SlideShare a Scribd company logo
1 of 17
Political Communication In CMC (Internet Activism & Hacktivism) Alexander Katzmaier
Internet activism ,[object Object]
Cyberactivists ,[object Object],[object Object],[object Object],[object Object],[object Object]
Key resource ,[object Object],[object Object],[object Object]
Usage of Internet Activism 1/3 ,[object Object],[object Object],[object Object],[object Object]
Usage of Internet Activism 2/3 ,[object Object],[object Object],[object Object],[object Object]
Usage of Internet Activism 3/3 ,[object Object],[object Object],[object Object],[object Object]
Example of early activism ,[object Object],[object Object],[object Object],[object Object],[object Object]
Hacktivism ,[object Object],[object Object],[object Object]
Techniques 1/2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Techniques 2/2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hacker vs. Hacktivist ,[object Object],[object Object],[object Object],[object Object]
Examples of Hacktivism ,[object Object],[object Object],[object Object],[object Object]
Criticism ,[object Object],[object Object],[object Object],[object Object],[object Object]
Criticism ,[object Object],[object Object],[object Object],[object Object]
Bibliography ,[object Object],[object Object],[object Object],[object Object]
Bibliography ,[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activismjwilso
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsJyrki Kasvi
 
Open Data, Open Government
Open Data, Open GovernmentOpen Data, Open Government
Open Data, Open GovernmentMsifry
 
RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social SideNatalie Alesi
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its DiscontentsMsifry
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internetJeffrey Hart
 
Surveillance and expropriation of information
Surveillance and expropriation of informationSurveillance and expropriation of information
Surveillance and expropriation of informationJia Hui (Isabella) Dai
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedMsifry
 
Media & Limits To Free Speech in the 21st Century
Media & Limits To Free Speech in the 21st CenturyMedia & Limits To Free Speech in the 21st Century
Media & Limits To Free Speech in the 21st CenturyMarie K. Shanahan
 
Data journalism in the second machine age
Data journalism in the second machine ageData journalism in the second machine age
Data journalism in the second machine ageAlexander Howard
 
State of the Internet
State of the InternetState of the Internet
State of the InternetCharles Mok
 
Social Justice & Black Twitter
Social Justice & Black TwitterSocial Justice & Black Twitter
Social Justice & Black TwitterAyodele Odubela
 
Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16Arthit Suriyawongkul
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT TechnologiesMaria Eloisa Blanza
 
Surveillance in the technology age
Surveillance in the technology ageSurveillance in the technology age
Surveillance in the technology ageAnthony Flores
 
New Media Activism Presentation
New Media Activism Presentation New Media Activism Presentation
New Media Activism Presentation NewMediaActivism
 

What's hot (20)

The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
 
Open Data, Open Government
Open Data, Open GovernmentOpen Data, Open Government
Open Data, Open Government
 
RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social Side
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
Surveillance and expropriation of information
Surveillance and expropriation of informationSurveillance and expropriation of information
Surveillance and expropriation of information
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the Networked
 
Collab Space DC Open Data
Collab Space DC Open DataCollab Space DC Open Data
Collab Space DC Open Data
 
Government 2.0.: Opportunities and challenges
Government 2.0.: Opportunities and challengesGovernment 2.0.: Opportunities and challenges
Government 2.0.: Opportunities and challenges
 
Patron Privacy in Libraries
Patron Privacy in LibrariesPatron Privacy in Libraries
Patron Privacy in Libraries
 
Media & Limits To Free Speech in the 21st Century
Media & Limits To Free Speech in the 21st CenturyMedia & Limits To Free Speech in the 21st Century
Media & Limits To Free Speech in the 21st Century
 
Data journalism in the second machine age
Data journalism in the second machine ageData journalism in the second machine age
Data journalism in the second machine age
 
State of the Internet
State of the InternetState of the Internet
State of the Internet
 
SXSW slides 2016
SXSW slides 2016SXSW slides 2016
SXSW slides 2016
 
Social Justice & Black Twitter
Social Justice & Black TwitterSocial Justice & Black Twitter
Social Justice & Black Twitter
 
Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT Technologies
 
Surveillance in the technology age
Surveillance in the technology ageSurveillance in the technology age
Surveillance in the technology age
 
New Media Activism Presentation
New Media Activism Presentation New Media Activism Presentation
New Media Activism Presentation
 

Similar to Political Communication In CMC (Internet Activism & Hacktivism

Digital Media Activism by S
Digital Media Activism by SDigital Media Activism by S
Digital Media Activism by Spumascomm
 
Digital Media Activism by Sharhad Haneef
Digital Media Activism by Sharhad HaneefDigital Media Activism by Sharhad Haneef
Digital Media Activism by Sharhad Haneefvivekkarackadu
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 
The Blogosphere The New Public Sphere? What Role for the State If Any?
The Blogosphere The New Public Sphere? What Role for the State If Any? The Blogosphere The New Public Sphere? What Role for the State If Any?
The Blogosphere The New Public Sphere? What Role for the State If Any? Dibussi Tande
 
