{"id":"https://openalex.org/W2594418606","doi":"https://doi.org/10.1108/jices-09-2016-0033","title":"Booters: can anything justify distributed denial-of-service (DDoS) attacks for hire?","display_name":"Booters: can anything justify distributed denial-of-service (DDoS) attacks for hire?","publication_year":2017,"publication_date":"2017-03-13","ids":{"openalex":"https://openalex.org/W2594418606","doi":"https://doi.org/10.1108/jices-09-2016-0033","mag":"2594418606"},"language":"en","primary_location":{"id":"doi:10.1108/jices-09-2016-0033","is_oa":false,"landing_page_url":"https://doi.org/10.1108/jices-09-2016-0033","pdf_url":null,"source":{"id":"https://openalex.org/S102320310","display_name":"Journal of Information Communication and Ethics in Society","issn_l":"1477-996X","issn":["1477-996X","1758-8871"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Information, Communication and Ethics in Society","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ris.utwente.nl/ws/files/124119230/JICES_09_2016_0033.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059367367","display_name":"David Douglas","orcid":"https://orcid.org/0000-0003-2448-871X"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]},{"id":"https://openalex.org/I130442723","display_name":"Universidade Federal do Rio Grande do Sul","ror":"https://ror.org/041yk2d64","country_code":"BR","type":"education","lineage":["https://openalex.org/I130442723"]}],"countries":["BR","NL"],"is_corresponding":true,"raw_author_name":"David Douglas","raw_affiliation_strings":["Universiteit Twente, Philosophy, Enschede, The Netherlands","Institute of Informatics, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil,","Department of Electrical Engineering, Mathematics and Computer Science (EWI), Universiteit Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Universiteit Twente, Philosophy, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]},{"raw_affiliation_string":"Institute of Informatics, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil,","institution_ids":["https://openalex.org/I130442723"]},{"raw_affiliation_string":"Department of Electrical Engineering, Mathematics and Computer Science (EWI), Universiteit Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044310143","display_name":"Jos\u00e9 Jair Santanna","orcid":"https://orcid.org/0000-0002-8361-6729"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]},{"id":"https://openalex.org/I130442723","display_name":"Universidade Federal do Rio Grande do Sul","ror":"https://ror.org/041yk2d64","country_code":"BR","type":"education","lineage":["https://openalex.org/I130442723"]}],"countries":["BR","NL"],"is_corresponding":false,"raw_author_name":"Jos\u00e9 Jair Santanna","raw_affiliation_strings":["Department of Electrical Engineering, Mathematics and Computer Science (EWI), Universiteit Twente, Enschede, The Netherlands","Institute of Informatics, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil,","Universiteit Twente, Philosophy, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Mathematics and Computer Science (EWI), Universiteit Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]},{"raw_affiliation_string":"Institute of Informatics, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil,","institution_ids":["https://openalex.org/I130442723"]},{"raw_affiliation_string":"Universiteit Twente, Philosophy, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111930228","display_name":"Ricardo de O. Schmidt","orcid":null},"institutions":[{"id":"https://openalex.org/I130442723","display_name":"Universidade Federal do Rio Grande do Sul","ror":"https://ror.org/041yk2d64","country_code":"BR","type":"education","lineage":["https://openalex.org/I130442723"]},{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["BR","NL"],"is_corresponding":false,"raw_author_name":"Ricardo de Oliveira Schmidt","raw_affiliation_strings":["Department of Electrical Engineering, Mathematics and Computer Science (EWI), Universiteit Twente, Enschede, The Netherlands","Universiteit Twente, Philosophy, Enschede, The Netherlands","Institute of Informatics, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil,"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Mathematics and Computer Science (EWI), Universiteit Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]},{"raw_affiliation_string":"Universiteit Twente, Philosophy, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]},{"raw_affiliation_string":"Institute of Informatics, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil,","institution_ids":["https://openalex.org/I130442723"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069321002","display_name":"Lisandro Zambenedetti Granville","orcid":"https://orcid.org/0000-0001-8956-8660"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]},{"id":"https://openalex.org/I130442723","display_name":"Universidade Federal do Rio Grande do Sul","ror":"https://ror.org/041yk2d64","country_code":"BR","type":"education","lineage":["https://openalex.org/I130442723"]}],"countries":["BR","NL"],"is_corresponding":false,"raw_author_name":"Lisandro Zambenedetti Granville","raw_affiliation_strings":["Institute of Informatics, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil","Universiteit Twente, Philosophy, Enschede, The Netherlands","Institute of Informatics, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil,","Department of Electrical Engineering, Mathematics and Computer Science (EWI), Universiteit Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Institute of Informatics, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil","institution_ids":["https://openalex.org/I130442723"]},{"raw_affiliation_string":"Universiteit Twente, Philosophy, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]},{"raw_affiliation_string":"Institute of Informatics, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil,","institution_ids":["https://openalex.org/I130442723"]},{"raw_affiliation_string":"Department of Electrical Engineering, Mathematics