Academic literature on the topic 'Social hacking'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Social hacking.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Social hacking"
Greiner, Lynn. "Hacking social networks." netWorker 13, no. 1 (2009): 9–11. http://dx.doi.org/10.1145/1516035.1516038.
Full textMohamad, Ani Munirah, Zaiton Hamin, Mohd Zakhiri Md Nor, and Nurhazman Abdul Aziz. "SELECTED THEORIES ON CRIMINALISATION OF HACKING." International Journal of Law, Government and Communication 6, no. 22 (2021): 168–78. http://dx.doi.org/10.35631/ijlgc.6220016.
Full textApplegate, Scott D. "Social Engineering: Hacking the Wetware!" Information Security Journal: A Global Perspective 18, no. 1 (2009): 40–46. http://dx.doi.org/10.1080/19393550802623214.
Full textO'Shea, Clara. "Learning how kinds matter." Proceedings of the International Conference on Networked Learning 11 (May 14, 2018): 203–9. http://dx.doi.org/10.54337/nlc.v11.8756.
Full textDavies, Sarah R. "Characterizing Hacking." Science, Technology, & Human Values 43, no. 2 (2017): 171–97. http://dx.doi.org/10.1177/0162243917703464.
Full textRasch, Elisabet Dueholm. "Hacking the System." Contention 10, no. 1 (2022): 65–80. http://dx.doi.org/10.3167/cont.2022.100106.
Full textHeslen, John J. "Neurocognitive hacking." Politics and the Life Sciences 39, no. 1 (2020): 87–100. http://dx.doi.org/10.1017/pls.2020.3.
Full textCohen, Matt. "Hacking Colonialism." PMLA/Publications of the Modern Language Association of America 135, no. 3 (2020): 559–64. http://dx.doi.org/10.1632/pmla.2020.135.3.559.
Full textHunsinger, Jeremy. "Hacking Together Globally." Digital Culture & Society 3, no. 1 (2017): 95–108. http://dx.doi.org/10.14361/dcs-2017-0106.
Full textTraxler, Martino. "Ian Hacking, The Social Construction of What?" Philosophical Inquiry 24, no. 1 (2002): 117–19. http://dx.doi.org/10.5840/philinquiry2002241/212.
Full textDissertations / Theses on the topic "Social hacking"
Peacock, Donna. "From underground hacking to ethical hacking." Thesis, Northumbria University, 2013. http://nrl.northumbria.ac.uk/32285/.
Full textSchuhart, Russell G. "Hacking social networks examining the viability of using computer network attack against social networks." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FSchuhart.pdf.
Full textHowlett, William IV. "The Rise of China's Hacking Culture: Defining Chinese Hackers." CSUSB ScholarWorks, 2016. https://scholarworks.lib.csusb.edu/etd/383.
Full textMausch, Anna Marleen. "Friluftsliv för Alla? : exploring and hacking our accessibility to the outdoors." Thesis, Linnéuniversitetet, Institutionen för design (DE), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105278.
Full textMaggs, Catherine. "WikiLeaks and Communicative Counterpower." Thesis, The University of Sydney, 2015. http://hdl.handle.net/2123/13511.
Full textBergendal, Taghrid Sara. "P.S. I love you...and other growth hacking strategies used by disruptive tech start-ups : A case study on the relevance and enactment of growth hacking by Sweden's tech start-ups." Thesis, Uppsala universitet, Medier och kommunikation, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-325969.
Full textStaar, Henning, Rafael Wilms, and Judith Hinrichs. "„Das perfekte Opfer“ – eine Analyse sicherheitsbezogener Einstellungen und Verhaltensweisen im Internet in Abhängigkeit der Nutzerpersönlichkeit." TUDpress, 2018. https://tud.qucosa.de/id/qucosa%3A33857.
Full textNihalani, Mohit. "Hacking the New Development : Turning a Shopping District into a Garment Manufacturing District." Thesis, KTH, Urbana och regionala studier, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-292294.
Full textZufferey, Eric. "Changer le travail ou changer la société ? : Les hackers entre conformation à l’ordre social et volonté d’innover." Thesis, Lille 1, 2018. http://www.theses.fr/2018LIL1A001/document.
Full textLin, Yuwei. "Hacking practices and software development : a social worlds annalysis of ICT innovation and the role of free/libre open source software." Thesis, University of York, 2004. http://etheses.whiterose.ac.uk/9881/.
Full textBooks on the topic "Social hacking"
Koza, Erfan, Asiye Öztürk, and Michael Willer. Social Engineering und Human Hacking. Springer Berlin Heidelberg, 2024. https://doi.org/10.1007/978-3-662-69388-9.
Full textBurek, Amy, and Emily Alden Foster. Feminist hackerspaces: Hacking culture not devices. [Awkward Ladies Club], 2015.
Find full textGlobal, IGI, ed. Corporate hacking and technology-driven crime: Social dynamics and implications. IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), 2011.
Find full textLong, Johnny. No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing. Syngress, 2008.
Find full textLong, Johnny. No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing. Syngress, 2008.
Find full textSöderberg, Johan. Hacking capitalism: The free and open source software (foss) movement. Routledge, 2007.
Find full textBernhard, Hans. Ubermorgen.com: Media hacking vs. conceptual art : Hans Bernhard / Lizvlx. Christoph Merian, 2009.
