To see the other types of publications on this topic, follow the link: Hackers.

Dissertations / Theses on the topic 'Hackers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Hackers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Zubovych, A. "Are hackers outlaws or watchdogs?" Thesis, Київський національний університет технологій та дизайну, 2018. https://er.knutd.edu.ua/handle/123456789/11384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wilmes, Justin Allen. "The Red Scare: The Evolution and Impact of Russian Computer Hackers." Miami University Honors Theses / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1146055290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Obruch, Arseniy. "The hackers attacks and modern viruses." Thesis, Київський національний університет технологій та дизайну, 2019. https://er.knutd.edu.ua/handle/123456789/13105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barudy, G. Claudia, and A. Loreto Cristi. "Hackers: la identidad de un pirata postmoderno." Tesis, Universidad de Chile, 1999. http://repositorio.uchile.cl/handle/2250/136343.

Full text
Abstract:
Seminario Para Optar al Grado Académico de Licenciado en Comunicación Social<br>El autor no autoriza el acceso a texto completo de su documento<br>Nuestra época se ha visto marcada por un ascendente proceso de globalización en el área de las comunicaciones. La rápida ampliación de las posibilidades de acceso a la comunicación vía Internet se ha constituido en el principal agente de este proceso. Por esto, consideramos que es muy importante poner atención a las relaciones comunicacionales que esta red genera. El hacker se instala en este contexto, nace y se desarrolla dentro de Internet
APA, Harvard, Vancouver, ISO, and other styles
5

Chavez, Nicholas Marshall. "CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?" CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/690.

Full text
Abstract:
This project examines the protection methods suggested by hackers to guard against online victimization through the lens of Situation Crime Prevention. Data were collected from 85 webpages representing three categories of electronic communications: forums, blogs, and fan pages. The goal of this project was to identify which of the 25 opportunity reduction techniques the hacking community recommend most often, as well as, what level of expertise was associated with the suggested security measures. Results indicate that the technique most recommended by the hacking community was to remove target
APA, Harvard, Vancouver, ISO, and other styles
6

Lockridge, Timothy Alan. "Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/77355.

Full text
Abstract:
This dissertation uses a case study of 2600: The Hacker Quarterly to consider how the practices of a hacker public might be theorized as a rhetorical activity. The project is contextualized within a history of hacking (building from a narrative that centers on Levy's 1984 book Hackers) and within the arc of recent copyright legislation, specifically the Digital Millennium Copyright Act (DMCA) and the 2011-12 Stop Online Piracy Act (SOPA) debates. Within this framework, the dissertation examines how specific patterns and cases within 2600 might further our understanding of the rhetorical canons
APA, Harvard, Vancouver, ISO, and other styles
7

Howlett, William IV. "The Rise of China's Hacking Culture: Defining Chinese Hackers." CSUSB ScholarWorks, 2016. https://scholarworks.lib.csusb.edu/etd/383.

Full text
Abstract:
China has been home to some of the most prominent hackers and hacker groups of the global community throughout the last decade. In the last ten years, countless attacks globally have been linked to the People’s Republic of China (PRC) or those operating within the PRC. This exploration attempts to investigate the story, ideology, institutions, actions, and motivations of the Chinese hackers collectively, as sub-groups, and as individuals. I will do this using sources ranging from basic news coverage, interviews with experts and industry veterans, secondary reportage, leaked documents from gove
APA, Harvard, Vancouver, ISO, and other styles
8

DELFANTI, ALESSANDRO. "GENOME HACKERS. REBEL BIOLOGY, OPEN SOURCE AND SCIENCE ETHIC." Doctoral thesis, Università degli Studi di Milano, 2011. http://hdl.handle.net/2434/159641.