and Computer Science (EWI), Universiteit Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067140003","display_name":"Aiko Pras","orcid":"https://orcid.org/0000-0002-5091-8608"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]},{"id":"https://openalex.org/I130442723","display_name":"Universidade Federal do Rio Grande do Sul","ror":"https://ror.org/041yk2d64","country_code":"BR","type":"education","lineage":["https://openalex.org/I130442723"]}],"countries":["BR","NL"],"is_corresponding":false,"raw_author_name":"Aiko Pras","raw_affiliation_strings":["Department of Electrical Engineering, Mathematics and Computer Science (EWI), Universiteit Twente, Enschede, The Netherlands","Universiteit Twente, Philosophy, Enschede, The Netherlands","Institute of Informatics, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil,"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Mathematics and Computer Science (EWI), Universiteit Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]},{"raw_affiliation_string":"Universiteit Twente, Philosophy, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]},{"raw_affiliation_string":"Institute of Informatics, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil,","institution_ids":["https://openalex.org/I130442723"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5059367367"],"corresponding_institution_ids":["https://openalex.org/I130442723","https://openalex.org/I94624287"],"apc_list":null,"apc_paid":null,"fwci":10.1138,"has_fulltext":true,"cited_by_count":14,"citation_normalized_percentile":{"value":0.97626052,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"15","issue":"01","first_page":"90","last_page":"104"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8080596923828125},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.679268479347229},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.6144030094146729},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.6015787124633789},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.5905594825744629},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5649738907814026},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.5535915493965149},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.5358012914657593},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5338519811630249},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5260289311408997},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.47982215881347656},{"id":"https://openalex.org/keywords/denial","display_name":"Denial","score":0.45999276638031006},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4591156840324402},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.43502023816108704},{"id":"https://openalex.org/keywords/proof-of-work-system","display_name":"Proof-of-work system","score":0.4335036277770996},{"id":"https://openalex.org/keywords/dishonesty","display_name":"Dishonesty","score":0.43304091691970825},{"id":"https://openalex.org/keywords/legitimacy","display_name":"Legitimacy","score":0.4152362048625946},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.39679884910583496},{"id":"https://openalex.org/keywords/law-and-economics","display_name":"Law and economics","score":0.3419191241264343},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.32980161905288696},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.28918778896331787},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.1933298110961914},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.19039052724838257},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.1512872278690338},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.1171274185180664},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11366763710975647},{"id":"https://openalex.org/keywords/politics","display_name":"Politics","score":0.10828688740730286}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8080596923828125},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.679268479347229},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.6144030094146729},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.6015787124633789},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.5905594825744629},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5649738907814026},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.5535915493965149},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.5358012914657593},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5338519811630249},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5260289311408997},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.47982215881347656},{"id":"https://openalex.org/C2780900520","wikidata":"https://www.wikidata.org/wiki/Q100268981","display_name":"Denial","level":2,"score":0.45999276638031006},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4591156840324402},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.43502023816108704},{"id":"https://openalex.org/C123436394","wikidata":"https://www.wikidata.org/wiki/Q7249984","display_name":"Proof-of-work system","level":3,"score":0.4335036277770996},{"id":"https://openalex.org/C2778585151","wikidata":"https://www.wikidata.org/wiki/Q5282225","display_name":"Dishonesty","level":2,"score":0.43304091691970825},{"id":"https://openalex.org/C46295352","wikidata":"https://www.wikidata.org/wiki/Q207982","display_name":"Legitimacy","level":3,"score":0.4152362048625946},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.39679884910583496},{"id":"https://openalex.org/C190253527","wikidata":"https://www.wikidata.org/wiki/Q295354","display_name":"Law and