To see the other types of publications on this topic, follow the link: Hacking.

Journal articles on the topic 'Hacking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Hacking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mohamad, Ani Munirah, Zaiton Hamin, Mohd Zakhiri Md Nor, and Nurhazman Abdul Aziz. "SELECTED THEORIES ON CRIMINALISATION OF HACKING." International Journal of Law, Government and Communication 6, no. 22 (March 10, 2021): 168–78. http://dx.doi.org/10.35631/ijlgc.6220016.

Full text
Abstract:
Hacking or unauthorised access is criminalised in many jurisdictions, including Malaysia, Singapore, the United Kingdom, Hong Kong, and a few other countries. Hacking is the act of gaining access through the computer system or network without proper authority or exceeding the original authority given to him. Many commentators and researchers have reported on the conceptual and legal aspects of hacking. However, hacking's theoretical, conceptual, and legal aspects have remained under-researched. Therefore, this paper's primary objective is to outline the various theories, which could inform the criminalisation of hacking. The theories of routine activities, deterrence theory, social learning and self-control, general strain theory, and deviant subcultures are deliberated in this paper alongside illustrations within the context of hacking. This paper will shed light on the body of literature and contribute to a better understanding of hacking criminalisation from various theories discussed in this paper. Future research should be directed to provide empirical evidence of applying the theory to hacking criminalisation.
APA, Harvard, Vancouver, ISO, and other styles
2

Cekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking." Communications - Scientific letters of the University of Zilina 20, no. 2 (June 30, 2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.

Full text
Abstract:
Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker’s point of view as well as the defender’s point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together with the weakness that hackers can use for their own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on the mobile phones and on possible attacks in the announced flood of the internet of things (next IoT) devices.
APA, Harvard, Vancouver, ISO, and other styles
3

Kindi, Vasso. "Taking a Look at History." Journal of the Philosophy of History 8, no. 1 (March 24, 2014): 96–117. http://dx.doi.org/10.1163/18722636-12341267.

Full text
Abstract:
AbstractIan Hacking urged that philosophers take a look at history. He called his recommendation the “Lockean imperative”. In the present paper I examine how Hacking understands the relation between philosophy and history by concentrating on his 1990 essay “Two kinds of ‘New Historicism’ for philosophers”. In this particular paper Hacking uses the visual metaphor of ‘taking a look’ which can also be found in the work of two other philosophers, Kuhn and Foucault, who are called by Hacking his mentors. I argue that in the work of these three philosophers, as well as in the work of Wittgenstein who has influenced both Hacking and Kuhn, one can find interest and attention to particulars which can be furnished by history, an approach which cultivates a sensibility for difference. I begin by presenting Hacking’s understanding of the relation of history to philosophy and then discuss what the Lockean imperative is. I concentrate on Locke’s understanding of history which differs considerably from the contemporary and end by focusing on the similarities in the work of the aforementioned thinkers.
APA, Harvard, Vancouver, ISO, and other styles
4

Verständig, Dan, and Janne Stricker. "Hacking Inequality." MedienPädagogik: Zeitschrift für Theorie und Praxis der Medienbildung 52 (February 16, 2023): 319–39. http://dx.doi.org/10.21240/mpaed/52/2023.02.16.x.

Full text
Abstract:
Der planvolle Umgang mit digitalen Technologien kann als eine zentrale Herausforderung in medien- und schulpädagogischen Handlungsfeldern gesehen werden. Dabei ist weitestgehend offen, welche Bedeutung Partizipation und Teilhabe im Hinblick auf den digitalen Wandel haben und wie sie sich konkret umsetzen lassen. Der Beitrag will ausgehend vom Begriff des Hackings eine Perspektive auf digitale Ungleichheit und mediale Praktiken entwickeln, bei der kreative Ansätze im Umgang mit digitalen Technologien im Vordergrund stehen. Hacking meint dabei die unkonventionelle Lösung von Problemen. Die These lautet, dass eine nachhaltige Gestaltung von formalen Lern- und Bildungssettings in der digitalen Welt vor allem dadurch erfolgen kann, dass Schule im Horizont der Digitalität neu erdacht und damit sprichwörtlich gehackt wird.
APA, Harvard, Vancouver, ISO, and other styles
5

Utomo, Galih Aryo. "ETHICAL HACKING." Cyber Security dan Forensik Digital 2, no. 1 (May 1, 2019): 8–15. http://dx.doi.org/10.14421/csecurity.2019.2.1.1418.

