Academic literature on the topic 'Social hacking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Social hacking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Social hacking"

1

Greiner, Lynn. "Hacking social networks." netWorker 13, no. 1 (2009): 9–11. http://dx.doi.org/10.1145/1516035.1516038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mohamad, Ani Munirah, Zaiton Hamin, Mohd Zakhiri Md Nor, and Nurhazman Abdul Aziz. "SELECTED THEORIES ON CRIMINALISATION OF HACKING." International Journal of Law, Government and Communication 6, no. 22 (2021): 168–78. http://dx.doi.org/10.35631/ijlgc.6220016.

Full text
Abstract:
Hacking or unauthorised access is criminalised in many jurisdictions, including Malaysia, Singapore, the United Kingdom, Hong Kong, and a few other countries. Hacking is the act of gaining access through the computer system or network without proper authority or exceeding the original authority given to him. Many commentators and researchers have reported on the conceptual and legal aspects of hacking. However, hacking's theoretical, conceptual, and legal aspects have remained under-researched. Therefore, this paper's primary objective is to outline the various theories, which could inform the
APA, Harvard, Vancouver, ISO, and other styles
3

Applegate, Scott D. "Social Engineering: Hacking the Wetware!" Information Security Journal: A Global Perspective 18, no. 1 (2009): 40–46. http://dx.doi.org/10.1080/19393550802623214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

O'Shea, Clara. "Learning how kinds matter." Proceedings of the International Conference on Networked Learning 11 (May 14, 2018): 203–9. http://dx.doi.org/10.54337/nlc.v11.8756.

Full text
Abstract:
What does it mean to learn in a network? What does it mean to be a particular kind of learner? To develop and work towards a particular kind of being? Does every instantiation of a network lead to a different form of being? If networks are, as Jones (2016: 486) says “interactive processes that co-constructively shape persons”, then how contingent are these? How much does the social and material elements of the network contribute to the learner’s understanding of their own personhood?This paper is an exploration of Ian Hacking’s work on ‘making up people’ (e.g. Hacking 1986, 1991, 1995, 1999, 2
APA, Harvard, Vancouver, ISO, and other styles
5

Davies, Sarah R. "Characterizing Hacking." Science, Technology, & Human Values 43, no. 2 (2017): 171–97. http://dx.doi.org/10.1177/0162243917703464.

Full text
Abstract:
The rise of a “maker movement,” located in hacker and makerspaces and involving the democratization of technologies of production and support of grassroots innovation, is receiving increasing attention from science and technology studies (STS) scholarship. This article explores how hacking is characterized by users of hacker and makerspaces and relates this to broader discussion of the maker movement as, for instance, promoting innovation, engaged in countercultural critique, or as accessible to anyone. Based on an interview study of users of twelve hacker and makerspaces across the United Sta
APA, Harvard, Vancouver, ISO, and other styles
6

Rasch, Elisabet Dueholm. "Hacking the System." Contention 10, no. 1 (2022): 65–80. http://dx.doi.org/10.3167/cont.2022.100106.

Full text
Abstract:
In this paper, I explore how teaching can be an act of activism; a way of hacking the neoliberal university. In doing so, I draw on our experiences with the course “Resistance, Power and Movements.” I argue that activist teaching not only involves teaching about issues related to social justice and resistance, but also engaged, horizontal teaching methods, as well as self-reflection. This implies a process of double contention. On the one hand, the course resists the outcome-oriented university that we work in by focusing on learning as a process and a form of reflection. On the other hand, th
APA, Harvard, Vancouver, ISO, and other styles
7

Heslen, John J. "Neurocognitive hacking." Politics and the Life Sciences 39, no. 1 (2020): 87–100. http://dx.doi.org/10.1017/pls.2020.3.

