Academic literature on the topic 'Hackers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hackers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Hackers"

1

Hausken, Kjell. "Information Sharing Among Cyber Hackers in Successive Attacks." International Game Theory Review 19, no. 02 (2017): 1750010. http://dx.doi.org/10.1142/s0219198917500104.

Full text
Abstract:
Supplementing the literature on information sharing between firms, the paper seeks to understand information sharing between hackers and how firms defend against increasingly sophisticated hackers. Each hacker seeks financial gain, mutually beneficial information exchange, and reputation gain. The two hackers’ attack and the firm’s defense are inverse U shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The first hacker’s information sharing increases as both hackers focus increasingly on reputation gain. The two hacke
APA, Harvard, Vancouver, ISO, and other styles
2

Odemis, Murat, Cagatay Yucel, and Ahmet Koltuksuz. "Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System." Security and Communication Networks 2022 (January 27, 2022): 1–28. http://dx.doi.org/10.1155/2022/7620125.

Full text
Abstract:
This research demonstrates a design of an experiment of a hacker infiltrating a server where it is assumed that the communication between the hacker and the target server is established, and the hacker also escalated his rights on the server. Therefore, the honeypot server setup has been designed to reveal the correlation of a hacker’s actions with that of the hacker’s experience, personality, expertise, and psychology. To the best of our knowledge, such a design of experiment has never been tested rigorously on a honeypot implementation except for self-reporting tests applied to hackers in th
APA, Harvard, Vancouver, ISO, and other styles
3

Bátfai, Norbert, Renátó Besenczi, József Szabó, et al. "DEAC-Hackers: játszó hackerek, hackelő játékosok." Információs Társadalom 18, no. 1 (2018): 132. http://dx.doi.org/10.22503/inftars.xviii.2018.1.9.

Full text
Abstract:
Klasszikus értelmezésben a hacker a kifinomult problémákat kifinomultan kezelni képes szakértő. Tipikusan programozó, de ugyanúgy mutathat hacker attitűdöket, lehet hacker egy művész, egy feltaláló, egy tudós vagy egy sportoló is. Ebben a cikkben azt mutatjuk be, hogyan lehet hacker egy e-sportoló játékos. A hacker természetéből fakadóan autodidakta, de a tanulási folyamat formális eszközökkel segíthető, katalizálható. A mi ilyen formális keretünk a Debreceni Egyetem Atlétikai Clubjának (DEAC) nemrégiben megalakított e-sport szakosztálya, a cikkben bemutatott DEAC-Hackers. 
 
 ---&#x
APA, Harvard, Vancouver, ISO, and other styles
4

Hausken, Kjell. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers." International Game Theory Review 20, no. 01 (2018): 1750027. http://dx.doi.org/10.1142/s021919891750027x.

Full text
Abstract:
One firm defends proactively or retroactively against a first hacker, and thereafter against a second hacker, in four four-period games. The hackers share information for financial gain, mutual advantage, and reputation. The first hacker’s attack and information sharing are strategic substitutes. When the firm is proactive in period 1, the first hacker’s information sharing decreases as the second hacker’s attack cost increases. The deterring effort in eight corner solutions is proportional to the deterred player’s valuation and inverse proportional to the deterred player’s unit effort cost. W
APA, Harvard, Vancouver, ISO, and other styles
5

Nycyk, Michael. "The New Computer Hacker’s Quest and Contest with the Experienced Hackers: A Qualitative Study applying Pierre Bourdieu’s Field Theory." International Journal of Cyber Criminology 10, no. 2 (2016): 92–109. https://doi.org/10.5281/zenodo.163402.

Full text
Abstract:
Hacker forums are places for new hackers, newbies, to find information on hacking practices and to become part of a community. This study contributes to understanding ways newbies try to become accepted experienced computer hackers. Using Pierre Bourdieu’s Field Theory and its concepts, 500 threads from a forum were analyzed to see how newbies attempt to gain a place in the hacking field amongst experienced hackers. Thematic analysis methods were used to demonstrate how the forum’s field, and those within it, behaved to obtain what Bourdieu describes as cultural and social capital to obtain kn
APA, Harvard, Vancouver, ISO, and other styles
6

Cekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking." Communications - Scientific letters of the University of Zilina 20, no. 2 (2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.