Full text
Abstract:
Ethical Hacking is done by companies in anticipation of system security loopholes. Ethical hacking is done by someone who has the ability like a hacker who is able to attack a system but has the motivation to help companies find security gaps that companies will use to evaluate their systems. This paper explains the importance of information and why it must be maintained and how an ethical hacker does his work.
APA, Harvard, Vancouver, ISO, and other styles
6

Knox, Hannah. "Hacking anthropology." Journal of the Royal Anthropological Institute 27, S1 (March 15, 2021): 108–26. http://dx.doi.org/10.1111/1467-9655.13483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cohen, Matt. "Hacking Colonialism." PMLA/Publications of the Modern Language Association of America 135, no. 3 (May 2020): 559–64. http://dx.doi.org/10.1632/pmla.2020.135.3.559.

Full text
Abstract:
Listen: Dread, panic, and horror are the great teasers, and tragic wisdom is our best chance in a dangerous world.—Gerald Vizenor, Postindian ConversationsUntil that day . . .Until all are one . . .Continue the struggle . . .—Optimus Prime, in The Transformers: The Movie“American people are being pushed into new social forms because of the complex nature of modern communications and transportation, and the competing forms are neotribalism and neofeudalism,” the Standing Rock Sioux thinker Vine Deloria, Jr., wrote in 1970 (14). That insight was inspired in part by the work of Marshall McLuhan, which also led Deloria to suggest something even more provocative:Indian people are just as subject to the deluge of information as are other people. In the last decade most reservations have come within the reach of televisions and computers. In many ways Indian people are just as directed by the electric nature of our universe as any other group. But the tribal viewpoint simply absorbs what is reported to it and immediately integrates it into the experience of the group. . . . The more that happens, the better the tribe seems to function and the stronger it appears to get. Of all the groups in the modern world Indians are best able to cope with the modern situation.
APA, Harvard, Vancouver, ISO, and other styles
8

Farsole, Ajinkya A., Amruta G. Kashikar, and Apurva Zunzunwala. "Ethical Hacking." International Journal of Computer Applications 1, no. 10 (February 25, 2010): 14–20. http://dx.doi.org/10.5120/229-380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pratt, Mike. "Raptor Hacking." Wildlife Rehabilitation Bulletin 29, no. 1 (June 30, 2011): 34–38. http://dx.doi.org/10.53607/wrb.v29.78.

Full text
Abstract:
In the raptor rehabilitation field, hacking is a special procedure for raising juvenile raptors that simulates natural fledging and allows young raptors—those that cannot yet fly and either are still restricted to or just leaving the nest—a gradual acclimation to independence. Hacking also is known as a ‘soft release.’ This paper focuses on hacking raptors and discusses advantages, disadvantages, hacking age, procedures, hack box design and construction, site selection, fledging age of raptor species, and hack release.
APA, Harvard, Vancouver, ISO, and other styles
10

Dustin Rubinstein, C., and Mariana F. Wolfner. "Reproductive hacking." Fly 8, no. 2 (March 27, 2014): 80–85. http://dx.doi.org/10.4161/fly.28396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kuehnel, Karin. "Hacking hemagglutinin." Nature Chemical Biology 13, no. 12 (December 2017): 1203. http://dx.doi.org/10.1038/nchembio.2523.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Nolan, Jason, and Michelle Levesque. "Hacking human." ACM SIGGROUP Bulletin 25, no. 2 (February 2005): 33–37. http://dx.doi.org/10.1145/1067721.1067728.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Lakoff, Andrew. "Ian Hacking." Public Culture 24, no. 1 (2012): 217–32. http://dx.doi.org/10.1215/08992363-1443610.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Greenhalgh, T. "Genome hacking." BMJ 338, apr01 1 (April 1, 2009): b1322. http://dx.doi.org/10.1136/bmj.b1322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Mcfedries, Paul. "Hacking DNA." IEEE Spectrum 46, no. 10 (October 2009): 23. http://dx.doi.org/10.1109/mspec.2009.5267990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Roberts, Paula. "Hacking Cyberspace." ACM SIGCAS Computers and Society 31, no. 4 (December 2001): 41–42. http://dx.doi.org/10.1145/572306.572314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Palmer, C. C. "Ethical hacking." IBM Systems Journal 40, no. 3 (2001): 769–80. http://dx.doi.org/10.1147/sj.403.0769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Davies, Sarah R. "Characterizing Hacking." Science, Technology, & Human Values 43, no. 2 (April 21, 2017): 171–97. http://dx.doi.org/10.1177/0162243917703464.

