To see the other types of publications on this topic, follow the link: Social hacking.

Journal articles on the topic 'Social hacking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Social hacking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Greiner, Lynn. "Hacking social networks." netWorker 13, no. 1 (2009): 9–11. http://dx.doi.org/10.1145/1516035.1516038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mohamad, Ani Munirah, Zaiton Hamin, Mohd Zakhiri Md Nor, and Nurhazman Abdul Aziz. "SELECTED THEORIES ON CRIMINALISATION OF HACKING." International Journal of Law, Government and Communication 6, no. 22 (2021): 168–78. http://dx.doi.org/10.35631/ijlgc.6220016.

Full text
Abstract:
Hacking or unauthorised access is criminalised in many jurisdictions, including Malaysia, Singapore, the United Kingdom, Hong Kong, and a few other countries. Hacking is the act of gaining access through the computer system or network without proper authority or exceeding the original authority given to him. Many commentators and researchers have reported on the conceptual and legal aspects of hacking. However, hacking's theoretical, conceptual, and legal aspects have remained under-researched. Therefore, this paper's primary objective is to outline the various theories, which could inform the
APA, Harvard, Vancouver, ISO, and other styles
3

Applegate, Scott D. "Social Engineering: Hacking the Wetware!" Information Security Journal: A Global Perspective 18, no. 1 (2009): 40–46. http://dx.doi.org/10.1080/19393550802623214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

O'Shea, Clara. "Learning how kinds matter." Proceedings of the International Conference on Networked Learning 11 (May 14, 2018): 203–9. http://dx.doi.org/10.54337/nlc.v11.8756.

Full text
Abstract:
What does it mean to learn in a network? What does it mean to be a particular kind of learner? To develop and work towards a particular kind of being? Does every instantiation of a network lead to a different form of being? If networks are, as Jones (2016: 486) says “interactive processes that co-constructively shape persons”, then how contingent are these? How much does the social and material elements of the network contribute to the learner’s understanding of their own personhood?This paper is an exploration of Ian Hacking’s work on ‘making up people’ (e.g. Hacking 1986, 1991, 1995, 1999, 2
APA, Harvard, Vancouver, ISO, and other styles
5

Davies, Sarah R. "Characterizing Hacking." Science, Technology, & Human Values 43, no. 2 (2017): 171–97. http://dx.doi.org/10.1177/0162243917703464.

Full text
Abstract:
The rise of a “maker movement,” located in hacker and makerspaces and involving the democratization of technologies of production and support of grassroots innovation, is receiving increasing attention from science and technology studies (STS) scholarship. This article explores how hacking is characterized by users of hacker and makerspaces and relates this to broader discussion of the maker movement as, for instance, promoting innovation, engaged in countercultural critique, or as accessible to anyone. Based on an interview study of users of twelve hacker and makerspaces across the United Sta
APA, Harvard, Vancouver, ISO, and other styles
6

Rasch, Elisabet Dueholm. "Hacking the System." Contention 10, no. 1 (2022): 65–80. http://dx.doi.org/10.3167/cont.2022.100106.

Full text
Abstract:
In this paper, I explore how teaching can be an act of activism; a way of hacking the neoliberal university. In doing so, I draw on our experiences with the course “Resistance, Power and Movements.” I argue that activist teaching not only involves teaching about issues related to social justice and resistance, but also engaged, horizontal teaching methods, as well as self-reflection. This implies a process of double contention. On the one hand, the course resists the outcome-oriented university that we work in by focusing on learning as a process and a form of reflection. On the other hand, th
APA, Harvard, Vancouver, ISO, and other styles
7

Heslen, John J. "Neurocognitive hacking." Politics and the Life Sciences 39, no. 1 (2020): 87–100. http://dx.doi.org/10.1017/pls.2020.3.