Full text
Abstract:
Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker’s point of view as well as the defender’s point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together wi
APA, Harvard, Vancouver, ISO, and other styles
7

Deepti, Chaudhari1 Hetvi Patel2 Anushri Ghosh3 Neha Patil4 Vikas Pawar5 Yogesh Sonawane6. "A Survey on Image steganography using Genetic Algorithm." Scandinavian Journal of Information Systems 35, no. 1 (2023): 131–35. https://doi.org/10.5281/zenodo.7858158.

Full text
Abstract:
Nowadays technologies are increasing very rapidly, and with the rise of these technologies the world is now open to everyone, and nothing is hidden. This gives an advantage to the hackers to hack the information and misuse it. Using our personal data for malicious purposes is very harmful for everyone. In this open world some of the data should be very confidential and should not be able to be hacked by the hackers. Here, in our work, we have designed the model that would hide the confidential data from the hackers in such a way that even if the hacker retrieves the data or file, but the hacke
APA, Harvard, Vancouver, ISO, and other styles
8

Guo, Boyu. "Why Hackers Become Crackers – An Analysis of Conflicts Faced by Hackers." Public Administration Research 5, no. 1 (2016): 29. http://dx.doi.org/10.5539/par.v5n1p29.

Full text
Abstract:
<p>Hacker culture is generally regarded as a subculture, and the public has a high degree of misunderstanding towards hackers. The media reports sometimes depict hackers overly negatively, possibly because hackers could gain a dominant position in the age of information and, therefore, threaten the existing balance of social power distribution. Moreover, those reports, whether intentionally or not, misunderstand the meaning of “hackers”: “Hackers” are people who want to identify and solve problems directly and effectively, but “crackers” are those who cause problems for society.</p&gt
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Ajlouni, Mahmoud Mohammad. "Human Resources and their Tendency to Information Security Crimes Based on Holland Theory." Information Resources Management Journal 31, no. 4 (2018): 44–58. http://dx.doi.org/10.4018/irmj.2018100103.

Full text
Abstract:
Security systems are often the target of cyber-criminals and professional hackers, but often they fail in hiding all traces of the attack, thereby leaving critical evidence that could lead to identifying and arresting the criminal. However, hacking skills vary from one hacker to another depending on the hacker's personal traits, behavior, and intellectual tendencies. The aim of this study is to develop a proposed descriptive model of the behavioral patterns and motives of hackers based on programmable psychological theories, modeled using object-oriented programming models. The study proposes
APA, Harvard, Vancouver, ISO, and other styles
10

Scariot Esquivel, Nelson. "Hackers, política y revolución." Question/Cuestión 3, no. 72 (2022): E716. http://dx.doi.org/10.24215/16696581e716.

Full text
Abstract:
El siguiente artículo está basado en el capítulo tres de mi tesina de grado La cultura hacker como filosofía de vida en la era del capitalismo cibernético. Una aproximación al caso en Mendoza. Aquí analizamos el potencial revolucionario de les hackers frente al actual sistema económico, político e informático que gobierna el mundo: el capitalismo cibernético (Tiqqun, 2016). Centrándonos en el aspecto político y filosófico de la cultura hacker. En efecto, buscamos responder a las siguientes preguntas: ¿Pueden los/as hackers constituirse en una clase política? ¿Por qué pensar a los/as hackers en
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Hackers"

1

Zubovych, A. "Are hackers outlaws or watchdogs?" Thesis, Київський національний університет технологій та дизайну, 2018. https://er.knutd.edu.ua/handle/123456789/11384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wilmes, Justin Allen. "The Red Scare: The Evolution and Impact of Russian Computer Hackers." Miami University Honors Theses / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1146055290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Obruch, Arseniy. "The hackers attacks and modern viruses." Thesis, Київський національний університет технологій та дизайну, 2019. https://er.knutd.edu.ua/handle/123456789/13105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barudy, G. Claudia, and A. Loreto Cristi. "Hackers: la identidad de un pirata postmoderno." Tesis, Universidad de Chile, 1999. http://repositorio.uchile.cl/handle/2250/136343.

