H. Choi, B. B. Zhu, and H. Lee, “Detecting malicious web links and identifying their attack types.” USENIX Conference on Web Application Development 2011, 2011. [Online]. Available: http://research.microsoft.com/apps/pubs/default.aspx?id=193308
 S. Afroz and R. Greenstadt, “Phishzoo: Detecting phishing websites by looking at them,” in Fifth IEEE International Conference on Semantic Computing (ICSC) . IEEE, 2011, pp. 368–375.
 “Reflecting on Ten Years of Practice: The Challenges of Digital Security Training for HumanRights
Addressable Network. – IEICE Transactions on Information and Systems, Vol. 89 , 2006, No 6, pp. 1923-1930.
11. Barbera, P. Birds of the Same Feather Tweet Together: Bayesian Ideal Point Estimation Using Twitter Data. – Political Analysis, Vol. 23 , 2015, No 1, pp. 76-91.
12. Gao, H. A Case Study on Trade, Technology and HumanRights under the Gats. – Asian Journal of Wto & International Health Law and Policy, Vol. 6 , 2011, No 2, pp. 349-387.
13. Corbett, J. C., J. Dean, M. Epstein. Spanner: Google’s Globally Distributed Database. – ACM Transactions on
Just over twenty-three years ago, the right to strike or protest received an explicit constitutional entrenchment and thus, legal protection. This would progressively empower citizens, including students, to protest against any infringement or deprivation of their rights or entitlements, and poor service delivery by any stakeholder in the institutions of learning, the government or private sector even. Today, South Africa is inundated with multiplicity of nationwide protests, most of which have been accompanied by appalling levels of violence, anarchy and criminality. Unexpectedly, students have had their share in such protests, and it could be argued, they have been an inspiration to various communities. Hence, this article proffers a critical reflection of the conduct of students during protests at the institutions of higher learning. The article seeks to understand and or explain variables that motivate students to vandalise property or antagonise those that opt to be passive or non-participants of such protests. In comparison to variables identified concerning the 1976 student protests, which were ideologically well grounded, the article attempts to describe contemporary students’ thinking towards protests and why vandalism and anarchism have become, not only conventional, but so intensely socialised. The article adopts content analysis method, and employs crowd theory and collective behaviour approach as tools of analysis. It is asserted that lack of ideological strategy underpinning South Africa’s unending revolution, which is needed to inform students’ struggles, is responsible for pervasive tendencies of vandalism and destruction of property during student protests.
Stephen Carley, Alan L. Porter, Ismael Rafols and Loet Leydesdorff
London School Economics & Political Science) OR (LSE AND London School Economics & Political Science) OR (LSE CTR STUDY HUMANRIGHTS AND London School Economics & Political Science) OR (LSE DEPT INT RELAT AND London School Economics & Political Science) OR (LSE FINANCIAL MKT GRP AND London School Economics & Political Science) OR (LSE GENDER INST AND London School Economics & Political Science) OR (LSE GLOBAL GOVERNANCE AND London School Economics & Political Science) OR (LSE HLTH AND London School Economics & Political Science) OR (LSE HLTH SOCIAL CARE AND London
Luís T. A. N. Brandão, Nicolas Christin, George Danezis and Anonymous
 European Court of HumanRights. European Convention on HumanRights, Entry into force on June 2010. (As amended by Protocols No. 11 and 14; supplemented by Protocols Nos. 1,4,6,7 and 13.) PDF file (30 pages) – echr.coe.int website. SHA256: .
 Federal Chief Information Officers Council and Federal Enterprise Architecture. Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance – Version 2.0, December 2, 2011. PDF file (478 pages) – idmanagement.gov website. SHA256: .
 T. K. Frederiksen, T
. https://metrics.torproject.org/ . Accessed September 2018.
 The Tor Project. Who Uses Tor? https://www.torproject.org/about/torusers.html.en . Accessed September 2018.
 United Nations. Universal Declaration of HumanRights (Article 12), 1948. http://www.un.org/en/universal-declaration-human-rights/ . Accessed September 2018.
 C. Wacek, H. Tan, K. S. Bauer, and M. Sherr. An Empirical Evaluation of Relay Selection in Tor. In 20th Network and Distributed System Security Symposium (NDSS) , 2013.
 D. S. Wallach. A Survey of Peer
Roya Ensafi, Philipp Winter, Abdullah Mueen and Jedidiah R. Crandall
 Tokachu. The not-so-great firewall of China. 2600 Magazine, Winter 2006-2007.
 TorStatus. Tor network status. http://torstatus.blutmagie. de.
 G. Walton. China’s golden shield : corporations and the development of surveillance technology in the People’s Republic of China. International Centre for HumanRights and Democratic Development, 2001.
 Y. A. Wang, C. Huang, J. Li, and K. W. Ross. Queen: Estimating packet loss rate between arbitrary internet hosts. In Passive and Active Network Measurement
Susan E. McGregor, Franziska Roesner and Kelly Caine
Times, February 2013. [Online]. Available: http://www.nytimes.com/2013/02/02/technology/washington-posts-joins-list-ofmedia-hacked-by-the-chinese.html?_r=0
 -, “Wall Street Journal Announces That It, Too, Was Hacked by the Chinese,” The New York Times, January 2013. [Online]. Available: http://www.nytimes.com/2013/02/01/technology/wall-street-journal-reports-attackby-china-hackers.html?ref=technology
 HumanRights Watch, “With Liberty to Monitor All: How Large-Scale US Surveillance is Harming Journalism, Law, and American
Esingbemi Princewill Ebietomere and Godspower Osaretin Ekuobase
Administrative Law Theory”, Africa Focus , vol. 14, no. 2, pp. 119–140, 1998. https://doi.org/10.21825/af.v14i2.5549
 W. Lacey, “Judicial Discretion and HumanRights: Expanding the Role of International Law in the Domestic Sphere,” Melbourne Journal of International Law, vol. 5, no. 25, 2004.
 J. Franklin, “Discussion paper: how much of commonsense and legal reasoning is formalizable? A review of conceptual obstacles,” Law, Probability and Risk , vol. 11, no. 2-3, pp. 225–245, 2012. https://doi.org/10.1093/lpr/mgs007
 E. P. Ebietomere, and G
Buchanan-Smith, M. & Cosgrave, J. (2013). Evaluation of Humanitarian Action: Pilot Guide. The Active Learning Network for Accountability and Performance in Humanitarian Action (ALNAP), London: Overseas Development Institute.
Burges, J.P. (2002). Ethics of Humanitarian Intervention: The Circle Closes. Security Dialogue, 33(3), 261-264.
Clark, D.A. (2005). Sen’s capability approach and the many spaces of human well-being. The Journal of Development Studies, 41(8), 1339-1368.
Darcy, J. (2004). HumanRights and Humanitarian