Full text
Abstract:
AbstractThis article presents a discussion of neurocognitive hacking and its potential for use at the strategic, operational, and tactical levels of cyber conflict. Neurocognitive hacking refers to the ability to activate specific neural areas of the brain, via subliminal or supraliminal stimuli, to shape the behavioral outcomes of an adversary. Research suggests that awareness of mortality-related stimuli has neural correlates in the right amygdala and left anterior cingulate cortex and mediates negative behavior toward out-group members, including unconscious discriminatory behavior. Given i
APA, Harvard, Vancouver, ISO, and other styles
8

Cohen, Matt. "Hacking Colonialism." PMLA/Publications of the Modern Language Association of America 135, no. 3 (2020): 559–64. http://dx.doi.org/10.1632/pmla.2020.135.3.559.

Full text
Abstract:
Listen: Dread, panic, and horror are the great teasers, and tragic wisdom is our best chance in a dangerous world.—Gerald Vizenor, Postindian ConversationsUntil that day . . .Until all are one . . .Continue the struggle . . .—Optimus Prime, in The Transformers: The Movie“American people are being pushed into new social forms because of the complex nature of modern communications and transportation, and the competing forms are neotribalism and neofeudalism,” the Standing Rock Sioux thinker Vine Deloria, Jr., wrote in 1970 (14). That insight was inspired in part by the work of Marshall McLuhan,
APA, Harvard, Vancouver, ISO, and other styles
9

Hunsinger, Jeremy. "Hacking Together Globally." Digital Culture & Society 3, no. 1 (2017): 95–108. http://dx.doi.org/10.14361/dcs-2017-0106.

Full text
Abstract:
Abstract This paper examines events that occur synchronously around the globe at hackerspaces: during Global Synchronous Hackathons, participants use video streams to share experiences, work and interact in real time. This paper analyses synchronous hackathons through video repositories of these events. It aims at discerning what norms are enacted in presented hacking experiences and how those norms are communicated across the video streams. Hacking in these cases should be thought of as the creative activity of using technology to build something that solves a problem or challenge. Hackerspac
APA, Harvard, Vancouver, ISO, and other styles
10

Traxler, Martino. "Ian Hacking, The Social Construction of What?" Philosophical Inquiry 24, no. 1 (2002): 117–19. http://dx.doi.org/10.5840/philinquiry2002241/212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Social hacking"

1

Peacock, Donna. "From underground hacking to ethical hacking." Thesis, Northumbria University, 2013. http://nrl.northumbria.ac.uk/32285/.

Full text
Abstract:
This Thesis explores the nature and practice of ‘Ethical Hacking’. Ethical Hackers are individuals who use hacking skills, knowledge and techniques within legitimate authorised practice; they are employed to Hack. A Critical Realist methodological approach is employed in order to gain a qualitative understanding of a real phenomenon through a range of key informants who provide personal narratives within semi-structured interviews, commenting upon their own realities, and their perceptions of the field in which they work. A Bounded Rational Model of decision making reveals that decisions relat
APA, Harvard, Vancouver, ISO, and other styles
2

Schuhart, Russell G. "Hacking social networks examining the viability of using computer network attack against social networks." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FSchuhart.pdf.

Full text
Abstract:
Thesis (M.S. in Information Systems and Operations)--Naval Postgraduate School, March 2007.<br>Thesis Advisor(s): David Tucker. "March 2007." Includes bibliographical references (p. 55-56). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
3

Howlett, William IV. "The Rise of China's Hacking Culture: Defining Chinese Hackers." CSUSB ScholarWorks, 2016. https://scholarworks.lib.csusb.edu/etd/383.

Full text
Abstract:
China has been home to some of the most prominent hackers and hacker groups of the global community throughout the last decade. In the last ten years, countless attacks globally have been linked to the People’s Republic of China (PRC) or those operating within the PRC. This exploration attempts to investigate the story, ideology, institutions, actions, and motivations of the Chinese hackers collectively, as sub-groups, and as individuals. I will do this using sources ranging from basic news coverage, interviews with experts and industry veterans, secondary reportage, leaked documents from gove
APA, Harvard, Vancouver, ISO, and other styles
4

Mausch, Anna Marleen. "Friluftsliv för Alla? : exploring and hacking our accessibility to the outdoors." Thesis, Linnéuniversitetet, Institutionen för design (DE), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105278.