Full text
Abstract:
Crack the code, share your data, have fun, save the world, be independent, become famous and make a lot of money. The remix between the Mertonian ethic of 20th century science and the hacker ethic is producing an emergent open science culture that is redefining the relation between researchers, scientific institutions and intellectual property is redefined. The case studies, analysed through extensive media analysis, interviews and participatory observation, include the open access turn of the American biologist Craig Venter, the rebellion of the Italian virologist Ilaria Capua against WHO dat
APA, Harvard, Vancouver, ISO, and other styles
9

Taylor, Paul Anthony. "Hackers : a case-study of the social shaping of computing." Thesis, University of Edinburgh, 1998. http://hdl.handle.net/1842/30821.

Full text
Abstract:
The study is an examination of hacking, placing the act in the context of theories of technological change. Hacking is found to provide illustrative evidence within computing of theories which emphasise the societal shaping of technology over the notion of technological determination. The evolution of hacking is traced, showing how it reflects changing trends in the nature of information, the most vivid of which is the conceptualisation of information known as 'cyberspace'. Instead of simply cataloguing the impact of technical changes within computing and the effects they have had upon informa
APA, Harvard, Vancouver, ISO, and other styles
10

Viroli, Edoardo <1991&gt. "Hackers, cyberterrorismo e relazioni internazionali : Viaggio al centro della cibernetizzazione globale." Master's Degree Thesis, Università Ca' Foscari Venezia, 2016. http://hdl.handle.net/10579/8219.

Full text
Abstract:
L'informatica e la tecnologia ad essa correlata (dai computer ad Internet) ha cominciato a svilupparsi a partire dal periodo immediatamente successivo alla Seconda guerra mondiale, rivelandosi sia uno strumento utilizzabile a fin di bene sia una potente arma qualora fosse impiegata con intenti dannosi tanto per i singoli individui quanto per la sicurezza degli Stati. L'avvento di Internet e una sempre più facile accessibilità a computer e strumenti multimediali, infatti, ha permesso la nascita prima e l'evoluzione poi di una nuova serie di crimini e criminali in grado di trarre sempre maggior
APA, Harvard, Vancouver, ISO, and other styles
11

Humbert, Jean-Philippe. "Les mondes de la cyberdélinquance et images sociales du pirate informatique." Thesis, Metz, 2007. http://www.theses.fr/2007METZ003L/document.

Full text
Abstract:
La cyberdélinquance constitue un phénomène indissociable du monde numérique, depuis les premiers hackers recherchant la compréhension des mécanismes innovants de communication, jusqu'aux pirates informatiques majoritairement voués désormais à la criminalité. L'évolution et l'état actuel de ce phénomène déterminent, dès lors, un véritable questionnement sur la réalité sociale du pirate informatique responsable des faits de cyberdélinquance. En effet, comment l'appréhender et en atteindre la connaissance ? Afin d'en dégager les clés de compréhension, ces interrogations sont abordées par l'étude
APA, Harvard, Vancouver, ISO, and other styles
12

Famiglietti, Andrew A. "Hackers, Cyborgs, and Wikipedians: The Political Economy and Cultural History of Wikipedia." Bowling Green State University / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1300717552.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Oswald, Kathleen Frazer. "Hacking subject, subjecting hacking crisis in technoculture /." Click here for download, 2006. http://wwwlib.umi.com/cr/villanova/fullcit?p1432838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Dalwadi, Chintan. "Network and data security." Birmingham, Ala. : University of Alabama at Birmingham, 2006. http://www.mhsl.uab.edu/dt/2006m/dalwadi.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Vignoli, Alessandro. "Identità, prestigio ed etica: analisi antropologica delle motivazioni e delle soddisfazioni degli Hackers." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2010. http://amslaurea.unibo.it/1218/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Artore, Diane. "Honeynet design and implementation." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/22614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Imhof, Robert. "Cyber crime and telecommunications law /." Online version of thesis, 2010. http://hdl.handle.net/1850/12268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Molony, Scott. "Finding Divinity in Fortran." Thesis, Boston College, 2011. http://hdl.handle.net/2345/1980.