Find full textRuth, Moore, Smyth Marie, and Templegrove Action Research, eds. Life in two enclaves in Northern Ireland: Words and images from The Fountain and Gobnascale : hemmed in and hacking it. Guildhall Press, 1996.
Find full textBook chapters on the topic "Social hacking"
Ziegler, Manuel. "Social Engineering." In Web Hacking. Carl Hanser Verlag GmbH & Co. KG, 2014. http://dx.doi.org/10.3139/9783446441125.009.
Full textPutrino, David. "The Social Good Organization." In Hacking Health. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71619-0_7.
Full textMilberry, Kate. "Hacking for Social Justice." In (Re)Inventing The Internet. SensePublishers, 2012. http://dx.doi.org/10.1007/978-94-6091-734-9_6.
Full textWasiak, Patryk. "Playing and Copying: Social Practices of Home Computer Users in Poland during the 1980s." In Hacking Europe. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5493-8_6.
Full textKoza, Erfan, Asiye Öztürk, and Michael Willer. "Definition: Social Engineering." In Social Engineering und Human Hacking. Springer Berlin Heidelberg, 2024. https://doi.org/10.1007/978-3-662-69388-9_2.
Full textKoza, Erfan, Asiye Öztürk, and Michael Willer. "Anwendungsgebiet des Social Engineering." In Social Engineering und Human Hacking. Springer Berlin Heidelberg, 2024. https://doi.org/10.1007/978-3-662-69388-9_3.
Full textKoza, Erfan, Asiye Öztürk, and Michael Willer. "Arten des Social Engineering." In Social Engineering und Human Hacking. Springer Berlin Heidelberg, 2024. https://doi.org/10.1007/978-3-662-69388-9_5.
Full textKoza, Erfan, Asiye Öztürk, and Michael Willer. "Evolution des Social Engineering." In Social Engineering und Human Hacking. Springer Berlin Heidelberg, 2024. https://doi.org/10.1007/978-3-662-69388-9_7.
Full textKoza, Erfan, Asiye Öztürk, and Michael Willer. "Psychologische Hintergründe zum Social Engineering." In Social Engineering und Human Hacking. Springer Berlin Heidelberg, 2024. https://doi.org/10.1007/978-3-662-69388-9_4.
Full textKoza, Erfan, Asiye Öztürk, and Michael Willer. "Ursprung und Chroniken des Human Hacking." In Social Engineering und Human Hacking. Springer Berlin Heidelberg, 2024. https://doi.org/10.1007/978-3-662-69388-9_1.
Full textConference papers on the topic "Social hacking"
Alufaisan, Yasmeen, Yan Zhou, Murat Kantarcioglu, and Bhavani Thuraisingham. "Hacking social network data mining." In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2017. http://dx.doi.org/10.1109/isi.2017.8004874.
Full textWagenknecht, Susann, and Matthias Korn. "Hacking as Transgressive Infrastructuring." In CSCW '16: Computer Supported Cooperative Work and Social Computing. ACM, 2016. http://dx.doi.org/10.1145/2818048.2820027.
Full textFox, Sarah, Rachel Rose Ulgado, and Daniela Rosner. "Hacking Culture, Not Devices." In CSCW '15: Computer Supported Cooperative Work and Social Computing. ACM, 2015. http://dx.doi.org/10.1145/2675133.2675223.
Full text"Workshop - Ethical Hacking." In 2024 International Conference on Social and Sustainable Innovations in Technology and Engineering (SASI-ITE). IEEE, 2024. http://dx.doi.org/10.1109/sasi-ite58663.2024.00092.
Full textEddy, Ray, Carissa Baker, Robert Macy, John Murray, and Anastasia Salter. "Hacking Droids and Casting Spells." In HT '20: 31st ACM Conference on Hypertext and Social Media. ACM, 2020. http://dx.doi.org/10.1145/3372923.3404801.
Full textCiolfi, Luigina. "Session details: Hacking, Making, and Discovering." In CSCW '16: Computer Supported Cooperative Work and Social Computing. ACM, 2016. http://dx.doi.org/10.1145/3260432.
Full textFilippova, Anna, Brad Chapman, R. Stuart Geiger, et al. "Hacking and Making at Time-Bounded Events." In CSCW '17: Computer Supported Cooperative Work and Social Computing. ACM, 2017. http://dx.doi.org/10.1145/3022198.3022658.
Full textLeonov, Pavel Y., Alexander V. Vorobyev, Anastasia A. Ezhova, Oksana S. Kotelyanets, Aleksandra K. Zavalishina, and Nikolay V. Morozov. "The Main Social Engineering Techniques Aimed at Hacking Information Systems." In 2021 IEEE Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT). IEEE, 2021. http://dx.doi.org/10.1109/usbereit51232.2021.9455031.
Full textBabko-Malaya, Olga, Rebecca Cathey, Steve Hinton, David Maimon, and Taissa Gladkova. "Detection of hacking behaviors and communication patterns on social media." In 2017 IEEE International Conference on Big Data (Big Data). IEEE, 2017. http://dx.doi.org/10.1109/bigdata.2017.8258508.
Full textD, Jebakumar Immanuel, Ramalingam V, Tharun Kumar P, Akash Iyer, and Narayanan M. S. "Resisting Visual Hacking: A Novel Graphical Password Authentication System." In 2023 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN). IEEE, 2023. http://dx.doi.org/10.1109/icpcsn58827.2023.00155.
Full text