economics","level":1,"score":0.3419191241264343},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.32980161905288696},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.28918778896331787},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.1933298110961914},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.19039052724838257},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.1512872278690338},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.1171274185180664},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11366763710975647},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.10828688740730286},{"id":"https://openalex.org/C11171543","wikidata":"https://www.wikidata.org/wiki/Q41630","display_name":"Psychoanalysis","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1108/jices-09-2016-0033","is_oa":false,"landing_page_url":"https://doi.org/10.1108/jices-09-2016-0033","pdf_url":null,"source":{"id":"https://openalex.org/S102320310","display_name":"Journal of Information Communication and Ethics in Society","issn_l":"1477-996X","issn":["1477-996X","1758-8871"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Information, Communication and Ethics in Society","raw_type":"journal-article"},{"id":"pmh:oai:ris.utwente.nl:openaire/a70c76f3-62a7-4bc8-9c68-4bf75dae0a64","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/a70c76f3-62a7-4bc8-9c68-4bf75dae0a64","pdf_url":"https://ris.utwente.nl/ws/files/124119230/JICES_09_2016_0033.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Douglas, D, Santanna, J J, de Oliveira Schmidt, R, Granville, L Z & Pras, A 2017, 'Booters : can anything justify distributed denial-of-service (DDoS) attacks for hire?', Journal of information, communication and ethics in society, vol. 15, no. 1, pp. 90-104. https://doi.org/10.1108/JICES-09-2016-0033","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:ris.utwente.nl:publications/a70c76f3-62a7-4bc8-9c68-4bf75dae0a64","is_oa":false,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85016251211&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"pmh:oai:ris.utwente.nl:openaire/a70c76f3-62a7-4bc8-9c68-4bf75dae0a64","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/a70c76f3-62a7-4bc8-9c68-4bf75dae0a64","pdf_url":"https://ris.utwente.nl/ws/files/124119230/JICES_09_2016_0033.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Douglas, D, Santanna, J J, de Oliveira Schmidt, R, Granville, L Z & Pras, A 2017, 'Booters : can anything justify distributed denial-of-service (DDoS) attacks for hire?', Journal of information, communication and ethics in society, vol. 15, no. 1, pp. 90-104. https://doi.org/10.1108/JICES-09-2016-0033","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"score":0.800000011920929,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2594418606.pdf","grobid_xml":"https://content.openalex.org/works/W2594418606.grobid-xml"},"referenced_works_count":7,"referenced_works":["https://openalex.org/W873866","https://openalex.org/W2001438903","https://openalex.org/W2006803027","https://openalex.org/W2032991243","https://openalex.org/W2083895322","https://openalex.org/W2159334009","https://openalex.org/W2164322841"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W2038807247","https://openalex.org/W1968168724","https://openalex.org/W4286539397","https://openalex.org/W1754340081","https://openalex.org/W2095378509","https://openalex.org/W2097156747","https://openalex.org/W4230824443","https://openalex.org/W2559738661","https://openalex.org/W3139424672"],"abstract_inverted_index":{"Purpose":[0],"This":[1],"paper":[2],"aims":[3],"to":[4,29,38,82,102,112,217],"examine":[5],"whether":[6],"there":[7],"are":[8,90],"morally":[9,139],"defensible":[10],"reasons":[11],"for":[12,31,94,249],"using":[13,86,250,263],"or":[14,146],"operating":[15,84,252],"websites":[16,59,254],"(called":[17],"\u2018booters\u2019)":[18],"that":[19,76,88,107,129,158,176,196,200],"offer":[20],"distributed":[21],"denial-of-service":[22],"(DDoS)":[23],"attacks":[24,45,115,232,265],"on":[25,122,233],"a":[26,32,91,117,148,174,267],"specified":[27],"target":[28],"users":[30],"price.":[33],"Booters":[34],"have":[35],"been":[36],"linked":[37],"some":[39],"of":[40,98,119,132,150,156,164,170,223,230,239,262,269],"the":[41,53,61,68,73,96,123,130,162,168,193,213,221,228,234,246,259],"most":[42],"powerful":[43],"DDoS":[44,114,231,264],"in":[46,186,243,256],"recent":[47],"years.":[48],"Design/methodology/approach":[49],"The":[50,126,154,237],"authors":[51,69,127,194],"identify":[52],"various":[54],"parties":[55],"associated":[56],"with":[57],"booter":[58,175,253],"and":[60,71,85,100,106,225,251,255],"means":[62,149],"through":[63],"which":[64],"booters":[65,134,203],"operate.":[66],"Then,":[67],"present":[70],"evaluate":[72],"two":[74],"arguments":[75,214],"they":[77,89,108],"claim":[78],"may":[79,109,211],"be":[80,110,188],"used":[81,111],"justify":[83,218],"booters:":[87],"useful":[92],"tool":[93],"testing":[95,144],"ability":[97],"networks":[99],"servers":[101],"handle":[103],"heavy":[104],"traffic,":[105],"perform":[113],"as":[116,141,147,266],"form":[118,268],"civil":[120,152,270],"disobedience":[121],"internet.":[124,235],"Findings":[125],"argue":[128,195],"characteristics":[131],"existing":[133,202],"disqualify":[135],"them":[136],"from":[137],"being":[138],"justified":[140,189],"network":[142],"stress":[143],"tools":[145],"performing":[151],"disobedience.":[153,271],"use":[155,179,212],"botnets":[157],"include":[159],"systems":[160,182],"without":[161,183],"permission":[163,184],"their":[165],"owners":[166],"undermines":[167],"legitimacy":[169],"both":[171],"justifications.":[172],"While":[173],"does":[177],"not":[178],"any":[180,201],"third-party":[181],"might":[185],"principle":[187],"under":[190],"certain":[191],"conditions,":[192],"it":[197],"is":[198,242],"unlikely":[199],"meet":[204],"these":[205],"requirements.":[206],"Practical/implications":[207],"Law":[208],"enforcement":[209],"agencies":[210],"presented":[215],"here":[216],"shutting":[219],"down":[220],"operation":[222],"booters,":[224],"so":[226],"reduce":[227],"number":[229],"Originality/value":[236],"value":[238],"this":[240],"work":[241],"critically":[244],"examining":[245],"potential":[247],"justifications":[248],"further":[257],"exploring":[258],"ethical":[260],"aspects":[261]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3}],"updated_date":"2026-03-16T09:10:04.655348","created_date":"2025-10-10T00:00:00"}