Full text
Abstract:
Thesis advisor: Richard Spinello<br>Thesis advisor: Stephen Pope<br>The information revolution is the single most important change in society since the printing press. At no other time has our society benefited from nearly limitless access to information and communication, and the changes brought on by this access have changed, and are changing, society in fundamental ways. Our homes, our workplaces, and our democracy have all been transformed by information and communication technologies.However, our ethics have not kept pace with our technological progress, and the immense changes brought by
APA, Harvard, Vancouver, ISO, and other styles
19

Rota, Andrea. "Hacking the Web 2.0 : user agency and the role of hackers as computational mediators." Thesis, London School of Economics and Political Science (University of London), 2016. http://etheses.lse.ac.uk/3313/.

Full text
Abstract:
This thesis studies the contested reconfigurations of computational agency within the domain of practices and affordances involved in the use of the Internet in everyday life (here labelled lifeworld Internet), through the transition of the Internet to a much deeper reliance on computation than at any previous stage. Computational agency is here considered not only in terms of capacity to act enabled (or restrained) by the computational layer but also as the recursive capacity to reconfigure the computational layer itself, therefore in turn affecting one’s own and others’ computational agency.
APA, Harvard, Vancouver, ISO, and other styles
20

Lira, Isadora Teixeira de. "Hacktivismo e organizações midiáticas: hackeamento de narrativas em wikileaks e mídia ninja." Universidade Federal da Paraíba, 2017. http://tede.biblioteca.ufpb.br:8080/handle/tede/9789.

Full text
Abstract:
Submitted by Leonardo Cavalcante (leo.ocavalcante@gmail.com) on 2018-04-06T19:36:10Z No. of bitstreams: 1 Arquivototal.pdf: 2079200 bytes, checksum: 06b2527ecca826172c32b42bb3ef3e3c (MD5)<br>Made available in DSpace on 2018-04-06T19:36:10Z (GMT). No. of bitstreams: 1 Arquivototal.pdf: 2079200 bytes, checksum: 06b2527ecca826172c32b42bb3ef3e3c (MD5) Previous issue date: 2017-08-21<br>Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES<br>The maxim that says "information is power" takes on a larger and more complex dimension when experienced in the era of the spread of Inte
APA, Harvard, Vancouver, ISO, and other styles
21

Howell, Christian Jordan-Michael. "The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6259.

Full text
Abstract:
System trespassing, which refers to the unauthorized access of computer systems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system trespassing little attention. The current study utilizes data gathered from a Chinese computer network to examine system trespasser behavior after exposure to one of three warning messages: an altruistic message used for moral persuasion (warning 1), a legal sanction threat (warning 2), and an ambiguous threat (warning 3). More specifically, the current study examines the temporal order of various keystrok
APA, Harvard, Vancouver, ISO, and other styles
22

Guimarães, Nathalia Muylaert Locks. "A tese como obra de arte na era de sua reprodutibilidade tecnica /." Araraquara, 2016. http://hdl.handle.net/11449/146686.

Full text
Abstract:
Orientador: Milton Lahuerta<br>Banca: Carlota Josefina M. C. Reis Boto<br>Banca: Gabriel Henrique Burnatelli de Antônio<br>Banca: Ana Lúcia de Castro<br>Banca: Raul Fiker<br>Resumo: O Objetivo dessa tese foi a de criar um protótipo de tese virtual, que esteja de acordo com as novas formas de produção de conteúdo. A criação desse protótipo, que nada mais é do que a transposição de uma tese escrita para a forma de blog permite que a Universidade se aproprie do espaço Web, uma vez que a Universidade tem perdido o seu papel enquanto instituição de formação. Em uma época de excesso de informação, o
APA, Harvard, Vancouver, ISO, and other styles
23

Emerson, William J. III. "Mechanics and The Essence of Technology." Bowling Green State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1395930126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Fontoura, Marcelo Crispim da. "Hackers e participação: uma análise de aplicativos de dados públicos do Brasil e seus criadores." Pontifícia Universidade Católica do Rio Grande do Sul, 2014. http://hdl.handle.net/10923/5691.

