Loading ...

Blob

Smart Reasoning:

C&E

See more*

Qaagi - Book of Why

Causes

Effects

The impact of these online protests , combined with the growing presence of groups such as “ Anonymous ” and the popularity of Julian Assange and Wikilieakshas ledhacktivism

real world events(passive) can be caused byhacktivism

the organisation 's attempts to pull a promotional video featuring Scientologist Tom Cruise from YouTube(passive) prompted byhacktivism

The vast lack of understanding of the technology used to do everyday things but alsoleadshacktivism

to rise in the wake of Julian Assange ’s WikiLeaks , as politically - motivated attacks grow in number and organize themselves through social networks(passive) is also setHacktivism

disruptive social groups like Anonymous(passive) created byhacktivism

AWS Console(passive) automatically created byhttps://gist.github.com/apun/8f8c0c0cbea38d7e0bdc

the Cult of the Dead Cow ( cDc ) , an opinion leader in the computer underground(passive) was invented byHacktivism

for North America(passive) was createdhacktivism

to take advantage of the new features these programs provide(passive) is designedAgencyofRecord.com

naturally(passive) was ... designedSavasi

cause for compromised data in 2011PR Newswire : 2011was leadingcause for compromised data in 2011PR Newswire : 2011

cause for compromised data in 2011Dave Neal / Inquirerwas leadingcause for compromised data in 2011Dave Neal / Inquirer

cybersecurity reform ” ( PDFcan ... should influencecybersecurity reform ” ( PDF

cause for compromised data in 2011Nathan Eddywas leadingcause for compromised data in 2011Nathan Eddy

Other noticeable events(passive) triggered byOther noticeable events

reputation damage and unwanted publicitycausingreputation damage and unwanted publicity

collateral damage whose guild is paid by the innocentcausescollateral damage whose guild is paid by the innocent

from China due to events that are politically sensitiveoriginatesfrom China due to events that are politically sensitive

the next big security breach with intent of malicious damage as opposed to just exposing cybersecurity flawscausingthe next big security breach with intent of malicious damage as opposed to just exposing cybersecurity flaws

global policy in the hacktivisminfluencingglobal policy in the hacktivism

above employee grade new threats within — one of the most New , hacktivist threats within existcreatesabove employee grade new threats within — one of the most New , hacktivist threats within exist

protests Hackers in this documentary are n’t the kind who steal from your online bank accountsparksprotests Hackers in this documentary are n’t the kind who steal from your online bank account

as a concept in the late 90 'soriginatedas a concept in the late 90 's

the path for people to do somethingcreatesthe path for people to do something

hysteria when the Wikileaks group posted classified US military files in a similar wayhas causedhysteria when the Wikileaks group posted classified US military files in a similar way

cyber security reformcan ... should influencecyber security reform

an ethical dilemmahas causedan ethical dilemma

to conduct sabotage or demonstrate intentions motivated by social or political concernsis designedto conduct sabotage or demonstrate intentions motivated by social or political concerns

some private groups to infiltrate oil and gas companies on supposedly altruistic groundshas ledsome private groups to infiltrate oil and gas companies on supposedly altruistic grounds

a high level of embarrassment that goes beyond corporate press releases about data breaches , or identity theftcreatesa high level of embarrassment that goes beyond corporate press releases about data breaches , or identity theft

to increase in 2016setto increase in 2016

probablycontributedprobably

to the report 's finding that 98 percent of all attacks were committed by outsidersprobably contributedto the report 's finding that 98 percent of all attacks were committed by outsiders

to a massive change in societyCan ... leadto a massive change in society

on secure networksoriginatingon secure networks

quite a stircan causequite a stir

to the peak in malware numberscontributingto the peak in malware numbers

some real problems for the private and public sectorcan causesome real problems for the private and public sector

to pose greater risksetto pose greater risk

to crash websitesdesignedto crash websites

direct harm to reputationcausesdirect harm to reputation

great stress upon many innocent people as its overall a negative contribution to societycan causegreat stress upon many innocent people as its overall a negative contribution to society

growing concern Tressler LLPcausesgrowing concern Tressler LLP

to be a key risk in 2016setto be a key risk in 2016

Blob

Smart Reasoning:

C&E

See more*