Full text
Abstract:
Seminario Para Optar al Grado Académico de Licenciado en Comunicación Social<br>El autor no autoriza el acceso a texto completo de su documento<br>Nuestra época se ha visto marcada por un ascendente proceso de globalización en el área de las comunicaciones. La rápida ampliación de las posibilidades de acceso a la comunicación vía Internet se ha constituido en el principal agente de este proceso. Por esto, consideramos que es muy importante poner atención a las relaciones comunicacionales que esta red genera. El hacker se instala en este contexto, nace y se desarrolla dentro de Internet
APA, Harvard, Vancouver, ISO, and other styles
5

Chavez, Nicholas Marshall. "CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?" CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/690.

Full text
Abstract:
This project examines the protection methods suggested by hackers to guard against online victimization through the lens of Situation Crime Prevention. Data were collected from 85 webpages representing three categories of electronic communications: forums, blogs, and fan pages. The goal of this project was to identify which of the 25 opportunity reduction techniques the hacking community recommend most often, as well as, what level of expertise was associated with the suggested security measures. Results indicate that the technique most recommended by the hacking community was to remove target
APA, Harvard, Vancouver, ISO, and other styles
6

Lockridge, Timothy Alan. "Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/77355.

Full text
Abstract:
This dissertation uses a case study of 2600: The Hacker Quarterly to consider how the practices of a hacker public might be theorized as a rhetorical activity. The project is contextualized within a history of hacking (building from a narrative that centers on Levy's 1984 book Hackers) and within the arc of recent copyright legislation, specifically the Digital Millennium Copyright Act (DMCA) and the 2011-12 Stop Online Piracy Act (SOPA) debates. Within this framework, the dissertation examines how specific patterns and cases within 2600 might further our understanding of the rhetorical canons
APA, Harvard, Vancouver, ISO, and other styles
7

Howlett, William IV. "The Rise of China's Hacking Culture: Defining Chinese Hackers." CSUSB ScholarWorks, 2016. https://scholarworks.lib.csusb.edu/etd/383.

Full text
Abstract:
China has been home to some of the most prominent hackers and hacker groups of the global community throughout the last decade. In the last ten years, countless attacks globally have been linked to the People’s Republic of China (PRC) or those operating within the PRC. This exploration attempts to investigate the story, ideology, institutions, actions, and motivations of the Chinese hackers collectively, as sub-groups, and as individuals. I will do this using sources ranging from basic news coverage, interviews with experts and industry veterans, secondary reportage, leaked documents from gove
APA, Harvard, Vancouver, ISO, and other styles
8

DELFANTI, ALESSANDRO. "GENOME HACKERS. REBEL BIOLOGY, OPEN SOURCE AND SCIENCE ETHIC." Doctoral thesis, Università degli Studi di Milano, 2011. http://hdl.handle.net/2434/159641.

Full text
Abstract:
Crack the code, share your data, have fun, save the world, be independent, become famous and make a lot of money. The remix between the Mertonian ethic of 20th century science and the hacker ethic is producing an emergent open science culture that is redefining the relation between researchers, scientific institutions and intellectual property is redefined. The case studies, analysed through extensive media analysis, interviews and participatory observation, include the open access turn of the American biologist Craig Venter, the rebellion of the Italian virologist Ilaria Capua against WHO dat
APA, Harvard, Vancouver, ISO, and other styles
9

Taylor, Paul Anthony. "Hackers : a case-study of the social shaping of computing." Thesis, University of Edinburgh, 1998. http://hdl.handle.net/1842/30821.

