Academic literature on the topic 'Computer hackers. Culture and technology'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer hackers. Culture and technology.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer hackers. Culture and technology"

1

Lakshmi, Aiswarya. "Study on Data Journalism in Tamilnadu & the Challenges." International Journal of Innovative Science and Research Technology 5, no. 6 (2020): 1105–11. http://dx.doi.org/10.38124/ijisrt20jun715.

Full text
Abstract:
When Digital technology brought online journalism and new practices into newsrooms that made a huge impact on Indian newsrooms articles that lead to different perspective stories which gave a lot of space for creativity, this allowed every citizen to become online journalist that was a great milestone in digital evolution. But, when the news credibility in online journalism gradually fell, many journalist and publishers worried that admired principles of news reporting, experience and intuition might decline or even disappear. On the other hand, they fail to realise that this will empower jour
APA, Harvard, Vancouver, ISO, and other styles
2

Guo, Boyu. "Why Hackers Become Crackers – An Analysis of Conflicts Faced by Hackers." Public Administration Research 5, no. 1 (2016): 29. http://dx.doi.org/10.5539/par.v5n1p29.

Full text
Abstract:
<p>Hacker culture is generally regarded as a subculture, and the public has a high degree of misunderstanding towards hackers. The media reports sometimes depict hackers overly negatively, possibly because hackers could gain a dominant position in the age of information and, therefore, threaten the existing balance of social power distribution. Moreover, those reports, whether intentionally or not, misunderstand the meaning of “hackers”: “Hackers” are people who want to identify and solve problems directly and effectively, but “crackers” are those who cause problems for society.</p&gt
APA, Harvard, Vancouver, ISO, and other styles
3

Foster, Ellen K. "Claims of Equity and Expertise: Feminist Interventions in the Design of DIY Communities and Cultures." Design Issues 35, no. 4 (2019): 33–41. http://dx.doi.org/10.1162/desi_a_00562.

Full text
Abstract:
Using both interviews and participant observations, this article examines feminist design initiatives in hacker and maker cultures, unpacking their possible contribution to a world of more equitable digital technology development, use, and re(de)construction.
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Biao. "Research on Computer Network Security and Prevention Strategy." Applied Mechanics and Materials 608-609 (October 2014): 526–30. http://dx.doi.org/10.4028/www.scientific.net/amm.608-609.526.

Full text
Abstract:
With the development and popularization of the computer network, the security problem has increasingly become the focus of common concern. The computer network safety problems mainly include: protocol design issues, awareness, management system and technical operation. Hackers on the computer network attack techniques: Deceptive attack, masquerade attacks, vulnerability attack, covert attack and technical attack. Accordingly, we should take the corresponding safety countermeasures: strengthen network security education, using the network protection technology, detection technology and anti-vir
APA, Harvard, Vancouver, ISO, and other styles
5

Holt, Thomas J., Joshua D. Freilich, and Steven M. Chermak. "Exploring the Subculture of Ideologically Motivated Cyber-Attackers." Journal of Contemporary Criminal Justice 33, no. 3 (2017): 212–33. http://dx.doi.org/10.1177/1043986217699100.

Full text
Abstract:
Research on physical, that is, violent, terror attacks and extremism has increased dramatically over the last decade. The growth of the Internet and computer technology has also led to concern over the use of cyberattacks by ideologically motivated offenders to cause harm and further their political and social agendas. There is, however, a lack of empirical research on cyber-attackers limiting our knowledge of the factors that affect their behavior. This study addresses this empirical gap through a qualitative analysis of 10 interviews conducted with ideologically motivated Turkish computer ha
APA, Harvard, Vancouver, ISO, and other styles
6

Abdulrahman, Aysar A., and Alaa K. Jumaa. "Exploitnig DNS Server Vulnerabilites Using Linux Operating System." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 9 (2016): 7049–59. http://dx.doi.org/10.24297/ijct.v15i9.636.

Full text
Abstract:
Today, the world is using many modern Information Technology (IT) systems to gather, store, and manipulateimportant information. On the other hand, hackers are trying to gain access to any computer or system for viewing, copying, or creating data without the intention of destroying data or maliciously harming the computer. Exploiting domain name system (DNS) vulnerabilities have resulted in a range of high profile disruptions and outages for major internet sites around the world. DNS attack is an exploit in which an attacker takes advantage of vulnerabilities is the (DNS). This paper will pres
APA, Harvard, Vancouver, ISO, and other styles
7

García Canclini, Néstor. "Disposal and Reinvention: Citizenship in an Era of Electronic Capitalism." Open Cultural Studies 2, no. 1 (2018): 273–84. http://dx.doi.org/10.1515/culture-2018-0025.