Full text
Abstract:
When we are outdoors we rely on the things we bring. By questioning, if the outdoors are freely accessible and detached from our capitalistic world, I identified that to- day’s outdoor equipment industry is not only enjoying great popularity, but is also having the tendency to stay in its comfort zone, mainly engaging in ecological spheres of sustainability. With my bachelor’s thesis project, Friluftsliv för Alla?, I had the aim to initiate a shift, to broaden one’s mind, and to put a focus beyond the sustainability indicator of a product. Together with my collaborator ‘Friluftsfrämjandet’,
APA, Harvard, Vancouver, ISO, and other styles
5

Maggs, Catherine. "WikiLeaks and Communicative Counterpower." Thesis, The University of Sydney, 2015. http://hdl.handle.net/2123/13511.

Full text
Abstract:
WikiLeaks’ rise to prominence in 2010, with its release of classified U.S. government and military documents, polarised opinion worldwide; some viewed it as a cyber-terrorist group, others saw it as journalism’s saviour. WikiLeaks and Communicative Counterpower investigates why the organisation has been such a contentious cultural and political phenomenon, via a study of its capacity to exercise networked communicative counterpower. The thesis analyses WikiLeaks’ exercise of ideational, cultural and mediated political counterpower, providing a unique mixed methods, critical media studies acc
APA, Harvard, Vancouver, ISO, and other styles
6

Bergendal, Taghrid Sara. "P.S. I love you...and other growth hacking strategies used by disruptive tech start-ups : A case study on the relevance and enactment of growth hacking by Sweden's tech start-ups." Thesis, Uppsala universitet, Medier och kommunikation, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-325969.

Full text
Abstract:
Disruption innovation theory has been the zeitgeist for building globally disruptive tech companies since 1997. One decade later, disruptive tech start-ups are moving away from traditional marketing strategies in favour of growth hacking. There is a seemingly growing consensus by online tech experts, tech entrepreneurs, advisors and investors, that suggests that growth hacking is becoming increasingly important practice for disruption based tech start-ups. Furthermore, Sweden is becoming the Silicon Valley of the Nordics, producing more unicorns per capita than any other country in the world.
APA, Harvard, Vancouver, ISO, and other styles
7

Staar, Henning, Rafael Wilms, and Judith Hinrichs. "„Das perfekte Opfer“ – eine Analyse sicherheitsbezogener Einstellungen und Verhaltensweisen im Internet in Abhängigkeit der Nutzerpersönlichkeit." TUDpress, 2018. https://tud.qucosa.de/id/qucosa%3A33857.

Full text
Abstract:
Jüngere theoretische Beiträge und empirische Studien zur Informations- und Datensicherheit widmen sich diesem Themenbereich des Social Engineering verstärkt interdisziplinär und rücken dabei neben täterbezogenen Analysen (z.B. Watson, Holz & Mueller, 2008) vor allem gruppen- bzw. kulturbezogenen Aspekte (Flores, Holm, Nohlberg & Ekstedt, 2014; Tembe et al., 2014) als auch individuelle Charakteristika wie Persönlichkeitsmerkmale der (potentiellen) Opfer in den Fokus (z.B. Uebelacker & Quiel, 2014; Pattinson, Jerram, Parsons, McCormac & Butavicius, 2012;Vishwanath, Herath, Chen, Wang & Raghav Ra
APA, Harvard, Vancouver, ISO, and other styles
8

Nihalani, Mohit. "Hacking the New Development : Turning a Shopping District into a Garment Manufacturing District." Thesis, KTH, Urbana och regionala studier, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-292294.