Full text
Abstract:
The study is an examination of hacking, placing the act in the context of theories of technological change. Hacking is found to provide illustrative evidence within computing of theories which emphasise the societal shaping of technology over the notion of technological determination. The evolution of hacking is traced, showing how it reflects changing trends in the nature of information, the most vivid of which is the conceptualisation of information known as 'cyberspace'. Instead of simply cataloguing the impact of technical changes within computing and the effects they have had upon informa
APA, Harvard, Vancouver, ISO, and other styles
10

Viroli, Edoardo <1991&gt. "Hackers, cyberterrorismo e relazioni internazionali : Viaggio al centro della cibernetizzazione globale." Master's Degree Thesis, Università Ca' Foscari Venezia, 2016. http://hdl.handle.net/10579/8219.

Full text
Abstract:
L'informatica e la tecnologia ad essa correlata (dai computer ad Internet) ha cominciato a svilupparsi a partire dal periodo immediatamente successivo alla Seconda guerra mondiale, rivelandosi sia uno strumento utilizzabile a fin di bene sia una potente arma qualora fosse impiegata con intenti dannosi tanto per i singoli individui quanto per la sicurezza degli Stati. L'avvento di Internet e una sempre più facile accessibilità a computer e strumenti multimediali, infatti, ha permesso la nascita prima e l'evoluzione poi di una nuova serie di crimini e criminali in grado di trarre sempre maggior
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Hackers"

1

Jack, Dann, and Dozois Gardner R, eds. Hackers. Ace Books, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Films for the Humanities (Firm) and Canadian Broadcasting Corporation, eds. Hackers. Films for the Humanities and Sciences, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bischoff, David. Hackers. HarperCollins Pub., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Verton, Dan. The hacker diaries: Confessions of teenage hackers. McGraw-Hill/Osborne, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kennedy, Kathleen E. Medieval Hackers. punctum books, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Goldstein, Emmanuel. Dear Hacker: Letters to the editor of 2600. Wiley Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Garavaglia, Dante. Milonga de hackers. Editorial La Colmena, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bischoff, David. Hackers: A novel. HarperPaperbacks, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lanton, Sandy. The happy hackers. Heinemann Educ., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Paulsen, Gary. The time hackers. Wendy Lamb Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Hackers"

1

Prictor, Megan. "Hackers and hacked." In Confidentiality, Privacy, and Data Protection in Biomedicine. Routledge, 2024. http://dx.doi.org/10.4324/9781003394518-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Butler, Michael, and Jacob G. Oakley. "Developing Hackers." In The Business of Hacking. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0174-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Calcutt, Andrew. "Hackers/slackers." In White Noise. Palgrave Macmillan UK, 1999. http://dx.doi.org/10.1057/9780230373686_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Darling, Julie, and D. J. Cools. "[[Untitled]]." In Little Hackers. Routledge, 2024. http://dx.doi.org/10.4324/9781003501527-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Di Salvo, Philip. "Hackers and Whistleblowers." In The Palgrave Encyclopedia of Interest Groups, Lobbying and Public Affairs. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-13895-0_80-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Oakley, Jacob G. "Why Human Hackers?" In Professional Red Teaming. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4309-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Di Salvo, Philip. "Hackers and Whistleblowers." In The Palgrave Encyclopedia of Interest Groups, Lobbying and Public Affairs. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-44556-0_80.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Moallem, Abbas. "Cyberattackers versus Hackers." In Human Factors Analysis of 23 Cyberattacks. CRC Press, 2025. https://doi.org/10.1201/9781003461739-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

D’Andrea, Vincenzo, Stefano De Paoli, and Maurizio Teli. "Open to Grok. How do Hackers’ Practices Produce Hackers?" In IFIP – The International Federation for Information Processing. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-09684-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security. Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Hackers"

1

Amadou, Abdoul Nasser Hassane, Anas Motii, and Mohammed Jouhari. "HC-HackerRank: Identifying Key Hackers in Cybercrime Social Network Forums." In 2024 7th International Conference on Advanced Communication Technologies and Networking (CommNet). IEEE, 2024. https://doi.org/10.1109/commnet63022.2024.10793292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hassane Amadou, Abdoul Nasser, Anas Motii, Saida Elouardi, and El Houcine Bergou. "EUREKHA: Enhancing User Representation for Key Hackers Identification in Underground Forums." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00073.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Farrag, Mohamed, Samir G. Sayed, and Marwa Zamzam. "Bluffing the Hackers: Automated Decoy Creation and Real-Time Cyber Deception." In 2024 7th International Conference on Signal Processing and Information Security (ICSPIS). IEEE, 2024. https://doi.org/10.1109/icspis63676.2024.10812608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rizk, Hamada, and Hirozumi Yamaguchi. "Hackers on the Go: Investigating Cyber Threats to Crowdsourced Mobility-on-Demand Platforms." In 2023 33rd International Conference on Computer Theory and Applications (ICCTA). IEEE, 2023. https://doi.org/10.1109/iccta60978.2023.10969231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ford, Irina, Ananta Soneji, Faris Bugra Kokulu, et al. "“Watching over the shoulder of a professional”: Why Hackers Make Mistakes and How They Fix Them." In 2024 IEEE Symposium on Security and Privacy (SP). IEEE, 2024. http://dx.doi.org/10.1109/sp54263.2024.00202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vasconcelos, João Victor Alves. "Teste de Invasão: O segredo por trás de como funciona uma invasão hacker, a metodologia de invasão utilizada por hackers." In Conferência Connect Tech. Sociedade Brasileira de Computação, 2024. http://dx.doi.org/10.5753/connect.2024.238546.

Full text
Abstract:
Ataques cibernéticos ao passar dos anos tem se tornado muito mais comum, estima-se que ao dia 30 mil sites são vítimas de ataques cibernéticos por dia e a cada 39 segundos ocorre algum ataque na internet. Embora sabendo desses fatos ainda há uma enorme desinformação e mistério de como ocorrem estes ataques e também de que tipo de pessoas estão por trás destes ataques e seus motivos para eles, fazendo com que muitos mitos e preconceitos sejam criados ao redor da figura do hacker, fazendo muitos acreditarem que todos os hackers são criminosos ou que são capazes de feitos considerados fantasiosos
APA, Harvard, Vancouver, ISO, and other styles
7

Yafi, Eiad, Katya Yefimova, and Karen E. Fisher. "Young Hackers." In CHI '18: CHI Conference on Human Factors in Computing Systems. ACM, 2018. http://dx.doi.org/10.1145/3170427.3174363.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fang, Zhen, Xinyi Zhao, Qiang Wei, et al. "Exploring key hackers and cybersecurity threats in Chinese hacker communities." In 2016 IEEE Conference on Intelligence and Security Informatics (ISI). IEEE, 2016. http://dx.doi.org/10.1109/isi.2016.7745436.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nyman, Linus. "Hackers on Forking." In OpenSym '14: The International Symposium on Open Collaboration. ACM, 2014. http://dx.doi.org/10.1145/2641580.2641590.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Echenique, Federico, and Kevin He. "Screening p-Hackers." In EC '22: The 23rd ACM Conference on Economics and Computation. ACM, 2022. http://dx.doi.org/10.1145/3490486.3538358.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Hackers"

1

Vilbig, Kevin. Hack All The History! Hackers 1959 - 1991. Portland State University Library, 2013. http://dx.doi.org/10.15760/honors.20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Eisen, Stefan, and Jr. Network Warfare. It's Not Just for Hackers Anymore. Defense Technical Information Center, 1995. http://dx.doi.org/10.21236/ada297897.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lohn, Andrew. Hacking AI: A Primer for Policymakers on Machine Learning Cybersecurity. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/2020ca006.

Full text
Abstract:
Machine learning systems’ vulnerabilities are pervasive. Hackers and adversaries can easily exploit them. As such, managing the risks is too large a task for the technology community to handle alone. In this primer, Andrew Lohn writes that policymakers must understand the threats well enough to assess the dangers that the United States, its military and intelligence services, and its civilians face when they use machine learning.
APA, Harvard, Vancouver, ISO, and other styles
4

Cary, Dakota. Academics, AI, and APTs. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2020ca010.

Full text
Abstract:
Six Chinese universities have relationships with Advanced Persistent Threat (APT) hacking teams. Their activities range from recruitment to running cyber operations. These partnerships, themselves a case study in military-civil fusion, allow state-sponsored hackers to quickly move research from the lab to the field. This report examines these universities’ relationships with known APTs and analyzes the schools’ AI/ML research that may translate to future operational capabilities.
APA, Harvard, Vancouver, ISO, and other styles
5

Yilmaz, Ihsan, and Kenes Bulent. Digital Authoritarianism in Turkish Cyberspace: A Study of Deception and Disinformation by the AKP Regime’s AKtrolls and AKbots. Populism & Politics (P&P), 2023. http://dx.doi.org/10.55271/pp0026.

Full text
Abstract:
This article explores the evolving landscape of digital authoritarianism in Turkish cyberspace, focusing on the deceptive strategies employed by the AKP regime through AKtrolls, AKbots and hackers. Initially employing censorship and content filtering, the government has progressively embraced sophisticated methods, including the weaponization of legislation and regulatory bodies to curtail online freedoms. In the third generation of information controls, a sovereign national cyber-zone marked by extensive surveillance practices has emerged. Targeted persecution of critical netizens, coupled wi
APA, Harvard, Vancouver, ISO, and other styles
6

Dukarski, Jennifer. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles. SAE International, 2021. http://dx.doi.org/10.4271/epr2021019.

Full text
Abstract:
Modern automobiles collect around 25 gigabytes of data per hour and autonomous vehicles are expected to generate more than 100 times that number. In comparison, the Apollo Guidance Computer assisting in the moon launches had only a 32-kilobtye hard disk. Without question, the breadth of in-vehicle data has opened new possibilities and challenges. The potential for accessing this data has led many entrepreneurs to claim that data is more valuable than even the vehicle itself. These intrepid data-miners seek to explore business opportunities in predictive maintenance, pay-as-you-drive features,
APA, Harvard, Vancouver, ISO, and other styles
7

Azar, Pablo, Sergio Olivas, and Nish D. Sinha. The Price of Processing: Information Frictions and Market Efficiency in DeFi. Federal Reserve Bank of New York, 2025. https://doi.org/10.59576/sr.1153.

Full text
Abstract:
This paper investigates the speed of price discovery when information becomes publicly available but requires costly processing to become common knowledge. We exploit the unique institutional setting of hacks on decentralized finance (DeFi) protocols. Public blockchain data provides the precise time a hack’s transactions are recorded—becoming public information—while subsequent social media disclosures mark the transition to common knowledge. This empirical design allows us to isolate the price impact occurring during the interval characterized by information asymmetry driven purely by differe
APA, Harvard, Vancouver, ISO, and other styles
8

Frith, R. A. Geology, Hackett River, District of Mackenzie, Northwest Territories. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1987. http://dx.doi.org/10.4095/122787.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Frith, R. A. Precambrian geology of the Hackett River area, District of Mackenzie, N.W.T. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1987. http://dx.doi.org/10.4095/122463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Green, Crystal, Mariah Voutilainen, and Lauren Ziegler. Journeys in Family School Engagement. HundrED, 2023. http://dx.doi.org/10.58261/zhac4043.

Full text
Abstract:
In early 2021, Parents as Allies (PAA) began a journey of collaborating with school teams in a design sprint process to develop creative and innovative solutions, or “hacks” that would address the specific needs of their communities. Their initial, two-month design sprint in 2021 centred around the question: “How might we build stronger engagement between families and schools for the benefit of all students?” Almost one year later, in April 2022, PAA began a second iteration. Parents as Allies 2.0 narrowed its focus to 22 Western Pennsylvania school districts. Joined by design sprint guides, t
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!