Towards a Cyber-Destructors Assessment Method

This chapter shows the first results of a technique based on the information from Web 2.0 that can speedily and economically detect the networks or people who play, anonymously or not, the role of cyberdestroyers. The group of presented examples is useful to probe the modus operandi of the cyberdestroyers of the online information systems and the democratic promotion of scientific knowledge in the future generations of users of interactive systems both online and offline. Finally, the chapter reveals the main patterns of behaviour of a cyberdestroyer in the context of social networks.