Full text
Abstract:
Chrisp Street Market in London, the first pedestrian shopping district in the UK, will be redeveloped into a contemporary version of a pedestrian shopping district. The design employs the 'mixed-use' building typology often used to make public life 'active' and 'lively', by attracting the population to participate in consumer society in public space, at a time when the role of overconsumption in the acceleration of climate change within sectors like the fashion industry is becoming increasingly problematic. This project explores the potential of hacking into the imagined new development of a s
APA, Harvard, Vancouver, ISO, and other styles
9

Zufferey, Eric. "Changer le travail ou changer la société ? : Les hackers entre conformation à l’ordre social et volonté d’innover." Thesis, Lille 1, 2018. http://www.theses.fr/2018LIL1A001/document.

Full text
Abstract:
Cette thèse vise à interroger le hacking comme source de changement social, voire de subversion de l’ordre social. En mettant en jeu une forme d’autodidaxie et un décloisonnement social entre amateurs, professionnels et militants, il fait espérer des changements dans l’accès aux savoirs, ainsi que dans les manières de penser le rôle de la technologie au sein de nos sociétés. Dans le prolongement d’une sociologie bourdieusienne, l’enquête analyse comment la pratique du hacking s’articule aux instances classiques de la socialisation – famille, amis, institutions scolaires, etc. – et examine quel
APA, Harvard, Vancouver, ISO, and other styles
10

Lin, Yuwei. "Hacking practices and software development : a social worlds annalysis of ICT innovation and the role of free/libre open source software." Thesis, University of York, 2004. http://etheses.whiterose.ac.uk/9881/.

Full text
Abstract:
Through use of social worlds theory and qualitative research methods, this thesis explores hackers’ practices and their relationships with the computing world and the wider society from a socio-technical perspective. The hacker social world comprises actors from diverse social-technical backgrounds who share a constellation of im/material practices, namely open source practices (OSPs). Through engaging with these collective practices, actors and actants communicate, negotiate, and shape each other’s identities, practices and understandings of the innovation structure and system in various aspe
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Social hacking"

1

Koza, Erfan, Asiye Öztürk, and Michael Willer. Social Engineering und Human Hacking. Springer Berlin Heidelberg, 2024. https://doi.org/10.1007/978-3-662-69388-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pospisil, John. Hacking MySpace. John Wiley & Sons, Ltd., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Burek, Amy, and Emily Alden Foster. Feminist hackerspaces: Hacking culture not devices. [Awkward Ladies Club], 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Global, IGI, ed. Corporate hacking and technology-driven crime: Social dynamics and implications. IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Long, Johnny. No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing. Syngress, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Long, Johnny. No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing. Syngress, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Söderberg, Johan. Hacking capitalism: The free and open source software (foss) movement. Routledge, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bernhard, Hans. Ubermorgen.com: Media hacking vs. conceptual art : Hans Bernhard / Lizvlx. Christoph Merian, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ruth, Moore, Smyth Marie, and Templegrove Action Research, eds. Life in two enclaves in Northern Ireland: Words and images from The Fountain and Gobnascale : hemmed in and hacking it. Guildhall Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vrant, Andres. Social Selling Hacking. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Social hacking"

