{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T03:20:18Z","timestamp":1771903218935,"version":"3.50.1"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030036379","type":"print"},{"value":"9783030036386","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03638-6_20","type":"book-chapter","created":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T03:12:53Z","timestamp":1541041973000},"page":"323-335","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["PESTEL Analysis of Hacktivism Campaign Motivations"],"prefix":"10.1007","author":[{"given":"Juha","family":"Nurmi","sequence":"first","affiliation":[]},{"given":"Mikko S.","family":"Niemel\u00e4","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,2]]},"reference":[{"key":"20_CR1","unstructured":"Bakri, N.A.M., et al.: Pestle analysis on cloud computing"},{"key":"20_CR2","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/S1353-4858(15)30039-8","volume":"5","author":"T Caldwell","year":"2015","unstructured":"Caldwell, T.: Hacktivism goes hardcore. Netw. Secur. 5, 12\u201317 (2015)","journal-title":"Netw. Secur."},{"key":"20_CR3","unstructured":"Casey, T.: Threat agent library helps identify information security risks. Intel White Paper (2007)"},{"key":"20_CR4","unstructured":"Commission, E.: Towards a general policy on the fight against cyber crime. Technical report, COM (2007) 267 final (2007). \n\t\t\t\t\t\thttp:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=COM:2007:0267:FIN:EN:PDF"},{"issue":"4","key":"20_CR5","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1177\/135676670000600406","volume":"6","author":"C Dale","year":"2000","unstructured":"Dale, C.: The uk tour-operating industry: a competitive analysis. J. Vacation Mark. 6(4), 357\u2013367 (2000)","journal-title":"J. Vacation Mark."},{"issue":"5","key":"20_CR6","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MSP.2007.108","volume":"5","author":"Roger Dingledine","year":"2007","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Deploying low-latency anonymity: design challenges and social factors. IEEE Secur. Privacy 5(5), 83\u201387 (2007). \n\t\t\t\t\t\thttps:\/\/doi.org\/10.1109\/MSP.2007.108","journal-title":"IEEE Security & Privacy Magazine"},{"key":"20_CR7","unstructured":"G\u00f3mez-Romero, J., Ruiz, M.D., Mart\u00edn-Bautista, M.J.: Open data analysis for environmental scanning in security-oriented strategic analysis. In: 2016 19th International Conference on Information Fusion (FUSION), pp. 91\u201397. IEEE (2016)"},{"issue":"3","key":"20_CR8","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/636772.636774","volume":"46","author":"LA Gordon","year":"2003","unstructured":"Gordon, L.A., Loeb, M.P., Sohail, T.: A framework for using insurance for cyber-risk management. Commun. ACM 46(3), 81\u201385 (2003)","journal-title":"Commun. ACM"},{"issue":"3","key":"20_CR9","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1080\/03637751.2015.1030682","volume":"82","author":"AG Klein","year":"2015","unstructured":"Klein, A.G.: Vigilante media: unveiling anonymous and the hacktivist persona in the global press. Commun. Monogr. 82(3), 379\u2013401 (2015)","journal-title":"Commun. Monogr."},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.cose.2014.05.006","volume":"45","author":"M Lagazio","year":"2014","unstructured":"Lagazio, M., Sherif, N., Cushman, M.: A multi-level approach to understanding the impact of cyber crime on the financial sector. Comput. Secur. 45, 58\u201374 (2014)","journal-title":"Comput. Secur."},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1007\/978-3-319-64701-2_52","volume-title":"Network and System Security","author":"J Nurmi","year":"2017","unstructured":"Nurmi, J., Niemel\u00e4, M.S.: Tor de-anonymisation techniques. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds.) NSS 2017. LNCS, vol. 10394, pp. 657\u2013671. Springer, Cham (2017). \n\t\t\t\t\t\thttps:\/\/doi.org\/10.1007\/978-3-319-64701-2_52"},{"key":"20_CR12","unstructured":"Published by BBC: Anonymous hackers \u2018cost PayPal 3.5m\u2019 (2012). \n\t\t\t\t\t\thttp:\/\/www.bbc.com\/news\/uk-20449474"},{"key":"20_CR13","unstructured":"Published by Der Spiegel: State Department Secrets Revealed, How America Views the World (2010). \n\t\t\t\t\t\thttp:\/\/www.spiegel.de\/international\/world\/state-department-secrets-revealed-how-america-views-the-world-a-732819.html"},{"key":"20_CR14","unstructured":"Published by Der Spiegel: Visa, MasterCard Move To Choke WikiLeaks (2010). \n\t\t\t\t\t\thttps:\/\/www.forbes.com\/sites\/andygreenberg\/2010\/12\/07\/visa-mastercard-move-to-choke-wikileaks\/"},{"key":"20_CR15","unstructured":"Published by The Guardian: Cyber cold war is just getting started, claims Hillary Clinton (2017). \n\t\t\t\t\t\thttps:\/\/www.theguardian.com\/us-news\/2017\/oct\/16\/cyber-cold-war-is-just-getting-started-claims-hillary-clinton"},{"issue":"2","key":"20_CR16","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1177\/0340035206066410","volume":"32","author":"JV Richardson Jr","year":"2006","unstructured":"Richardson Jr., J.V.: The library and information economy in turkmenistan. IFLA J. 32(2), 131\u2013139 (2006)","journal-title":"IFLA J."},{"issue":"5","key":"20_CR17","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1108\/02756661011076291","volume":"31","author":"NT Sheehan","year":"2010","unstructured":"Sheehan, N.T.: A risk-based approach to strategy execution. J. Bus. Strategy 31(5), 25\u201337 (2010)","journal-title":"J. Bus. Strategy"},{"issue":"5","key":"20_CR18","doi-asserted-by":"publisher","first-page":"718","DOI":"10.1016\/j.clsr.2017.03.024","volume":"33","author":"R Solomon","year":"2017","unstructured":"Solomon, R.: Electronic protests: hacktivism as a form of protest in uganda. Comput. Law Secur. Rev. 33(5), 718\u2013728 (2017)","journal-title":"Comput. Law Secur. Rev."},{"key":"20_CR19","volume-title":"Digital Crime and Digital Terrorism","author":"RW Taylor","year":"2014","unstructured":"Taylor, R.W., Fritsch, E.J., Liederbach, J.: Digital Crime and Digital Terrorism. Prentice Hall Press, New Jersey (2014)"},{"key":"20_CR20","unstructured":"The Tor Project Foundation. \n\t\t\t\t\t\thttps:\/\/www.torproject.org\/"},{"key":"20_CR21","unstructured":"UN: United Nations Office on Drugs and Crime the SOCTA Handbook Guidance on the preparation and use of serious and organized crime threat. United Nations Office on Drugs and Crime (2010)"},{"key":"20_CR22","doi-asserted-by":"publisher","DOI":"10.4324\/9780203299180","volume-title":"Crime and the Internet","author":"D Wall","year":"2003","unstructured":"Wall, D.: Crime and the Internet. Routledge, London (2003)"},{"key":"20_CR23","volume-title":"Cybercrime and Society","author":"M Yar","year":"2013","unstructured":"Yar, M.: Cybercrime and Society. Sage, London (2013)"},{"issue":"24","key":"20_CR24","doi-asserted-by":"publisher","first-page":"52","DOI":"10.5539\/ijbm.v7n24p52","volume":"7","author":"\u0130 Y\u00fcksel","year":"2012","unstructured":"Y\u00fcksel, \u0130.: Developing a multi-criteria decision making model for pestel analysis. Int. J. Bus. Manag. 7(24), 52 (2012)","journal-title":"Int. J. Bus. Manag."}],"container-title":["Lecture Notes in Computer Science","Secure IT Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03638-6_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T03:20:12Z","timestamp":1541042412000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-03638-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030036379","9783030036386"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03638-6_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"NordSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nordic Conference on Secure IT Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nordsec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securitylab.no\/nordsec18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"81","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}