manner. The group then gained considerable notoriety for its attacks on the Church of Scientology with ‘Project Chanology’.1 Critics (and even some supporters) of Anonymous considered this campaign a mistake, as it enabled the Church of Scientology to claim religious persecution, while the damage caused was minimal. The ‘church’ moved quickly to protect itself from the Anonymous activities by switching hosts and employing the services of Prolexic – a specialist in mitigating DDoS attacks.2 Two members of Anonymous were subsequently jailed for taking part in the attacks.3

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Systems/persons Correlation Modeling. Application to Noise/annoyance Analysis

The aim of this paper is to design a generic model of the correlation between aircrafts’noises and riparian persons’annoyance. This study is in keeping with Artificial Intelligence, and it focuses on the study of the relations between systems and unvoluntary users. Beyond a mere “noise level” ! “annoyance” function, we aim at defining more precisely the causal relations between noise characteri...

متن کامل

Computer Viruses – from an Annoyance to a Serious Threat

All product names referenced herein are trademarks or registered trademarks of their respective companies. Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior ...

متن کامل

Stimulus Threat and Exposure Context Modulate the Effect of Mere Exposure on Approach Behaviors

Mere-exposure (ME) research has found that initially neutral objects made familiar are preferred relative to novel objects. Recent work extends these preference judgments into the behavioral domain by illustrating that mere exposure prompts approach-oriented behavior toward familiar stimuli. However, no investigations have examined the effect of mere exposure on approach-oriented behavior towar...

متن کامل

Policy discourse, people's internal frames, and declared aircraft noise annoyance: an application of Q-methodology.

Aircraft noise annoyance is studied extensively, but often without an explicit theoretical framework. In this article, a social approach for noise annoyance is proposed. The idea that aircraft noise is meaningful to people within a socially produced discourse is assumed and tested. More particularly, it is expected that the noise policy discourse influences people's assessment of aircraft noise...

متن کامل

Distinct neural networks support the mere ownership effect under different motivational contexts.

The "mere ownership effect" refers to individuals' tendency to evaluate objects they own more favorably than comparable objects they do not own. There are numerous behavioral demonstrations of the mere ownership effect, but the neural mechanisms underlying the expression of this self-positivity bias during the evaluation of self-associated objects have not been identified. The present study aim...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Network Security

دوره 2011  شماره 

صفحات  -

تاریخ انتشار 2011