Full text
Abstract:
Made available in DSpace on 2014-03-26T02:01:20Z (GMT). No. of bitstreams: 1 000455564-Texto+Completo-0.pdf: 2427221 bytes, checksum: 395629c80655b9bca09b8c14836ed987 (MD5) Previous issue date: 2014<br>This work seeks to explore the phenomenon of public data applications in Brazil. Mobile or not, they are digital programs created from public databases of the government. These programs reformat the information so as to make them more comprehensive and publicized to the general public. These applications are created by programmers and people interested in computer science, which are dedicated
APA, Harvard, Vancouver, ISO, and other styles
25

Summers, Timothy Corneal. "HOW HACKERS THINK: A MIXED METHOD STUDY OF MENTAL MODELSAND COGNITIVE PATTERNS OF HIGH-TECH WIZARDS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=case1427809862.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Almeida, Fernanda Albuquerque de. "Machinima: entre a narrativa e a experimentação." Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/93/93131/tde-24042015-164451/.

Full text
Abstract:
Desde os primeiros filmes realizados em jogos digitais nos anos 1990, a noção de machinima vem sendo associada às convenções do cinema clássico. Com isso, ela falha em abranger a diversidade das obras audiovisuais produzidas em ambientes virtuais interativos em tempo real. Assim, o presente estudo busca contribuir com uma melhor compreensão dessa noção, através da análise interpretativa dos seus filmes experimentais e da bibliografia específica. Ele também pretende colaborar com a sua expansão como meio de comunicação e expressão artística. Em um primeiro momento, busca-se evidenciar a associa
APA, Harvard, Vancouver, ISO, and other styles
27

Bilan, Carolina, and Carl Hedberg. "Säkerhetshot och lösningar för privatpersoner med bredband." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1491.

Full text
Abstract:
As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats.
APA, Harvard, Vancouver, ISO, and other styles
28

Zufferey, Eric. "Changer le travail ou changer la société ? : Les hackers entre conformation à l’ordre social et volonté d’innover." Thesis, Lille 1, 2018. http://www.theses.fr/2018LIL1A001/document.

Full text
Abstract:
Cette thèse vise à interroger le hacking comme source de changement social, voire de subversion de l’ordre social. En mettant en jeu une forme d’autodidaxie et un décloisonnement social entre amateurs, professionnels et militants, il fait espérer des changements dans l’accès aux savoirs, ainsi que dans les manières de penser le rôle de la technologie au sein de nos sociétés. Dans le prolongement d’une sociologie bourdieusienne, l’enquête analyse comment la pratique du hacking s’articule aux instances classiques de la socialisation – famille, amis, institutions scolaires, etc. – et examine quel
APA, Harvard, Vancouver, ISO, and other styles
29

Treguer, Félix. "Pouvoir et résistance dans l’espace public : une contre-histoire d’Internet (XVe -XXIe siècle)." Thesis, Paris, EHESS, 2017. http://www.theses.fr/2017EHES0117/document.

Full text
Abstract:
Prenant pour point de départ les controverses contemporaines sur la liberté d’expression et la vie privée à l’ère numérique, cette thèse propose de revisiter l’histoire d’Internet au croisement de l’histoire du droit, des théories politiques et de l’histoire des sciences et des techniques. À travers une enquête de temps long sur l’affrontement des stratégies de pouvoir et de résistance associées aux techniques de communication, elle se veut une contribution à l’histoire de l’espace public et de l’activisme numérique. À partir de la « naissance » de l’imprimerie, la première partie retrace les
APA, Harvard, Vancouver, ISO, and other styles
30

Villavicencio, Terreros Felipe A. "Cybercrimes." IUS ET VERITAS, 2014. http://repositorio.pucp.edu.pe/index/handle/123456789/123541.

Full text
Abstract:
In recent times, due to the development of information technology,a new form of crime called informational crimes has developed. in relation to this new type of crime, a special criminal law was issued, whose purpose is to prevent and punish illegal activities that affect computer systems and datas, secret communications, and other legal goods that are affected withthis type of crime, such as equity, public faith and sexual freedom.<br>En los últimos tiempos, producto del desarrollo de las tecnologías informáticas se ha ido desarrollando una nueva forma de criminalidad denominada delitos infor
APA, Harvard, Vancouver, ISO, and other styles
31

Fontoura, Marcelo Crispim da. "Hackers e participa??o : uma an?lise de aplicativos de dados p?blicos do Brasil e seus criadores." Pontif?cia Universidade Cat?lica do Rio Grande do Sul, 2014. http://tede2.pucrs.br/tede2/handle/tede/4561.

Full text
Abstract:
Made available in DSpace on 2015-04-14T14:41:54Z (GMT). No. of bitstreams: 1 455564.pdf: 2427221 bytes, checksum: 395629c80655b9bca09b8c14836ed987 (MD5) Previous issue date: 2014-01-14<br>This work seeks to explore the phenomenon of public data applications in Brazil. Mobile or not, they are digital programs created from public databases of the government. These programs reformat the information so as to make them more comprehensive and publicized to the general public. These applications are created by programmers and people interested in computer science, which are dedicated to explore gov
APA, Harvard, Vancouver, ISO, and other styles
32

Bachmann, Michael. "WHAT MAKES THEM CLICK? APPLYING THE RATIONAL CHOICE PERSPECTIVE TO THE HACKING UNDERGROUND." Doctoral diss., University of Central Florida, 2008. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2277.

Full text
Abstract:
The increasing dependence of modern societies, industries, and individuals on information technology and computer networks renders them ever more vulnerable to attacks on critical IT infrastructures. While the societal threat posed by hackers and other types of cyber-criminals has been growing significantly in the last decade, main-stream criminology has only recently begun to realize the significance of this threat. Cyber-criminology is slowly emerging as a subfield of criminological study and has yet to overcome many of the problems other areas of criminological research have already mastere
APA, Harvard, Vancouver, ISO, and other styles
33

Bach, Sirlei Lourdes. "Contribuição do hacker para o desenvolvimento tecnológico da informática." Florianópolis, SC, 2001. http://repositorio.ufsc.br/xmlui/handle/123456789/82176.

Full text
Abstract:
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós-Graduação em Ciência da Computação.<br>Made available in DSpace on 2012-10-19T12:25:48Z (GMT). No. of bitstreams: 0Bitstream added on 2014-09-25T20:01:43Z : No. of bitstreams: 1 184565.pdf: 8279207 bytes, checksum: 24d5f3b085dc3ef82704a988dfaf46c0 (MD5)<br>Dada a enorme importância política, econômica e social da Internet, urge realizar-se um estudo sobre a evolução das formas de invasão dos chamados piratas eletrônicos. Para tal, buscou-se primeiramente classificá-los de acordo com a terminolo
APA, Harvard, Vancouver, ISO, and other styles
34

Levine, John G. (John Glenn). "A Methodology for Detecting and Classifying Rootkit Exploits." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5139.

Full text
Abstract:
A Methodology for Detecting and Classifying Rootkit Exploits John G. Levine 164 Pages Directed by Dr. Henry L. Owen We propose a methodology to detect and classify rootkit exploits. The goal of this research is to provide system administrators, researchers, and security personnel with the information necessary in order to take the best possible recovery actions concerning systems that are compromised by rootkits. There is no such methodolgoy available at present to perform this function. This may also help to detect and fingerprint additional instances and prevent further security instances
APA, Harvard, Vancouver, ISO, and other styles
35

Kelly, Nicholas M. "The freedom of information hacked: console cowboys, computer wizards, and personal freedom in the digital age." Diss., University of Iowa, 2016. https://ir.uiowa.edu/etd/6778.

Full text
Abstract:
“The Freedom of Information Hacked: Console Cowboys, Computer Wizards, and Personal Freedom in the Digital Age” examines depictions of computer hackers in fiction, the media, and popular culture, assessing how such depictions both influence and reflect popular conceptions of hackers and what they do. In doing so, the dissertation demonstrates the central concerns of hacker stories—concerns about digital security, privacy, and the value of information—have become the concerns of digital culture as a whole, hackers laying bare collective hopes and fears regarding digital networks.
APA, Harvard, Vancouver, ISO, and other styles
36

Menezes, Karina Moreira. "Pirâmide da pedagogia hacker =[vivências do (in) possível]." Faculdade de Educação, 2018. http://repositorio.ufba.br/ri/handle/ri/27168.

Full text
Abstract:
Submitted by Karina Moreira Menezes (kaikamenezes@gmail.com) on 2018-08-23T18:04:29Z No. of bitstreams: 1 Kamenezes_P2H_EntregaPublica_Repositorio.pdf: 3636178 bytes, checksum: 81e197b6d5183b8028c2d340f16e8cb3 (MD5)<br>Rejected by Ana Miria Moreira (anamiriamoreira@hotmail.com), reason: Prezada Karina,gentileza retificar a ficha catalográfica, que deve ser exclusivamente elaborada pela bibliotecária responsável da Biblioteca Anísio Teixeira da Faculdade de Educação, por favor entrar em contato. (71) 3283-7255/7256; e-mail: biedu@ufba.br on 2018-08-24T17:24:03Z (GMT)<br>Submitted by Karina Mo
APA, Harvard, Vancouver, ISO, and other styles
37

Albuquerque, Mônica Ramalho de. "Existe vida além do código binário? Os hackers e o redimensionamento de princípios modernos em práticas pós-modernas na sociedade informacional." Universidade Federal da Paraí­ba, 2009. http://tede.biblioteca.ufpb.br:8080/handle/tede/7266.

Full text
Abstract:
Made available in DSpace on 2015-05-14T13:26:56Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 440560 bytes, checksum: c6c94dec998cdfdda6c1e605e4e45a52 (MD5) Previous issue date: 2009-12-02<br>Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES<br>After the development of new information and communication technologies in the twentieth century, new social and aesthetic phenomena emerged by the adaptation of cultural, political and economic elements reestablishment. The hacker s and their actions are an unfolding of this scenario and they are part of the computer undergrou
APA, Harvard, Vancouver, ISO, and other styles
38

Gupta, Nirbhay. "Determining the effectiveness of deceptive honeynets." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1303.

Full text
Abstract:
Over the last few years, incidents of network based intrusions have rapidly increased, due to the increase and popularity of various attack tools easily available for download from the Internet. Due to this increase in intrusions, the concept of a network defence known as Honeypots developed. These honeypots are designed to ensnare attackers and monitor their activities. Honeypots use the principles of deception such as masking, mimicry, decoying, inventing, repackaging and dazzling to deceive attackers. Deception exists in various forms. It is a tactic to survive and defeat the motives of att
APA, Harvard, Vancouver, ISO, and other styles
39

Paulo, Luis Gonzaga de. "Um modelo complementar para aprimorar a segurança da informação no SDLC para dispositivos móveis: SDD - security driven development." Universidade Tecnológica Federal do Paraná, 2015. http://repositorio.utfpr.edu.br/jspui/handle/1/1895.

Full text
Abstract:
O uso de dispositivos móveis por um número cada vez maior de pessoas, e em um número crescente de atividades que requerem mais segurança da informação, coloca em evidência a necessidade de prover segurança nos softwares desse ambiente. O aspecto de segurança da informação em dispositivos móveis é preocupante. Entretanto os modelos utilizados pela indústria de software – e os encontrados na literatura atual - no desenvolvimento de aplicações móveis com requisitos de segurança da informação de alto nível ainda não respondem às necessidades de mais segurança reclamadas pelos usuários. O presente
APA, Harvard, Vancouver, ISO, and other styles
40

Ogbanufe, Obiageli. "Three Essays on Information Security Risk Management." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157576/.