1

Ziegler, Manuel. "Social Engineering." In Web Hacking. Carl Hanser Verlag GmbH & Co. KG, 2014. http://dx.doi.org/10.3139/9783446441125.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Putrino, David. "The Social Good Organization." In Hacking Health. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71619-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Milberry, Kate. "Hacking for Social Justice." In (Re)Inventing The Internet. SensePublishers, 2012. http://dx.doi.org/10.1007/978-94-6091-734-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wasiak, Patryk. "Playing and Copying: Social Practices of Home Computer Users in Poland during the 1980s." In Hacking Europe. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5493-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Koza, Erfan, Asiye Öztürk, and Michael Willer. "Definition: Social Engineering." In Social Engineering und Human Hacking. Springer Berlin Heidelberg, 2024. https://doi.org/10.1007/978-3-662-69388-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Koza, Erfan, Asiye Öztürk, and Michael Willer. "Anwendungsgebiet des Social Engineering." In Social Engineering und Human Hacking. Springer Berlin Heidelberg, 2024. https://doi.org/10.1007/978-3-662-69388-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Koza, Erfan, Asiye Öztürk, and Michael Willer. "Arten des Social Engineering." In Social Engineering und Human Hacking. Springer Berlin Heidelberg, 2024. https://doi.org/10.1007/978-3-662-69388-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Koza, Erfan, Asiye Öztürk, and Michael Willer. "Evolution des Social Engineering." In Social Engineering und Human Hacking. Springer Berlin Heidelberg, 2024. https://doi.org/10.1007/978-3-662-69388-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Koza, Erfan, Asiye Öztürk, and Michael Willer. "Psychologische Hintergründe zum Social Engineering." In Social Engineering und Human Hacking. Springer Berlin Heidelberg, 2024. https://doi.org/10.1007/978-3-662-69388-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Koza, Erfan, Asiye Öztürk, and Michael Willer. "Ursprung und Chroniken des Human Hacking." In Social Engineering und Human Hacking. Springer Berlin Heidelberg, 2024. https://doi.org/10.1007/978-3-662-69388-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Social hacking"

1

Alufaisan, Yasmeen, Yan Zhou, Murat Kantarcioglu, and Bhavani Thuraisingham. "Hacking social network data mining." In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2017. http://dx.doi.org/10.1109/isi.2017.8004874.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wagenknecht, Susann, and Matthias Korn. "Hacking as Transgressive Infrastructuring." In CSCW '16: Computer Supported Cooperative Work and Social Computing. ACM, 2016. http://dx.doi.org/10.1145/2818048.2820027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fox, Sarah, Rachel Rose Ulgado, and Daniela Rosner. "Hacking Culture, Not Devices." In CSCW '15: Computer Supported Cooperative Work and Social Computing. ACM, 2015. http://dx.doi.org/10.1145/2675133.2675223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"Workshop - Ethical Hacking." In 2024 International Conference on Social and Sustainable Innovations in Technology and Engineering (SASI-ITE). IEEE, 2024. http://dx.doi.org/10.1109/sasi-ite58663.2024.00092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Eddy, Ray, Carissa Baker, Robert Macy, John Murray, and Anastasia Salter. "Hacking Droids and Casting Spells." In HT '20: 31st ACM Conference on Hypertext and Social Media. ACM, 2020. http://dx.doi.org/10.1145/3372923.3404801.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ciolfi, Luigina. "Session details: Hacking, Making, and Discovering." In CSCW '16: Computer Supported Cooperative Work and Social Computing. ACM, 2016. http://dx.doi.org/10.1145/3260432.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Filippova, Anna, Brad Chapman, R. Stuart Geiger, et al. "Hacking and Making at Time-Bounded Events." In CSCW '17: Computer Supported Cooperative Work and Social Computing. ACM, 2017. http://dx.doi.org/10.1145/3022198.3022658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Leonov, Pavel Y., Alexander V. Vorobyev, Anastasia A. Ezhova, Oksana S. Kotelyanets, Aleksandra K. Zavalishina, and Nikolay V. Morozov. "The Main Social Engineering Techniques Aimed at Hacking Information Systems." In 2021 IEEE Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT). IEEE, 2021. http://dx.doi.org/10.1109/usbereit51232.2021.9455031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Babko-Malaya, Olga, Rebecca Cathey, Steve Hinton, David Maimon, and Taissa Gladkova. "Detection of hacking behaviors and communication patterns on social media." In 2017 IEEE International Conference on Big Data (Big Data). IEEE, 2017. http://dx.doi.org/10.1109/bigdata.2017.8258508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

D, Jebakumar Immanuel, Ramalingam V, Tharun Kumar P, Akash Iyer, and Narayanan M. S. "Resisting Visual Hacking: A Novel Graphical Password Authentication System." In 2023 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN). IEEE, 2023. http://dx.doi.org/10.1109/icpcsn58827.2023.00155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!