E-Democracy Meets E-Journalism (Transparency, Engagement)
E-Democracy Meets E-Journalism (Transparency, Engagement)E-Democracy Meets E-Journalism (Transparency, Engagement)
E-Democracy Meets E-Journalism (Transparency, Engagement)Steven Clift
 
Newsout: 30 examples of government transparency
Newsout: 30 examples of government transparencyNewsout: 30 examples of government transparency
Newsout: 30 examples of government transparencyBill Densmore
 
political communication in cmc
political communication in cmcpolitical communication in cmc
political communication in cmctasosrules
 
Using OSINT in times of social unrest
Using OSINT in times of social unrestUsing OSINT in times of social unrest
Using OSINT in times of social unrestShani Wolf
 
Urban Topic- Cycpercities and china's censorship
Urban Topic- Cycpercities and china's censorshipUrban Topic- Cycpercities and china's censorship
Urban Topic- Cycpercities and china's censorshipNicole Muth
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismUniversity of Sydney
 
Internet use in Social Activism in Taiwan, 2014 ISA Congress, Yokohama
Internet use in Social Activism in Taiwan,  2014 ISA Congress, YokohamaInternet use in Social Activism in Taiwan,  2014 ISA Congress, Yokohama
Internet use in Social Activism in Taiwan, 2014 ISA Congress, YokohamaAlbert Tzeng
 
Zapatistas and online activism
Zapatistas and online activismZapatistas and online activism
Zapatistas and online activismHillbilly Gothic
 
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docxBriefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docxjackiewalcutt
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...Emily Võ
 
Sunshine 2.0: Using Technology for Democracy
Sunshine 2.0: Using Technology for DemocracySunshine 2.0: Using Technology for Democracy
Sunshine 2.0: Using Technology for DemocracySteven Clift
 
Cyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxCyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxdorishigh
 

Similar to Political Communication In CMC (Internet Activism & Hacktivism (20)

Digital Media Activism by S
Digital Media Activism by SDigital Media Activism by S
Digital Media Activism by S
 
Digital Media Activism by Sharhad Haneef
Digital Media Activism by Sharhad HaneefDigital Media Activism by Sharhad Haneef
Digital Media Activism by Sharhad Haneef
 
Polinter06
Polinter06Polinter06
Polinter06
 
Polinter07
Polinter07Polinter07
Polinter07
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
The Blogosphere The New Public Sphere? What Role for the State If Any?
The Blogosphere The New Public Sphere? What Role for the State If Any? The Blogosphere The New Public Sphere? What Role for the State If Any?
The Blogosphere The New Public Sphere? What Role for the State If Any?
 
E-Democracy Meets E-Journalism (Transparency, Engagement)
E-Democracy Meets E-Journalism (Transparency, Engagement)E-Democracy Meets E-Journalism (Transparency, Engagement)
E-Democracy Meets E-Journalism (Transparency, Engagement)
 
Newsout: 30 examples of government transparency
Newsout: 30 examples of government transparencyNewsout: 30 examples of government transparency
Newsout: 30 examples of government transparency
 
political communication in cmc
political communication in cmcpolitical communication in cmc
political communication in cmc
 
Using OSINT in times of social unrest
Using OSINT in times of social unrestUsing OSINT in times of social unrest
Using OSINT in times of social unrest
 
Urban Topic- Cycpercities and china's censorship
Urban Topic- Cycpercities and china's censorshipUrban Topic- Cycpercities and china's censorship
Urban Topic- Cycpercities and china's censorship
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
 
Internet use in Social Activism in Taiwan, 2014 ISA Congress, Yokohama
Internet use in Social Activism in Taiwan,  2014 ISA Congress, YokohamaInternet use in Social Activism in Taiwan,  2014 ISA Congress, Yokohama
Internet use in Social Activism in Taiwan, 2014 ISA Congress, Yokohama
 
E era ir-us-fp
E era ir-us-fpE era ir-us-fp
E era ir-us-fp
 
Zapatistas and online activism
Zapatistas and online activismZapatistas and online activism
Zapatistas and online activism
 
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docxBriefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
Briefly define cyber-terrorism. Define hacktivism. Illustrate ex.docx
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...
 
Sunshine 2.0: Using Technology for Democracy
Sunshine 2.0: Using Technology for DemocracySunshine 2.0: Using Technology for Democracy
Sunshine 2.0: Using Technology for Democracy
 
Cyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxCyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docx
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Political Communication In CMC (Internet Activism & Hacktivism

  • 1. Political Communication In CMC (Internet Activism & Hacktivism) Alexander Katzmaier
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.