Full text
Abstract:
Today's environment is filled with the proliferation of cyber-attacks that result in losses for organizations and individuals. Hackers often use compromised websites to distribute malware, making it difficult for individuals to detect. The impact of clicking through a link on the Internet that is malware infected can result in consequences such as private information theft and identity theft. Hackers are also known to perpetrate cyber-attacks that result in organizational security breaches that adversely affect organizations' finances, reputation, and market value. Risk management approaches f
APA, Harvard, Vancouver, ISO, and other styles
41

DiGiusto, Dennis Michael. "A protection motivation theory approach to home wireless network security in New Zealand establishing if groups of concerned wireless network users exist and exploring characteristics of behavioral intention : submitted to the School of Information Management, Victoria University of Wellington in partial fulfilment of the requirements for the degree of Master of Information Management /." ResearchArchive@Victoria e-Thesis, 2008. http://hdl.handle.net/10063/1148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Buys, Stephanus. "Log analysis aided by latent semantic mapping." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002963.

Full text
Abstract:
In an age of zero-day exploits and increased on-line attacks on computing infrastructure, operational security practitioners are becoming increasingly aware of the value of the information captured in log events. Analysis of these events is critical during incident response, forensic investigations related to network breaches, hacking attacks and data leaks. Such analysis has led to the discipline of Security Event Analysis, also known as Log Analysis. There are several challenges when dealing with events, foremost being the increased volumes at which events are often generated and stored. Fur
APA, Harvard, Vancouver, ISO, and other styles
43

Withers, Kim. "A Psychosocial Behavioral Attribution Model: Examining the Relationship Between the “Dark Triad” and Cyber-Criminal Behaviors Impacting Social Networking Sites." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1072.

Full text
Abstract:
This study proposes that individual personality characteristics and behavioral triggering effects come together to motivate online victimization. It draws from psychology’s current understanding of personality traits, attribution theory, and criminological research. This study combines the current computer deviancy and hacker taxonomies with that of the Dark Triad model of personality mapping. Each computer deviant behavior is identified by its distinct dimensions of cyber-criminal behavior (e.g., unethical hacking, cyberbullying, cyberstalking, and identity theft) and analyzed against the Dar
APA, Harvard, Vancouver, ISO, and other styles
44

Krutisch, Dorothee. "Strafbarkeit des unberechtigten Zugangs zu Computerdaten und -systemen /." Frankfurt am Main [u.a.] : Lang, 2004. http://www.gbv.de/dms/spk/sbb/recht/toc/376082763.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Gozukeles, Ibrahim Izlem. "Free And Open Source Software In Turkey." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607173/index.pdf.

Full text
Abstract:
In recent years, there has been growing interest of governments and firms for Free and Open Source Software (FOSS). However, FOSS is still a puzzlement for a wide spectrum of academic disciplines. Social scientists ask why FOSS hackers participate in FOSS if they do not get any monetary rewards. On the other hand firms ask, how a firm can earn money from FOSS. In this study, motivations of FOSS hackers and firms are taken as an interrelated phenomenon. For FOSS hackers, social and technical aspects of FOSS are essential. On the contrary to FOSS hackers, firms have profit oriented goals. In thi
APA, Harvard, Vancouver, ISO, and other styles
46

Думчиков, Михайло Олександрович, Михаил Александрович Думчиков, Mykhailo Oleksandrovych Dumchykov, Олена Сергіївна Бондаренко, Елена Сергеевна Бондаренко та Olena Serhiivna Bondarenko. "Сучасні аспекти кібербезпеки в контексті глобальних загроз". Thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/78666.