Full text
Abstract:
The rise of a “maker movement,” located in hacker and makerspaces and involving the democratization of technologies of production and support of grassroots innovation, is receiving increasing attention from science and technology studies (STS) scholarship. This article explores how hacking is characterized by users of hacker and makerspaces and relates this to broader discussion of the maker movement as, for instance, promoting innovation, engaged in countercultural critique, or as accessible to anyone. Based on an interview study of users of twelve hacker and makerspaces across the United States, it argues that for these users, hacking is not about politics, commercial innovation, or critique. Rather, it is understood as a lifestyle one subscribes to, a meaningful leisure activity, or as providing access to a welcoming and close-knit community. Contrary to expectations of the maker movement as heralding social change, the benefits of hacking were viewed as personal rather than political, economic, or social; similarly, democratization of technology was experienced as rather incidental to most hackers’ and makers’ experiences.
APA, Harvard, Vancouver, ISO, and other styles
19

Wright, Alex. "Hacking cars." Communications of the ACM 54, no. 11 (November 2011): 18–19. http://dx.doi.org/10.1145/2018396.2018403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Amato, Patrick. "Hacking primes." Ubiquity 2003, February (February 2003): 1. http://dx.doi.org/10.1145/764014.764015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Heslen, John J. "Neurocognitive hacking." Politics and the Life Sciences 39, no. 1 (2020): 87–100. http://dx.doi.org/10.1017/pls.2020.3.

Full text
Abstract:
AbstractThis article presents a discussion of neurocognitive hacking and its potential for use at the strategic, operational, and tactical levels of cyber conflict. Neurocognitive hacking refers to the ability to activate specific neural areas of the brain, via subliminal or supraliminal stimuli, to shape the behavioral outcomes of an adversary. Research suggests that awareness of mortality-related stimuli has neural correlates in the right amygdala and left anterior cingulate cortex and mediates negative behavior toward out-group members, including unconscious discriminatory behavior. Given its in-group/out-group dynamic, the phenomenon could be exploited for use in information operations toward target populations, specifically ones that are multiethnic, multicultural, or multireligious. Although development of the theoretical framework behind neurocognitive hacking is ongoing, mortality-related stimuli are proposed to activate one’s unconscious vigilance system to further evaluate the locus and viability of the suspect stimuli. Research suggests that the subsequent discriminatory affective reactions directed toward out-group members are representative of automatic heuristics evolved to protect the organism in the event a stimulus represents a more serious threat to survival. Therefore, presenting mortality-related stimuli over computer networks to targeted audiences may facilitate the ingestion of tailored propaganda or shaping of specific behavioral outcomes within a population, including sowing division in a target community or weakening support for a specific political regime.
APA, Harvard, Vancouver, ISO, and other styles
22

Tantillo, Dean. "Hacking Hydrogen." American Scientist 108, no. 1 (2020): 22. http://dx.doi.org/10.1511/2020.108.1.22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Barber, Richard. "Hacking Techniques." Computer Fraud & Security 2001, no. 3 (March 2001): 9–12. http://dx.doi.org/10.1016/s1361-3723(01)03014-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Borrows, Peter. "Car hacking." New Scientist 217, no. 2901 (January 2013): 33. http://dx.doi.org/10.1016/s0262-4079(13)60237-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Soupionis, Yannis, and Dimitris Gritzalis. "Hacking VoIP." Computers & Security 32 (February 2013): 267. http://dx.doi.org/10.1016/j.cose.2012.09.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Wesson, Kyle, and Todd Humphreys. "Hacking Drones." Scientific American 309, no. 5 (October 15, 2013): 54–59. http://dx.doi.org/10.1038/scientificamerican1113-54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Carlson, R. "Hacking humanity." IEEE Spectrum 39, no. 12 (December 2002): 47–48. http://dx.doi.org/10.1109/mspec.2002.1088455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