Full text
Abstract:
AbstractThis article presents a discussion of neurocognitive hacking and its potential for use at the strategic, operational, and tactical levels of cyber conflict. Neurocognitive hacking refers to the ability to activate specific neural areas of the brain, via subliminal or supraliminal stimuli, to shape the behavioral outcomes of an adversary. Research suggests that awareness of mortality-related stimuli has neural correlates in the right amygdala and left anterior cingulate cortex and mediates negative behavior toward out-group members, including unconscious discriminatory behavior. Given i
APA, Harvard, Vancouver, ISO, and other styles
8

Cohen, Matt. "Hacking Colonialism." PMLA/Publications of the Modern Language Association of America 135, no. 3 (2020): 559–64. http://dx.doi.org/10.1632/pmla.2020.135.3.559.

Full text
Abstract:
Listen: Dread, panic, and horror are the great teasers, and tragic wisdom is our best chance in a dangerous world.—Gerald Vizenor, Postindian ConversationsUntil that day . . .Until all are one . . .Continue the struggle . . .—Optimus Prime, in The Transformers: The Movie“American people are being pushed into new social forms because of the complex nature of modern communications and transportation, and the competing forms are neotribalism and neofeudalism,” the Standing Rock Sioux thinker Vine Deloria, Jr., wrote in 1970 (14). That insight was inspired in part by the work of Marshall McLuhan,
APA, Harvard, Vancouver, ISO, and other styles
9

Hunsinger, Jeremy. "Hacking Together Globally." Digital Culture & Society 3, no. 1 (2017): 95–108. http://dx.doi.org/10.14361/dcs-2017-0106.

Full text
Abstract:
Abstract This paper examines events that occur synchronously around the globe at hackerspaces: during Global Synchronous Hackathons, participants use video streams to share experiences, work and interact in real time. This paper analyses synchronous hackathons through video repositories of these events. It aims at discerning what norms are enacted in presented hacking experiences and how those norms are communicated across the video streams. Hacking in these cases should be thought of as the creative activity of using technology to build something that solves a problem or challenge. Hackerspac
APA, Harvard, Vancouver, ISO, and other styles
10

Traxler, Martino. "Ian Hacking, The Social Construction of What?" Philosophical Inquiry 24, no. 1 (2002): 117–19. http://dx.doi.org/10.5840/philinquiry2002241/212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Pybus, Jennifer, Mark Coté, and Tobias Blanke. "Hacking the social life of Big Data." Big Data & Society 2, no. 2 (2015): 205395171561664. http://dx.doi.org/10.1177/2053951715616649.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Tikhonova, Sophia V. "Maurizio Ferraris' Theory of Documentality and Social Media: Media Hacking as Hacking of Cultural Memory." Galactica Media: Journal of Media Studies 4, no. 2 (2022): 84–101. http://dx.doi.org/10.46539/gmd.v4i2.262.

Full text
Abstract:
The article deals with the methodological search for overcoming dualism in the understanding of cultural memory as a basic category of memory studies. This category implies a gap between the memory of living contemporaries and the "dead" memory of institutional narratives. However, the rebellion of living memory against repressive censored texts is a feature of mass industrial societies. The model of confrontation between generational memory and trans-generational memory, laid down by the works of M. Halbwachs and J. Assmann, loses its heuristic in the conditions of the dominance of digital me
APA, Harvard, Vancouver, ISO, and other styles
13

Back, Sinchul, Sadhika Soor, and Jennifer LaPrade. "Juvenile Hackers: An Empirical Test of Self-Control Theory and Social Bonding Theory." International Journal of Cybersecurity Intelligence and Cybercrime 1, no. 1 (2018): 40–55. http://dx.doi.org/10.52306/01010518vmdc9371.

Full text
Abstract:
In accordance with a similar growth in information technology, computer hacking has become a pervasive issue as a form of crime worldwide in recent years. Self-control theory and social bonding theory have frequently been employed to explain various types of crimes, but rarely to explore computer hacking. Drawing from Gottfredson and Hirschi’s (1990) self-control theory and Hirschi’s (1969) social bonding theory, the purpose of this study is to empirically examine the suitability of these two theories in explaining juvenile computer hacking offenses. The self-report survey data utilized for th
APA, Harvard, Vancouver, ISO, and other styles
14

Palassis, Alexa, Craig P. Speelman, and Julie Ann Pooley. "An Exploration of the Psychological Impact of Hacking Victimization." SAGE Open 11, no. 4 (2021): 215824402110615. http://dx.doi.org/10.1177/21582440211061556.

Full text
Abstract:
Cybercrime has rapidly grown in prevalence and potential for harm and disruption for victims. Studies have examined the adverse psychological impact of cybercrime for victims; however, the specific effects for victims of hacking are unexplored. The present study aimed to investigate the psychological impacts of hacking victimization through exploration of the experience of victims of hacking. The study employed an in-depth phenomenological approach to explore the experiences of 11 victims of hacking. Semi-structured interviews were used as a tool for data collection, and thematic analysis of t
APA, Harvard, Vancouver, ISO, and other styles
15

Regner, Anna Carolina Krebs Pereira. "Resenha - "Construcionismo Social": desarmando um campo minado." Episteme – Filosofia e História das Ciências em Revista 4, no. 9 (1999): 131–36. https://doi.org/10.5281/zenodo.6524020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Abu-Shaqra, Baha, and Rocci Luppicini. "Technoethical Inquiry into Ethical Hacking at a Canadian University." International Journal of Technoethics 7, no. 1 (2016): 62–76. http://dx.doi.org/10.4018/ijt.2016010105.

Full text
Abstract:
Business and academic organizations are in a constant pursuit of efficient and ethical technologies and practices to safeguard their information assets from the growing threat of hackers. Ethical hacking is one important information security risk management strategy they use. Most published books on ethical hacking have focused on its technical applications in risk assessment practices. This paper addressed a scarcity within the organizational communication literature on ethical hacking. Taking a qualitative exploratory case study approach, the authors explored ethical hacking implementation w
APA, Harvard, Vancouver, ISO, and other styles
17

Wilcox, Heidi, and Maumita Bhattacharya. "A Human Dimension of Hacking: Social Engineering through Social Media." IOP Conference Series: Materials Science and Engineering 790 (April 7, 2020): 012040. http://dx.doi.org/10.1088/1757-899x/790/1/012040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Pavlik, Kimberly. "Cybercrime, Hacking, And Legislation." Journal of Cybersecurity Research (JCR) 2, no. 1 (2017): 13–16. http://dx.doi.org/10.19030/jcr.v2i1.9966.

Full text
Abstract:
As cybercrime continues to evolve, legislation will continue to play a key role in the prosecution of individuals committing computer related offenses. The public has witnessed the rapid change in computer technology, continued popularity of social media, and increased e-commerce. With those changes comes an increase in computer crimes being committed. This article gives an overview of the evolution of cybercrime, and its influence on current legislation.
APA, Harvard, Vancouver, ISO, and other styles
19

Martineau, Melissa, Elena Spiridon, and Mary Aiken. "Pathways to Criminal Hacking: Connecting Lived Experiences with Theoretical Explanations." Forensic Sciences 4, no. 4 (2024): 647–68. https://doi.org/10.3390/forensicsci4040045.

Full text
Abstract:
Background: Over the course of the last decade, cybercrime has become a significant global concern. A comprehensive approach to crimes that occur in cyber contexts needs to address not only the technological aspects of cybercrime but also the human elements. Therefore, the aim of the current research is twofold: first, to gain an in-depth understanding of the pathways that lead to criminal hacking behavior through interviews with current or former criminal hackers, and second, to explore how the lived experiences of these individuals fit within theoretical explanations of hacking. Method: Semi
APA, Harvard, Vancouver, ISO, and other styles
20

Hussey, Ian, and Sean Hughes. "Hidden Invalidity Among 15 Commonly Used Measures in Social and Personality Psychology." Advances in Methods and Practices in Psychological Science 3, no. 2 (2020): 166–84. http://dx.doi.org/10.1177/2515245919882903.

Full text
Abstract:
It has recently been demonstrated that metrics of structural validity are severely underreported in social and personality psychology. We comprehensively assessed structural validity in a uniquely large and varied data set ( N = 144,496 experimental sessions) to investigate the psychometric properties of some of the most widely used self-report measures ( k = 15 questionnaires, 26 scales) in social and personality psychology. When the scales were assessed using the modal practice of considering only internal consistency, 88% of them appeared to possess good validity. Yet when validity was asse
APA, Harvard, Vancouver, ISO, and other styles
21

Saad, Alsunbul, Dung Le Phu, and Tan Jefferson. "DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES." International Journal of Network Security & Its Applications (IJNSA) 7, no. 4 (2015): 01–30. https://doi.org/10.5281/zenodo.8276180.

Full text
Abstract:
Network infrastructures have played important part in most daily communications for business industries, social networking, government sectors and etc. Despites the advantages that came from such functionalities, security threats have become a daily struggle. One major security threat is hacking. Consequently, security experts and researchers have suggested possible security solutions such as Firewalls, Intrusion Detection Systems (IDS), Intrusion Detection and Prevention Systems (IDP) and Honeynet. Yet, none of these solutions have proven their ability to completely address hacking. The reaso
APA, Harvard, Vancouver, ISO, and other styles
22

Collin, Finn. "Bunge and Hacking on Constructivism." Philosophy of the Social Sciences 31, no. 3 (2001): 424–53. http://dx.doi.org/10.1177/004839310103100308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Lindgren, Simon. "Hacking Social Science for the Age of Datafication." Journal of Digital Social Research 1, no. 1 (2019): 1–9. http://dx.doi.org/10.33621/jdsr.v1i1.6.

Full text
Abstract:

 
 
 The ongoing and intensifying datafication of our societies poses huge challenges as well as opportunities for social science to rethink core elements of its research enterprise. Prominently, there is a pressing need to move beyond the long-standing qualitative/quantitative divide. This paper is an argument towards developing a critical science of data, by bringing together the interpretive theoretical and ethical sensibilities of social science with the predictive and prognostic powers of data science and computational methods. I argue that the renegotiation of theories an
APA, Harvard, Vancouver, ISO, and other styles
24

Barry, Ben, Philippa Nesbitt, Alexis De Villa, Kristina McMullin, and Jonathan Dumitra. "Re-Making Clothing, Re-Making Worlds: On Crip Fashion Hacking." Social Sciences 12, no. 9 (2023): 500. http://dx.doi.org/10.3390/socsci12090500.

Full text
Abstract:
This article explores how Disabled people’s fashion hacking practices re-make worlds by expanding fashion design processes, fostering relationships, and welcoming-in desire for Disability. We share research from the second phase of our project, Cripping Masculinity, where we developed fashion hacking workshops with D/disabled, D/deaf and Mad men and masculine non-binary people. In these workshops, participants worked in collaboration with fashion researchers and students to alter, embellish, and recreate their existing garments to support their physical, emotional, and spiritual needs. We expl
APA, Harvard, Vancouver, ISO, and other styles
25

Wang, Allegro. "(Im)possible Futures." GLQ 29, no. 3 (2023): 305–27. http://dx.doi.org/10.1215/10642684-10437208.

Full text
Abstract:
In a Western post – Cold War era, the pharmaceutical industry, state, and capitalism have merged to regulate gender and sexual normativity. According to Paul Preciado in Testo Junkie, the illicit and self-regulated use of hormones destabilizes gender and sexual binaries, a methodology that he calls “gender hacking.” This article argues, however, that an expanded interpretation of Preciado's historical narrative and understanding of hacking could better account for how race mediates gender and sexual normativity. This piece offers a rereading of Preciado's analysis on the historical regulation
APA, Harvard, Vancouver, ISO, and other styles
26

Aradau, Claudia, Tobias Blanke, and Giles Greenway. "Acts of digital parasitism: Hacking, humanitarian apps and platformisation." New Media & Society 21, no. 11-12 (2019): 2548–65. http://dx.doi.org/10.1177/1461444819852589.

Full text
Abstract:
The opacity of digital technologies has posed significant challenges for critical research and digital methods. In response, controversy mapping, reverse engineering and hacking have been key methodological devices to grapple with opacity and ‘open the black box’ of digital ecosystems. We take recent developments in digital humanitarianism and the accelerated production of apps for refugees following the 2015 Mediterranean refugee crisis as a site of methodological experimentation to advance hacking as critical methodological interference. Drawing on the work of Michel Serres, we propose to un
APA, Harvard, Vancouver, ISO, and other styles
27

Bazolli, João Aparecido, Lucas Rodrigues Dantas, and Eliene Campelo Coelho. "INOVAÇÃO E DEMOCRACIA: Civic hacking como ferramenta de tecnologia social na experiência do projeto “Nós propomos”– Palmas/TO." Revista Observatório 4, no. 6 (2018): 944–64. http://dx.doi.org/10.20873/uft.2447-4266.2018v4n6p944.

Full text
Abstract:
O presente artigo aborda a experiência do projeto ‘Nós Propomos’, que tem como temática a introdução da cultura participativa ao jovem em idade escolar além de colocá-lo em um papel de protagonismo, com oportunidade de conduzir ações transformadoras no espaço urbano da cidade.Nesse sentido, será abordada a estrutura do projeto Nós Propomos como um modelo de inovação social, que perpassa pelos conceitos de civic hacking (estímulo aos próprios cidadãos, para de forma colaborativa, criarem soluções para cidades) e Living Labs (ambiente de inovação aberta, baseada em situações reais em que a inova
APA, Harvard, Vancouver, ISO, and other styles
28

Nycyk, Michael. "The New Computer Hacker’s Quest and Contest with the Experienced Hackers: A Qualitative Study applying Pierre Bourdieu’s Field Theory." International Journal of Cyber Criminology 10, no. 2 (2016): 92–109. https://doi.org/10.5281/zenodo.163402.

Full text
Abstract:
Hacker forums are places for new hackers, newbies, to find information on hacking practices and to become part of a community. This study contributes to understanding ways newbies try to become accepted experienced computer hackers. Using Pierre Bourdieu’s Field Theory and its concepts, 500 threads from a forum were analyzed to see how newbies attempt to gain a place in the hacking field amongst experienced hackers. Thematic analysis methods were used to demonstrate how the forum’s field, and those within it, behaved to obtain what Bourdieu describes as cultural and social capital to obtain kn
APA, Harvard, Vancouver, ISO, and other styles
29

Bellaby, Ross W. "An Ethical Framework for Hacking Operations." Ethical Theory and Moral Practice 24, no. 1 (2021): 231–55. http://dx.doi.org/10.1007/s10677-021-10166-8.

Full text
Abstract:
AbstractIn recent years the power and reach of prominent hacker groups such as Anonymous and LulzSec has been clearly demonstrated. However, in a world where hackers are able to wield significant online power, can they do so ethically as legitimate agents? To answer this question this paper will develop an ethical framework based on the premise that hackers have exhibited instances where they have acted to protect people from harm at a time when there was no one else to do so. At its core this paper will argue that political hacking can be justified when it is done to protect the vital interes
APA, Harvard, Vancouver, ISO, and other styles
30

Cuartielles Ruiz, David, and César García Sáez. "From Hacking to Making." Digital Culture & Society 6, no. 1 (2020): 85–106. http://dx.doi.org/10.14361/dcs-2020-0105.

Full text
Abstract:
Abstract This article explores the history of contemporary Spanish Do-It- Yourself (DIY) spaces (hacklabs, hackerspaces, fab labs, makerspaces and after-school academies) and the growth of each type since the 1990s. The development of these types of spaces is reflected against the commodification and commoditisation of DIY in Spain. The article argues that the removal of the political layer of the early Spanish DIY techno-tactical movements allowed a higher degree of dissemination within society in general, while reducing the emancipatory potential of these new spaces. However, the analysis of
APA, Harvard, Vancouver, ISO, and other styles
31

Złocka, Anna Maria. "Christopher Hadnagy, Socjotechnika. Sztuka zdobywania władzy nad umysłami." Studia Politologiczne 2019, no. 54 (2019): 300–304. http://dx.doi.org/10.33896/spolit.2019.54.12.

Full text
Abstract:
Social engineering is the same concept as the concept of social engineering and related to manipulation and disinformation. Review of Christopher Hadnagy’s book Social engineering – the art of gaining power over minds is, according to the principles of art, a set of subjective assessments by the author. These assessments relate first to the impressions of reading, and are supported by their own critical image of the world in which social engineering is applied in the everyday life of each of us. The author of the review points out that the position has an application value, because a higher le
APA, Harvard, Vancouver, ISO, and other styles
32

Bhuvana, Chandra Shetty, T. Thanushree, Lokannavar Divya, and Nirmala S. Dr. "Cracking Wi-Fi using Python." International Journal of Innovative Science and Research Technology 8, no. 5 (2023): 1500–1505. https://doi.org/10.5281/zenodo.7988431.

Full text
Abstract:
Ethical hacking of Wi-Fi passwords is a process of intentionally testing the security of a Wi-Fi network with the owner's permission. The main objective of ethical hacking is to identify and address any security vulnerabilities before malicious actors can exploit them. In an ethical hacking engagement, a certified and experienced security professional conducts various tests to determine the level of security of the WiFi network. The tests may include network scanning, passwords cracking, social engineering, and other methods to identify weaknesses in the network's security. Once the se
APA, Harvard, Vancouver, ISO, and other styles
33

Sekhar Bhusal, Chandra. "Systematic Review on Social Engineering: Hacking by Manipulating Humans." Journal of Information Security 12, no. 01 (2021): 104–14. http://dx.doi.org/10.4236/jis.2021.121005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Palmås, Karl. "From hacking to simulation: Periodizing digitally-inspired social theory." Technological Forecasting and Social Change 145 (August 2019): 105–12. http://dx.doi.org/10.1016/j.techfore.2019.05.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Söderberg, Johan. "Inquiring Hacking as Politics." Science, Technology, & Human Values 42, no. 5 (2017): 969–80. http://dx.doi.org/10.1177/0162243916688094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Wright, Michelle F., and Sebastian Wachs. "Adolescents’ Cyber Victimization: The Influence of Technologies, Gender, and Gender Stereotype Traits." International Journal of Environmental Research and Public Health 17, no. 4 (2020): 1293. http://dx.doi.org/10.3390/ijerph17041293.

Full text
Abstract:
The purpose of the present study was to investigate the role of gender and gender stereotype traits (masculinity, femininity) in cyber victimization behaviors (cyber relational victimization, cyber verbal victimization, hacking) through different technologies (mobile phones, gaming consoles, social networking sites). There were 456 8th graders (226 females; M age = 13.66, SD = 0.41) from two midwestern middle schools in the United States included in this study. They completed questionnaires on their endorsement of masculine and feminine traits, and self-reported cyber victimization through dif
APA, Harvard, Vancouver, ISO, and other styles
37

Wright, Michelle F. "The Role of Technologies, Behaviors, Gender, and Gender Stereotype Traits in Adolescents’ Cyber Aggression." Journal of Interpersonal Violence 35, no. 7-8 (2017): 1719–38. http://dx.doi.org/10.1177/0886260517696858.

Full text
Abstract:
The present study focused on the impact of gender and gender stereotype traits (i.e., masculinity, femininity) on cyber aggression perpetration utilizing different technologies (i.e., social-networking sites, gaming consoles, mobile phones) and behaviors (i.e., cyber relational aggression, cyber verbal aggression, hacking). Participants included 233 eighth graders (108 female; Mage = 13.26, SD = 0.36) from two middle schools in the Midwestern United States. Adolescents completed questionnaires on their endorsement of masculinity and femininity traits as well as how often they engaged in cyber
APA, Harvard, Vancouver, ISO, and other styles
38

Inayah, Tuti. "The Role of the Alliance of Independent Journalist (AJI) Palembang in Dealing with Hacking and Disinformation of Journalist." TABAYYUN 4, no. 2 (2023): 408–20. http://dx.doi.org/10.19109/tabayyun.v4i2.19267.

Full text
Abstract:
In the midst of the rampant hacking and disinformation efforts of journalists. The Alliance of Independent Journalists (AJI) Palembang continues to work on preventing hacking and disinformation, with the dynamics of rapid information transformation. Professional journalists are demanded not to get caught up in disinformation. The challenge of dealing with this problem is getting tougher when the onslaught of social media (Medsos) occurs. Social media is a public space for exchanging opinions and information which is very popular at this time. This is a challenge for the Alliance of Independent
APA, Harvard, Vancouver, ISO, and other styles
39

Adefabi, Raheemat, Oludolamu Onimole, Abuh Ibrahim Sani, et al. "Cognitive Hacking and Social Engineering in Healthcare: Exploiting Human Behaviour." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 1–8. https://doi.org/10.34190/eccws.24.1.3337.

Full text
Abstract:
Hacking medical facilities proves to be a profitable venture. An entire individual record, containing name, insurance number, address, and social services identifier, can fetch hundreds of dollars on the dark web. Researchers have demonstrated how data breaches affect health information technology investment and its impact on the broader economy. Due to the vast number of individuals accessing personal data and inadequate security measures, healthcare facilities are vulnerable targets for cyberattacks. However, that healthcare facilities are vulnerable targets for cyber-attacks is not complete
APA, Harvard, Vancouver, ISO, and other styles
40

Sumartiningsih, Siti, Susanto Santiago Pararuk, and Ngestu Dwi Setyo Pambudi. "Mechanism for Protecting Personal Data Against Crimes in Cyber-Space (Cyber Crime)." Journal of Development Research 7, no. 1 (2023): 95–103. http://dx.doi.org/10.28926/jdr.v7i1.278.

Full text
Abstract:
Protection of personal data is one of the Human Rights (HAM) which is part of personal protection and all of its property needs to be given a legal basis to provide security for the personal data. Besides that, protection of personal data is needed to raise public awareness and guarantee recognition and respect for the importance of protecting personal data. Protection of personal data from hacking actions carried out by irresponsible people who can endanger themselves. By hacking personal data, hackers will be able to enter banking accounts, social media accounts, and others which can cause m
APA, Harvard, Vancouver, ISO, and other styles
41

Johri, Amar, and Shailendra Kumar. "Exploring Customer Awareness towards Their Cyber Security in the Kingdom of Saudi Arabia: A Study in the Era of Banking Digital Transformation." Human Behavior and Emerging Technologies 2023 (January 12, 2023): 1–10. http://dx.doi.org/10.1155/2023/2103442.

Full text
Abstract:
The annual rate of cybersecurity breaches has risen in the last few years, exposing millions of records in some cases. The average data breach cost in 2021 was a massive $4.24 million. This study examines customer awareness and satisfaction with cybersecurity in the context of the digital transformation of banking in Saudi Arabia. The study is empirical and based on the data collected from 355 banking customers in Saudi Arabia. Three significant aspects of cybersecurity, including cyberattacks, phishing, and hacking, have been analyzed through various dimensions. Customer satisfaction with ban
APA, Harvard, Vancouver, ISO, and other styles
42

Pappa, Tim. "Bahrun Naim’s Hacking Manifesto: How A Historical Model of Cyber Threat Mischaracterization Helps Us Diffuse a Dead Cyberterrorist Influencer." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 251–61. http://dx.doi.org/10.34190/iccws.19.1.2034.

Full text
Abstract:
The late Bahrun Naim is generally considered one of the most recognizable names of historical Indonesian cyber terrorist actors, where he continues to be characterized as a “computer guru” and hacker who supported Indonesian extremist and Islamic State hacking. This paper is the first reexamination of Naim’s lengthy e-book manifesto chapters on hacking, finding that most of the tutorial demonstrations on hacking tools readers might believe Naim performed were screen shots of other online content that Naim appeared to have plagiarized. This practitioner’s paper suggests that Naim is a historica
APA, Harvard, Vancouver, ISO, and other styles
43

ЯКІВЧЕНКО, Андрій. "GROWTH-HACKING ЯК ІНСТРУМЕНТ ЗАБЕЗПЕЧЕННЯ МОДЕЛІ РОЗВИТКУІННОВАЦІЙНОГО МАРКЕТИНГУ ПРОМИСЛОВОГО ПІДПРИЄМСТВА". Herald of Khmelnytskyi National University. Economic sciences 338, № 1 (2025): 343–53. https://doi.org/10.31891/2307-5740-2025-338-51.