Full text
Abstract:
Abstract Ever since the expansion of video-politics, television canalises citizens' criticism and demands regarding political authorities, conceiving of citizens as spectators. Social networks magnify this type of involvement, promising horizontality and social cohesion. Political parties have become reduced to elites that distribute power and benefits among themselves, disengaging from voters, except during electoral periods. Our opinions and behaviours are captured by algorithms and subject to globalised forces. The public space where citizenship should be exercised is becoming opaque and di
APA, Harvard, Vancouver, ISO, and other styles
8

Lakshmi, C., K. Thenmozhi, John Bosco Balaguru Rayappan, and Rengarajan Amirtharajan. "Open hiding for truncating hackers - a block truncation and wavelet approach." Multimedia Tools and Applications 78, no. 8 (2018): 9951–69. http://dx.doi.org/10.1007/s11042-018-6549-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Badham, Richard J. "Technology, work and culture." AI & Society 5, no. 4 (1991): 263–76. http://dx.doi.org/10.1007/bf02077434.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Markussen, Randi, and Susanne Bodker. "Gender, culture and technology." AI & Society 7, no. 4 (1993): 275–79. http://dx.doi.org/10.1007/bf01891411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer hackers. Culture and technology"

1

Oswald, Kathleen Frazer. "Hacking subject, subjecting hacking crisis in technoculture /." Click here for download, 2006. http://wwwlib.umi.com/cr/villanova/fullcit?p1432838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Howlett, William IV. "The Rise of China's Hacking Culture: Defining Chinese Hackers." CSUSB ScholarWorks, 2016. https://scholarworks.lib.csusb.edu/etd/383.

Full text
Abstract:
China has been home to some of the most prominent hackers and hacker groups of the global community throughout the last decade. In the last ten years, countless attacks globally have been linked to the People’s Republic of China (PRC) or those operating within the PRC. This exploration attempts to investigate the story, ideology, institutions, actions, and motivations of the Chinese hackers collectively, as sub-groups, and as individuals. I will do this using sources ranging from basic news coverage, interviews with experts and industry veterans, secondary reportage, leaked documents from gove
APA, Harvard, Vancouver, ISO, and other styles
3

Kelly, Nicholas M. "The freedom of information hacked: console cowboys, computer wizards, and personal freedom in the digital age." Diss., University of Iowa, 2016. https://ir.uiowa.edu/etd/6778.

Full text
Abstract:
“The Freedom of Information Hacked: Console Cowboys, Computer Wizards, and Personal Freedom in the Digital Age” examines depictions of computer hackers in fiction, the media, and popular culture, assessing how such depictions both influence and reflect popular conceptions of hackers and what they do. In doing so, the dissertation demonstrates the central concerns of hacker stories—concerns about digital security, privacy, and the value of information—have become the concerns of digital culture as a whole, hackers laying bare collective hopes and fears regarding digital networks.
APA, Harvard, Vancouver, ISO, and other styles
4

Ogbanufe, Obiageli. "Three Essays on Information Security Risk Management." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157576/.

Full text
Abstract:
Today's environment is filled with the proliferation of cyber-attacks that result in losses for organizations and individuals. Hackers often use compromised websites to distribute malware, making it difficult for individuals to detect. The impact of clicking through a link on the Internet that is malware infected can result in consequences such as private information theft and identity theft. Hackers are also known to perpetrate cyber-attacks that result in organizational security breaches that adversely affect organizations' finances, reputation, and market value. Risk management approaches f
APA, Harvard, Vancouver, ISO, and other styles
5

Summersby, Philippa. "Computer games and oral storytelling : an exploration of a relationship beyond similitude." Thesis, University of Kent, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.365253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Givens, Mark Allen. "The Impact of New Information Technology on Bureaucratic Organizational Culture." NSUWorks, 2011. http://nsuworks.nova.edu/gscis_etd/164.

Full text
Abstract:
Virtual work environments (VWEs) have been used in the private sector for more than a decade, but the United States Marine Corps (USMC), as a whole, has not yet taken advantage of associated benefits. The USMC construct parallels the bureaucratic organizational culture and uses an antiquated information technology (IT) infrastructure. During an effort to upgrade the Marine Corps Combat Development Command's infrastructure to a VWE, the change-agent noticed an immediate resistance towards the VWE and new work methodology. The problem identified for investigation was to discover why a bureaucrat
APA, Harvard, Vancouver, ISO, and other styles
7

Huang, YuFang Carole. "E-portfolios their impact on preservice teachers' self-directed learning and computer technology skills /." Diss., St. Louis, Mo. : University of Missouri--St. Louis, 2006. http://etd.umsl.edu/r1621.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Qing. "The genealogy of Apple in China: towards a genetic phenomenological sociology of culture, media and technology." HKBU Institutional Repository, 2017. https://repository.hkbu.edu.hk/etd_oa/401.

Full text
Abstract:
The state of cultural and social theories is not satisfactory though they seem to flourish in terms of quantity. Scholars successfully describe most of the cultural and social phenomena but propose wildly different, sometime even opposite, interpretations of these phenomena. This thesis offers genetic phenomenological sociology as an alternative interpretation that goes beyond structure oriented theories and construction (agency) oriented theories. It proposes to interpret cultural and social phenomena in the process of their emergence and transformation, and argues that this process or geneal
APA, Harvard, Vancouver, ISO, and other styles
9

Babbitt, William Edgar. "Ethnocomputing| the Design and Assessment of Culture-Based Learning Software for Math and Computing Education." Thesis, Rensselaer Polytechnic Institute, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3684064.

Full text
Abstract:
<p> The United States has a serious problem in Science, Technology, Engineering, and Mathematics. The STEM disciplines are suffering from a `Quiet Crisis'[1]. The problem is that African Americans, Latino/a, Native American, and other ethnic minority students are choosing careers in the STEM disciplines at lower percentages than their white and Asian counterparts [2]. We refer to this disparity as underrepresentation. This work focuses on the use of the Culturally Situated Design Tools (CSDTs, <b>http://csdt.rpi.edu</b>) as a means to counter this underrepresentation. The programmable set of C
APA, Harvard, Vancouver, ISO, and other styles
10

Lin, Ying-Chia Hazel. "Culture, technology, market, and transnational circulation of cultural products : the glocalization of EA digital games in Taiwan /." Thesis, Connect to this title online; UW restricted, 2006. http://hdl.handle.net/1773/6204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer hackers. Culture and technology"

1

Global, IGI, ed. Corporate hacking and technology-driven crime: Social dynamics and implications. IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hack Attacks Testing. John Wiley & Sons, Ltd., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hack attacks testing: How to conduct your own security audit. Wiley, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hacking PhotoShop CS2. Wiley Pub., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Shangara. Hacking Photoshop CS2. John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schell, Bernadette H. Webster's New World Hacker Dictionary. John Wiley & Sons, Ltd., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schell, Bernadette H. Webster's new world hacker dictionary. Wiley Pub., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schiffman, Mike. Hacker's challenge: Test your incident response skills using 20 scenarios. Osborne/McGraw-Hill, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schiffman, Mike. Hacker's challenge: Test your incident response skills using 20 scenarios. Osborne/McGraw-Hill, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Orchard, Leslie Michael. Hacking RSS and Atom. Wiley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer hackers. Culture and technology"

1

Hecht, Janice, and Bogdan Zamfir. "The Evolving Door: Providing Technology Access for Post-secondary Students in a Constantly Changing Technology-Based Culture." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45491-8_146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Deutsch, Stevsen. "Unleashing Human Intelligence — More Than a Matter of Computer Technology." In Artifical Intelligence, Culture and Language: On Education and Work. Springer London, 1990. http://dx.doi.org/10.1007/978-1-4471-1729-2_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Marzahl, R., H. Büntemeyer, and J. Lehmann. "A Computer Integrated Control System for Specialized Cell Culture Fermentation Set-Ups." In Animal Cell Technology: Developments Towards the 21st Century. Springer Netherlands, 1995. http://dx.doi.org/10.1007/978-94-011-0437-1_164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Phillips, P. J., J. P. Barford, and C. Harbour. "The Integration of Detailed Computer Modelling (on PC) With Experimentation in Animal Cell Culture." In Animal Cell Technology: Basic & Applied Aspects. Springer Netherlands, 1997. http://dx.doi.org/10.1007/978-94-011-5746-9_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ha, Taejin, Younsung Kim, Eunseok Kim, et al. "K-Culture Time Machine: Development of Creation and Provision Technology for Time-Space-Connected Cultural Contents." In Lecture Notes in Computer Science. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20618-9_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shimizu, Hiroshi, Katsuhiro Araki, Masashi Ogura, Suteaki Shioya, Ken-ichi Suga, and Eizo Sada. "Maximum Production of Glutathione in Fed-batch Culture of Saccharomyces cerevisiae." In Computer Applications in Fermentation Technology: Modelling and Control of Biotechnological Processes. Springer Netherlands, 1989. http://dx.doi.org/10.1007/978-94-009-1141-3_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ng, Kwan-Keung, Ching-Hong Luk, and Wai-Ming Lam. "The Influence of Culture on the Use of Information Technology in Learning in Hong Kong’s Higher Education." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94505-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Huang, Chiung-En, Yi-Chun Chen, and Fuh-Gwo Chen. "Research on Knowledge Management with Innovation Performance Based on Information Technology–Organizational Culture Perspective." In Advances in Computer Science, Environment, Ecoinformatics, and Education. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23357-9_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Agustini, Ketut, and Gede Indrawan. "Instructional Design for the Computer Network Subject: A Balinese Culture-Based Learning Using Subak." In Educational Technology to Improve Quality and Access on a Global Scale. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66227-5_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Ming-Shih, Ming-Lun Li, and Yu-Chia Chen. "Application of Infrared Technology in Household Water Tap Design and Evaluation." In Universal Access in Human-Computer Interaction. Access to the Human Environment and Culture. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20687-5_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer hackers. Culture and technology"

1

Muller, Sune Dueholm, and Frank Ulrich. "The Competing Values of Hackers: The Culture Profile that Spawned the Computer Revolution." In 2015 48th Hawaii International Conference on System Sciences (HICSS). IEEE, 2015. http://dx.doi.org/10.1109/hicss.2015.413.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Patterson, Nicholas, Michael Hobbs, Frank Jiang, and Lei Pan. "Cyber Security Insights into Self-Proclaimed Virtual World Hackers." In 5th International Conference on Computer Science, Information Technology. Aircc Publishing Corporation, 2019. http://dx.doi.org/10.5121/csit.2019.91107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Adshead, Deborah, Charles Boisvert, David Love, and Phil Spencer. "Changing Culture." In ITICSE '15: Innovation and Technology in Computer Science Education Conference 2015. ACM, 2015. http://dx.doi.org/10.1145/2729094.2742610.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

McFall, Steve. "Using technology to support investigations in the electronic age: tracking hackers to large scale international computer fraud." In Coupling Technology to National Need, edited by Arthur H. Guenther and Louis D. Higgs. SPIE, 1994. http://dx.doi.org/10.1117/12.170642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rashed, Abdullah Santos, Al-Eryani Henrique, and Arwa. "Biometrics acceptance in Arab culture: An exploratory study." In 2013 International Conference on Computer Applications Technology (ICCAT 2013). IEEE, 2013. http://dx.doi.org/10.1109/iccat.2013.6521970.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sha Pan and Zhong Cao. "Relation between language and culture in English teaching." In 2010 2nd International Conference on Education Technology and Computer (ICETC). IEEE, 2010. http://dx.doi.org/10.1109/icetc.2010.5529272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Zhihui. "The Influence of Organizational Culture on Language Classroom." In 2009 First International Workshop on Education Technology and Computer Science. IEEE, 2009. http://dx.doi.org/10.1109/etcs.2009.535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Malik, Sofianiza Abd, and Alistair D. N. Edwards. "Effects of culture and age on attitudes to mobile technology." In 2012 International Conference on Computer & Information Science (ICCIS). IEEE, 2012. http://dx.doi.org/10.1109/iccisci.2012.6297183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zeng, Hairong, Yun Song, and Yan Zhou. "The Application Analysis of Computer Technology in Enterprise's Culture Construction." In 2016 International Conference on Computational Science and Engineering (ICCSE 2016). Atlantis Press, 2016. http://dx.doi.org/10.2991/iccse-16.2016.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jia, Jinglin, Caiping Xiong, and Yuxue Wu. "Design and Application of Virtual Ancient Culture Exhibition." In 2009 International Conference on Information Technology and Computer Science (ITCS 2009). IEEE, 2009. http://dx.doi.org/10.1109/itcs.2009.140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!