MIZUNO, Naoki, Thomas WESTFECHTEL, Shotaro KOJIMA, Koichiro KAMATA, Kazunori OHNO, Takahiro SUZUKI, and Satoshi TADOKORO. "Hacking COMS." Proceedings of JSME annual Conference on Robotics and Mechatronics (Robomec) 2018 (2018): 1P2—C07. http://dx.doi.org/10.1299/jsmermd.2018.1p2-c07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Owaki, Dai, Volker Dürr, and Josef Schmitz. "Motion Hacking." Proceedings of JSME annual Conference on Robotics and Mechatronics (Robomec) 2020 (2020): 2A1—K06. http://dx.doi.org/10.1299/jsmermd.2020.2a1-k06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Rid, Thomas, and Ben Buchanan. "Hacking Democracy." SAIS Review of International Affairs 38, no. 1 (2018): 3–16. http://dx.doi.org/10.1353/sais.2018.0001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Navarro, Renato. "Poetic hacking." Voz e Cena 3, no. 01 (June 27, 2022): 58–75. http://dx.doi.org/10.26512/vozcen.v3i01.42948.

Full text
Abstract:
Este artigo propõe uma reflexão sobre possibilidades poéticas e aspectos políticos de intervenções performativas em espaços públicos controlados, na forma de ações artísticas que se infiltram no ambiente, o mimetizam ou o transformam esteticamente por meio de dispositivos sonoros. Primeiramente, é apresentada a inserção de uma narrativa decolonial no ambiente expositivo do museu etnográfico Welt de Viena na performance Audioguías de la Verdad. Em seguida, é analisado de que modo os dispositivos de controle sonoros do transporte ferroviário da cidade de São Paulo são subvertidos na performance Est[ação] Marielle e no espetáculo A Cidade dos Rios Invisíveis.
APA, Harvard, Vancouver, ISO, and other styles
32

McFedries, P. "Hacking unplugged [review of hacking activities and terminology]." IEEE Spectrum 41, no. 2 (February 2004): 80. http://dx.doi.org/10.1109/mspec.2004.1265143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Adam, A. E. "Hacking into Hacking: Gender and the Hacker Phenomenon." ACM SIGCAS Computers and Society 33, no. 4 (December 31, 2003): 3. http://dx.doi.org/10.1145/968358.968360.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Putra, Jay Sadikin Abdul Azis Mandala. "HACKING AS A CHALLENGE FOR CHANGE AND THE DEVELOPMENT OF CYBER LAW IN INDONESIA." Jurnal Ilmu Hukum Tambun Bungai 8, no. 2 (December 7, 2023): 344–55. http://dx.doi.org/10.61394/jihtb.v8i2.279.

Full text
Abstract:
This research explores the legal provisions for hacking as a cyber crime in Indonesia with a focus on the legal framework for hacking, criminal acts of hacking, and the challenges faced in dealing with changes and developments in cyber law. Indonesia's hacking legal framework, which primarily consists of the Information and Electronic Transactions Law (UU ITE), creates an important legal foundation for dealing with hacking. However, there are shortcomings in legal provisions that must be updated regularly to keep up with technological developments and increasingly sophisticated hacking tactics. This research aims to analyze the legal provisions that regulate hacking as a cyber crime in Indonesia. This includes an understanding of relevant legislation, the implementation of the law, as well as the obstacles faced in law enforcement related to hacking. This research uses normative legal research methods. By understanding the legal framework for hacking, criminal acts of hacking, and the challenges of changing cyber law in Indonesia, this research aims to provide deeper insight into how this country faces the threat of hacking in an increasingly complex digital era. With ongoing improvements in the legal framework, increased law enforcement capacity, and better public awareness, Indonesia can be more effective in protecting its society and digital infrastructure from the threat of cybercrime.
APA, Harvard, Vancouver, ISO, and other styles
35

Lentz, Lene Wacher, and Jens Myrup Pedersen. "”Hacking” – forbrydelse eller digitalt selvforsvar?" Økonomi & Politik 93, Oktober (October 20, 2020): 76–90. http://dx.doi.org/10.7146/okonomi-og-politik.v93ioktober.122529.