Full text
Abstract:
This article explores the concept of Growth Hacking as an advanced marketing methodology designed to accelerate business growth in industrial enterprises by leveraging digital technologies, experimental testing, behavioral analytics, and automation tools. In the era of rapid digital transformation and economic uncertainty, traditional marketing approaches are becoming less effective, necessitating the adoption of more adaptive and technology-driven strategies. Growth Hacking, originally popularized in the technology startup ecosystem, has now evolved into a strategic tool for optimizing market
APA, Harvard, Vancouver, ISO, and other styles
44

Paulon, Moreno. "Social Ontology, Transient Mental Illness and Justified False Belief." Symposion 12, no. 1 (2025): 55–81. https://doi.org/10.5840/symposion20251214.

Full text
Abstract:
Officially dismissed between 1987 and 1993, hysteria has been the cornerstone for the birth of neurology, psychoanalysis and dynamic psychology along the 19th and 20th centuries. The nosological category is here endorsed as the result of the social construction of scientific facts. Starting from Ian Hacking's reflections on Transient Mental Illnesses, we intend to bring his conclusions towards contextualist epistemology, questioning knowledge as Justified True Belief and further reconsidering the status of DSM categories as scientific kinds. The idea that justificationism may guarantee reliabi
APA, Harvard, Vancouver, ISO, and other styles
45

Lee, Wanbil W. "Ethical Computing for Data Protection." International Journal of Technoethics 11, no. 1 (2020): 43–58. http://dx.doi.org/10.4018/ijt.2020010104.

Full text
Abstract:
Data protection is a chronic problem. Technology has had a social and ethical impact on our professional, social, and private lives. It is imperative for computing practitioners and researchers to link the ethical dilemmas and the technologies to the relevant ethical theories. This paper argues that the cause is rooted in our indifference to ethics—one doesn't take ethics as seriously into consideration as one should when formulating information security policies and protection standards—and proposes an ethics-based approach that can lessen the incidence of hacking or make hacking exasperate,
APA, Harvard, Vancouver, ISO, and other styles
46

Crane, Harry. "The Impact ofP-hacking on “Redefine Statistical Significance”." Basic and Applied Social Psychology 40, no. 4 (2018): 219–35. http://dx.doi.org/10.1080/01973533.2018.1474111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Karlgren, Kasper, Barry Brown, and Donald McMillan. "From Self-Tracking to Sleep-Hacking." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022): 1–26. http://dx.doi.org/10.1145/3555630.

Full text
Abstract:
With growing interest in how technology can make sense of our body and bodily experiences, this work looks at how these experiences are communicated through and with the help of technology. We present the ways in which knowledge about sleep, and how to manipulate it, is collectively shared online. This paper documents the sleep-change practices of four groups of 'Sleep Hackers' including Nurses, Polyphasic Sleeper, Over-sleepers, and Biohackers. Our thematic analysis uses 1002 posts taken from public forums discussing sleep change. This work reveals the different ways individuals share their e
APA, Harvard, Vancouver, ISO, and other styles
48

Hatfield, Joseph M. "Virtuous human hacking: The ethics of social engineering in penetration-testing." Computers & Security 83 (June 2019): 354–66. http://dx.doi.org/10.1016/j.cose.2019.02.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Christloy Totota Karo-Karo and Handar Subhandi Bakhtiar. "Analisis Kasus Peretasan Media Sosial melalui Digital Forensik sebagai Upaya Preventif Penyidik Mencegah Kejadian Salah Tangkap." Terang : Jurnal Kajian Ilmu Sosial, Politik dan Hukum 1, no. 4 (2024): 177–84. https://doi.org/10.62383/terang.v1i4.638.

Full text
Abstract:
Digital Forensics in Uncovering Social Media Hacking Events as a Tool to Help the Police to Fulfil Evidence. Normative legal research or library research, with a statute approach, conceptual approach, comparative approach, historical approach. The nature of the research used in this research is descriptive-prescriptive, the author uses content analysis. The role of digital forensics in finding scientific and objective results as a solid foundation that the police must have from the beginning of the legal process according to researchers is quite important. Because digital forensics is the basi
APA, Harvard, Vancouver, ISO, and other styles
50

Camussi, Elisabetta, Cinzia Sassi, Edoardo Zulato, Chiara Annovazzi, and Maria Cristina Ginevra. "Hacking women’s health: A new methodology." Journal of Prevention & Intervention in the Community 48, no. 2 (2019): 174–88. http://dx.doi.org/10.1080/10852352.2019.1624356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!