Full text
Abstract:
В умовах глобальних загроз забезпечення безпеки в світі, вимагає координації і врегулювання багатьох політичних і економічних питань. Зокрема, це осередки цивільних, міжетнічних конфліктів і воєн, продовольчі загрози, негативні наслідки зміни клімату, забруднення навколишнього середовища, виснаження природнихресурсів і уповільнення їх повторного відновлення. Однак серед усіх компонентівзабезпечення безпеки з’явився новий і одночасно складний елемент безпеки – кібербезпека. Щорічно зростає збиток великих організацій, компаній, окремих громадян і ділових людей від кібер атак і нападів зловмисник
APA, Harvard, Vancouver, ISO, and other styles
47

Widyasari, Nuria. "Les hackers d'Airputih dans la reconstruction de ACEH : Indonésie, Post-Tsunami 2004 : contribution à l'Anthropologie des Sciences et Technologies de l'Information et de la Communication." Electronic Thesis or Diss., Paris 8, 2014. http://www.theses.fr/2014PA080003.

Full text
Abstract:
Cette étude utilise à titre principal la théorie du « milieu » de Michel Serres dans le cadre de son grand concept de système de communication. Cette théorie considère les bruits qui environnent un message dans un canal de communication, comme des éléments importants qui décideront si le message est bien compris (ou non) par le Récepteur.Cette étude relie la théorie à un contexte plus large de la communication dans la province d’Aceh, en Indonésie, et reflète les éléments socio-politico-culture de sa reconstruction, après le tsunami de 2004.En appliquant l'approche de l'Anthropologie aux Techn
APA, Harvard, Vancouver, ISO, and other styles
48

Widyasari, Nuria. "Les hackers d'Airputih dans la reconstruction de ACEH : Indonésie, Post-Tsunami 2004 : contribution à l'Anthropologie des Sciences et Technologies de l'Information et de la Communication." Thesis, Paris 8, 2014. http://www.theses.fr/2014PA080003.

Full text
Abstract:
Cette étude utilise à titre principal la théorie du « milieu » de Michel Serres dans le cadre de son grand concept de système de communication. Cette théorie considère les bruits qui environnent un message dans un canal de communication, comme des éléments importants qui décideront si le message est bien compris (ou non) par le Récepteur.Cette étude relie la théorie à un contexte plus large de la communication dans la province d’Aceh, en Indonésie, et reflète les éléments socio-politico-culture de sa reconstruction, après le tsunami de 2004.En appliquant l'approche de l'Anthropologie aux Techn
APA, Harvard, Vancouver, ISO, and other styles
49

Burtet, Cecilia Gerhardt. "Os saberes desenvolvidos nas práticas em um hackerspace de Porto Alegre." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2014. http://hdl.handle.net/10183/109016.

Full text
Abstract:
Na tentativa de compreender como os saberes são desenvolvidos nas práticas de um grupo em um hackerspace, este estudo parte da perspectiva da aprendizagem baseada em práticas pelo viés da abordagem teórico-metodológica da teoria atorrede para acompanhar a realização das atividades cotidianas de um coletivo em um hackerspace. Sem definições prévias estabelecidas acerca do conceito de hackerspace, o estudo tem como objetivo compreender como os saberes são desenvolvidos nas práticas de um grupo, em um hackerspace, e como são enactados pelas relações entre os diversos elementos heterogêneos da red
APA, Harvard, Vancouver, ISO, and other styles
50

Sanches, Wilken David. "O movimento de software livre e a produção colaborativa do conhecimento." Pontifícia Universidade Católica de São Paulo, 2007. http://tede2.pucsp.br/handle/handle/2676.

Full text
Abstract:
Made available in DSpace on 2016-04-25T20:21:49Z (GMT). No. of bitstreams: 1 Wilken.pdf: 1398546 bytes, checksum: 829e2098dbfebfbb3ec091d6b72d1bfd (MD5) Previous issue date: 2007-05-25<br>This dissertation approaches the construction of a collaborative model of knowledge production disseminated by the Free Software Movement and its opposition to the current law of intelectual property. It describes the genesis of the free software movement as well as how it has become consolidated as an independent domain of knowledge production. In order to better illustrate the model of production proposed
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!