Full text
Abstract:
Vi kender først og fremmest ”hacking” som en forbrydelse. De større, opsigtsvækkende ”hacking”-angreb hører vi om i nyhederne. Dog bliver ”hacking”-metoden nu også italesat som en it-sikkerheds-kompetence. Således udbydes flere steder kurser i ”hacking”, og Forsvarets Efterretningstjeneste har oprettet et ”Hackerakademi” for at rekruttere talenter til statens tjeneste. Begrebet ”hacking” kan skabe forvirring, for alt er ikke tilladt for at optimere eller teste sikkerheden ved it-systemer. Denne artikel klarlægger, hvornår der straffes for ”hacking” efter straffeloven. Desuden undersøges, om en it-sikkerhedsaktør må bruge ”hacking” som et forsvar, når it-systemer bliver angrebet af en fjendtlig ”hacker”. I artiklen illustreres, at det kan være vanskeligt at forudsige, hvor grænserne for strafansvar går for den, der vil optimere sikkerheden ved sine systemer.
APA, Harvard, Vancouver, ISO, and other styles
36

Gupta, Alisha, and Frank Bosco. "Tempest in a teacup: An analysis of p-Hacking in organizational research." PLOS ONE 18, no. 2 (February 24, 2023): e0281938. http://dx.doi.org/10.1371/journal.pone.0281938.

Full text
Abstract:
We extend questionable research practices (QRPs) research by conducting a robust, large-scale analysis of p-hacking in organizational research. We leverage a manually curated database of more than 1,000,000 correlation coefficients and sample sizes, with which we calculate exact p-values. We test for the prevalence and magnitude of p-hacking across the complete database as well as various subsets of the database according to common bivariate relation types in the organizational literature (e.g., attitudes-behaviors). Results from two analytical approaches (i.e., z-curve, critical bin comparisons) were consistent in both direction and significance in nine of 18 datasets. Critical bin comparisons indicated p-hacking in 12 of 18 subsets, three of which reached statistical significance. Z-curve analyses indicated p-hacking in 11 of 18 subsets, two of which reached statistical significance. Generally, results indicated that p-hacking is detectable but small in magnitude. We also tested for three predictors of p-hacking: Publication year, journal prestige, and authorship team size. Across two analytic approaches, we observed a relatively consistent positive relation between p-hacking and journal prestige, and no relationship between p-hacking and authorship team size. Results were mixed regarding the temporal trends (i.e., evidence for p-hacking over time). In sum, the present study of p-hacking in organizational research indicates that the prevalence of p-hacking is smaller and less concerning than earlier research has suggested.
APA, Harvard, Vancouver, ISO, and other styles
37

Jordan, Tim. "A genealogy of hacking." Convergence: The International Journal of Research into New Media Technologies 23, no. 5 (April 6, 2016): 528–44. http://dx.doi.org/10.1177/1354856516640710.

Full text
Abstract:
Hacking is now a widely discussed and known phenomenon, but remains difficult to define and empirically identify because it has come to refer to many different, sometimes incompatible, material practices. This article proposes genealogy as a framework for understanding hacking by briefly revisiting Foucault’s concept of genealogy and interpreting its perspectival stance through the feminist materialist concept of the situated observer. Using genealogy as a theoretical frame, a history of hacking will be proposed in four phases. The first phase is the ‘prehistory’ of hacking in which four core practices were developed. The second phase is the ‘golden age of cracking’ in which hacking becomes a self-conscious identity and community and is for many identified with breaking into computers, even while non-cracking practices such as free software mature. The third phase sees hacking divide into a number of new practices even while old practices continue, including the rise of serious cybercrime, hacktivism, the division of Open Source and Free Software and hacking as an ethic of business and work. The final phase sees broad consciousness of state-sponsored hacking, the re-rise of hardware hacking in maker labs and hack spaces and the diffusion of hacking into a broad ‘clever’ practice. In conclusion, it will be argued that hacking consists across all the practices surveyed of an interrogation of the rationality of information technocultures enacted by each hacker practice situating itself within a particular technoculture and then using that technoculture to change itself, both in changing potential actions that can be taken and changing the nature of the technoculture itself.
APA, Harvard, Vancouver, ISO, and other styles
38

Ul Haq, Hafiz Burhan, Muhammad Zulkifl Hassan, Muhammad Zunnurain Hussain, Rabia Aslam Khan, Sabreena Nawaz, Hassan Raza Khokhar, and Mahnoor Arshad. "The Impacts of Ethical Hacking and its Security Mechanisms." Pakistan Journal of Engineering and Technology 5, no. 4 (December 29, 2022): 29–35. http://dx.doi.org/10.51846/vol5iss4pp29-35.

