Industrialising Blackmail: Privacy Invasion Based IoT Ransomware

2021 ◽  
pp. 72-92
Author(s):  
Calvin Brierley ◽  
Budi Arief ◽  
David Barnes ◽  
Julio Hernandez-Castro
Keyword(s):  
Author(s):  
Robert Spoo

This chapter offers an overview of a genre that has attracted little attention qua genre: the legal paratext. Gérard Genette likened the paratext to a vestibule that operates as a zone of transition and transaction, a liminal space that prepares the reader’s experience of the text. Yet there are other, more cautionary paratexts that crowd, often invisibly, the vestibules of books and other cultural forms. This chapter surveys the transatlantic (American and British) repertoire of legal paratexts appearing in books, including copyright notices, once mandatory in the United States but now permissive there and in many countries; statements of US manufacture, deriving from a period in American publishing when copyright protection turned on strict compliance with the statutory requirement that books be physically manufactured on US soil; “all characters are fictitious” disclaimers, which urge readers to put aside their instinct to sue for libel or for privacy invasion and to engage with the text as a fictive and aesthetic creation; “no-obscenity” statements—a feature of many controversial modernist works—which seek to discourage official attempts at censorship and assure readers that books have been or are likely to be deemed by a court to be safe for consumption. Legal paratexts continue to crowd the vestibules of books, movies, musical recordings, and other works, warning readers, scolding them, and attempting to regulate their behavior in accordance with legal and corporate norms. They are linked to other literary genres, such as parody, satire, the apologia, and the palinode.


2013 ◽  
Vol 19 ◽  
pp. 39-46
Author(s):  
Bo Zhao

The internet and other new technologies have changed personal reputation fundamentally, as seen in many similar cases regarding online defamation and privacy invasion. These changes include: a) digital reputation becomes the prevailing form of personal reputation with new characteristics; b) traditional reputational networks have been updated to online networks; c) therefore the ways for individuals to establish, maintain and defend reputations are altered in the new environment; and d) many social functions traditionally played by personal reputation have been challenged by the development of digital reputation. This article tries to provide a brief analysis of such changes and sound the warning bell. We, as citizens of the new Database Nation, have to be fully aware of such changes in order to avoid potential harms while enjoying the benefits of the information age.


Author(s):  
Pushkala Raman ◽  
Kartik Pashupati

The primary research objectives of this chapter are to: (a) investigate consumer attitudes to the invasion of online privacy, and (b) discover coping strategies used by consumers when they are online. Using a grounded theory approach, a framework of how consumers deal with online privacy concerns was developed from the analysis of six focus groups across gender and age segments. The framework suggests that people differ in their level of self-perceived technological competence (SPTC), which in turn determines their level of concern and coping strategies used. We define SPTC as a subjective self-rating of how much individuals know about technology, and how comfortable they feel with it. The level of SPTC appears to differentiate the online behaviors and privacy concerns of consumers. People with low levels of SPTC tend to be more concerned about privacy invasion, feel more comfortable with offline interactions, reduce their Internet usage, and seek regulatory solutions to privacy invasion threats. People with higher levels of SPTC are more willing to accept the risks of being online, and tend to be cautious in their online dealings without foregoing the benefits of the Internet. This group is also more likely to know about and use features such as security locks, and Internet seals of approval.


2009 ◽  
Vol 23 (4) ◽  
pp. 511-520 ◽  
Author(s):  
Skyler T. Hawk ◽  
Loes Keijsers ◽  
William W. Hale ◽  
Wim Meeus

Sign in / Sign up

Export Citation Format

Share Document