Full text
Abstract:
Hacking is a typical method for breaching personal and confidential information. As a result, hacking is also known as infiltration. Intrusions, on the other hand, were not always recognized as theft and were employed for productive purposes. A person or corporation that does ethical hacking and receives incentives from a network or system owner for testing can enter an apparatus (system or network) to locate, repair, and expose network flaws. Most ethical hackers, also known as black hat hackers, test systems using different approaches, methodologies, and tools. Because today's life is lived in a digital world, we need to protect our privacy from cyber-attacks. The proposed paper discussed ethical hacking and its ramifications, in which black hackers "hack" networks. The proposed research emphasizes ethical hacking tactics. This research also examines the impact of ethical hacking on business, education, health, society, the workplace, technology, sensitive information, and human life. Finally, a brief survey based on certain questions is better to grasp the public's understanding of ethical hacking. In summary, this research offers the user fascinating and helpful information when working on ethical hacking.
APA, Harvard, Vancouver, ISO, and other styles
39

Booth, Jack. "Hacking and Hackerspaces." New Formations 94, no. 94 (March 1, 2018): 180–82. http://dx.doi.org/10.3898/newf:94.rev05.2018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ott. "Hacking the System." Journal of Feminist Studies in Religion 31, no. 2 (2015): 140. http://dx.doi.org/10.2979/jfemistudreli.31.2.140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Savaget, Paulo, Steve Evans, Frank Tietze, and Ali Kharrazi. "Hacking System Change." Academy of Management Proceedings 2019, no. 1 (August 1, 2019): 11579. http://dx.doi.org/10.5465/ambpp.2019.11579abstract.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Rasch, Elisabet Dueholm. "Hacking the System." Contention 10, no. 1 (June 1, 2022): 65–80. http://dx.doi.org/10.3167/cont.2022.100106.

Full text
Abstract:
In this paper, I explore how teaching can be an act of activism; a way of hacking the neoliberal university. In doing so, I draw on our experiences with the course “Resistance, Power and Movements.” I argue that activist teaching not only involves teaching about issues related to social justice and resistance, but also engaged, horizontal teaching methods, as well as self-reflection. This implies a process of double contention. On the one hand, the course resists the outcome-oriented university that we work in by focusing on learning as a process and a form of reflection. On the other hand, the lecturers of the course seek to equip students with tools and knowledge to not only understand social change, but also become part of it.
APA, Harvard, Vancouver, ISO, and other styles
43

Pal (Bera), Sova. "Overview of Hacking." IOSR Journal of Computer Engineering 18, no. 04 (April 2016): 90–92. http://dx.doi.org/10.9790/0661-1804049092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Schrödel, Tobias. "Hacking für manager..." Wirtschaftsinformatik und Management 2, no. 5 (October 2010): 20–23. http://dx.doi.org/10.1007/bf03248286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Schneier, Bruce. "Robot Hacking Games." IEEE Security & Privacy 20, no. 1 (January 2022): 119–20. http://dx.doi.org/10.1109/msec.2021.3121885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Tarek El-Ariss. "HACKING THE MODERN:." Comparative Literature Studies 47, no. 4 (2010): 533. http://dx.doi.org/10.5325/complitstudies.47.4.0533.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Schoonmaker, Sara. "HACKING THE GLOBAL." Information, Communication & Society 15, no. 4 (May 2012): 502–18. http://dx.doi.org/10.1080/1369118x.2012.665938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Emspak, Jesse. "Hacking Heats Up." Scientific American 313, no. 1 (June 16, 2015): 18–19. http://dx.doi.org/10.1038/scientificamerican0715-18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Hou, Youyang, and Dakuo Wang. "Hacking with NPOs." Proceedings of the ACM on Human-Computer Interaction 1, CSCW (December 6, 2017): 1–16. http://dx.doi.org/10.1145/3134688.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Evanko, Daniel. "Hacking the genome." Nature Methods 3, no. 7 (July 2006): 495. http://dx.doi.org/10.1038/nmeth0706-495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography