Journal articles on the topic 'Social hacking'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Social hacking.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Greiner, Lynn. "Hacking social networks." netWorker 13, no. 1 (2009): 9–11. http://dx.doi.org/10.1145/1516035.1516038.
Full textMohamad, Ani Munirah, Zaiton Hamin, Mohd Zakhiri Md Nor, and Nurhazman Abdul Aziz. "SELECTED THEORIES ON CRIMINALISATION OF HACKING." International Journal of Law, Government and Communication 6, no. 22 (2021): 168–78. http://dx.doi.org/10.35631/ijlgc.6220016.
Full textApplegate, Scott D. "Social Engineering: Hacking the Wetware!" Information Security Journal: A Global Perspective 18, no. 1 (2009): 40–46. http://dx.doi.org/10.1080/19393550802623214.
Full textO'Shea, Clara. "Learning how kinds matter." Proceedings of the International Conference on Networked Learning 11 (May 14, 2018): 203–9. http://dx.doi.org/10.54337/nlc.v11.8756.
Full textDavies, Sarah R. "Characterizing Hacking." Science, Technology, & Human Values 43, no. 2 (2017): 171–97. http://dx.doi.org/10.1177/0162243917703464.
Full textRasch, Elisabet Dueholm. "Hacking the System." Contention 10, no. 1 (2022): 65–80. http://dx.doi.org/10.3167/cont.2022.100106.
Full textHeslen, John J. "Neurocognitive hacking." Politics and the Life Sciences 39, no. 1 (2020): 87–100. http://dx.doi.org/10.1017/pls.2020.3.
Full textCohen, Matt. "Hacking Colonialism." PMLA/Publications of the Modern Language Association of America 135, no. 3 (2020): 559–64. http://dx.doi.org/10.1632/pmla.2020.135.3.559.
Full textHunsinger, Jeremy. "Hacking Together Globally." Digital Culture & Society 3, no. 1 (2017): 95–108. http://dx.doi.org/10.14361/dcs-2017-0106.
Full textTraxler, Martino. "Ian Hacking, The Social Construction of What?" Philosophical Inquiry 24, no. 1 (2002): 117–19. http://dx.doi.org/10.5840/philinquiry2002241/212.
Full textPybus, Jennifer, Mark Coté, and Tobias Blanke. "Hacking the social life of Big Data." Big Data & Society 2, no. 2 (2015): 205395171561664. http://dx.doi.org/10.1177/2053951715616649.
Full textTikhonova, Sophia V. "Maurizio Ferraris' Theory of Documentality and Social Media: Media Hacking as Hacking of Cultural Memory." Galactica Media: Journal of Media Studies 4, no. 2 (2022): 84–101. http://dx.doi.org/10.46539/gmd.v4i2.262.
Full textBack, Sinchul, Sadhika Soor, and Jennifer LaPrade. "Juvenile Hackers: An Empirical Test of Self-Control Theory and Social Bonding Theory." International Journal of Cybersecurity Intelligence and Cybercrime 1, no. 1 (2018): 40–55. http://dx.doi.org/10.52306/01010518vmdc9371.
Full textPalassis, Alexa, Craig P. Speelman, and Julie Ann Pooley. "An Exploration of the Psychological Impact of Hacking Victimization." SAGE Open 11, no. 4 (2021): 215824402110615. http://dx.doi.org/10.1177/21582440211061556.
Full textRegner, Anna Carolina Krebs Pereira. "Resenha - "Construcionismo Social": desarmando um campo minado." Episteme – Filosofia e História das Ciências em Revista 4, no. 9 (1999): 131–36. https://doi.org/10.5281/zenodo.6524020.
Full textAbu-Shaqra, Baha, and Rocci Luppicini. "Technoethical Inquiry into Ethical Hacking at a Canadian University." International Journal of Technoethics 7, no. 1 (2016): 62–76. http://dx.doi.org/10.4018/ijt.2016010105.
Full textWilcox, Heidi, and Maumita Bhattacharya. "A Human Dimension of Hacking: Social Engineering through Social Media." IOP Conference Series: Materials Science and Engineering 790 (April 7, 2020): 012040. http://dx.doi.org/10.1088/1757-899x/790/1/012040.
Full textPavlik, Kimberly. "Cybercrime, Hacking, And Legislation." Journal of Cybersecurity Research (JCR) 2, no. 1 (2017): 13–16. http://dx.doi.org/10.19030/jcr.v2i1.9966.
Full textMartineau, Melissa, Elena Spiridon, and Mary Aiken. "Pathways to Criminal Hacking: Connecting Lived Experiences with Theoretical Explanations." Forensic Sciences 4, no. 4 (2024): 647–68. https://doi.org/10.3390/forensicsci4040045.
Full textHussey, Ian, and Sean Hughes. "Hidden Invalidity Among 15 Commonly Used Measures in Social and Personality Psychology." Advances in Methods and Practices in Psychological Science 3, no. 2 (2020): 166–84. http://dx.doi.org/10.1177/2515245919882903.
Full textSaad, Alsunbul, Dung Le Phu, and Tan Jefferson. "DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES." International Journal of Network Security & Its Applications (IJNSA) 7, no. 4 (2015): 01–30. https://doi.org/10.5281/zenodo.8276180.
Full textCollin, Finn. "Bunge and Hacking on Constructivism." Philosophy of the Social Sciences 31, no. 3 (2001): 424–53. http://dx.doi.org/10.1177/004839310103100308.
Full textLindgren, Simon. "Hacking Social Science for the Age of Datafication." Journal of Digital Social Research 1, no. 1 (2019): 1–9. http://dx.doi.org/10.33621/jdsr.v1i1.6.
Full textBarry, Ben, Philippa Nesbitt, Alexis De Villa, Kristina McMullin, and Jonathan Dumitra. "Re-Making Clothing, Re-Making Worlds: On Crip Fashion Hacking." Social Sciences 12, no. 9 (2023): 500. http://dx.doi.org/10.3390/socsci12090500.
Full textWang, Allegro. "(Im)possible Futures." GLQ 29, no. 3 (2023): 305–27. http://dx.doi.org/10.1215/10642684-10437208.
Full textAradau, Claudia, Tobias Blanke, and Giles Greenway. "Acts of digital parasitism: Hacking, humanitarian apps and platformisation." New Media & Society 21, no. 11-12 (2019): 2548–65. http://dx.doi.org/10.1177/1461444819852589.
Full textBazolli, João Aparecido, Lucas Rodrigues Dantas, and Eliene Campelo Coelho. "INOVAÇÃO E DEMOCRACIA: Civic hacking como ferramenta de tecnologia social na experiência do projeto “Nós propomos”– Palmas/TO." Revista Observatório 4, no. 6 (2018): 944–64. http://dx.doi.org/10.20873/uft.2447-4266.2018v4n6p944.
Full textNycyk, Michael. "The New Computer Hacker’s Quest and Contest with the Experienced Hackers: A Qualitative Study applying Pierre Bourdieu’s Field Theory." International Journal of Cyber Criminology 10, no. 2 (2016): 92–109. https://doi.org/10.5281/zenodo.163402.
Full textBellaby, Ross W. "An Ethical Framework for Hacking Operations." Ethical Theory and Moral Practice 24, no. 1 (2021): 231–55. http://dx.doi.org/10.1007/s10677-021-10166-8.
Full textCuartielles Ruiz, David, and César García Sáez. "From Hacking to Making." Digital Culture & Society 6, no. 1 (2020): 85–106. http://dx.doi.org/10.14361/dcs-2020-0105.
Full textZłocka, Anna Maria. "Christopher Hadnagy, Socjotechnika. Sztuka zdobywania władzy nad umysłami." Studia Politologiczne 2019, no. 54 (2019): 300–304. http://dx.doi.org/10.33896/spolit.2019.54.12.
Full textBhuvana, Chandra Shetty, T. Thanushree, Lokannavar Divya, and Nirmala S. Dr. "Cracking Wi-Fi using Python." International Journal of Innovative Science and Research Technology 8, no. 5 (2023): 1500–1505. https://doi.org/10.5281/zenodo.7988431.
Full textSekhar Bhusal, Chandra. "Systematic Review on Social Engineering: Hacking by Manipulating Humans." Journal of Information Security 12, no. 01 (2021): 104–14. http://dx.doi.org/10.4236/jis.2021.121005.
Full textPalmås, Karl. "From hacking to simulation: Periodizing digitally-inspired social theory." Technological Forecasting and Social Change 145 (August 2019): 105–12. http://dx.doi.org/10.1016/j.techfore.2019.05.008.
Full textSöderberg, Johan. "Inquiring Hacking as Politics." Science, Technology, & Human Values 42, no. 5 (2017): 969–80. http://dx.doi.org/10.1177/0162243916688094.
Full textWright, Michelle F., and Sebastian Wachs. "Adolescents’ Cyber Victimization: The Influence of Technologies, Gender, and Gender Stereotype Traits." International Journal of Environmental Research and Public Health 17, no. 4 (2020): 1293. http://dx.doi.org/10.3390/ijerph17041293.
Full textWright, Michelle F. "The Role of Technologies, Behaviors, Gender, and Gender Stereotype Traits in Adolescents’ Cyber Aggression." Journal of Interpersonal Violence 35, no. 7-8 (2017): 1719–38. http://dx.doi.org/10.1177/0886260517696858.
Full textInayah, Tuti. "The Role of the Alliance of Independent Journalist (AJI) Palembang in Dealing with Hacking and Disinformation of Journalist." TABAYYUN 4, no. 2 (2023): 408–20. http://dx.doi.org/10.19109/tabayyun.v4i2.19267.
Full textAdefabi, Raheemat, Oludolamu Onimole, Abuh Ibrahim Sani, et al. "Cognitive Hacking and Social Engineering in Healthcare: Exploiting Human Behaviour." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 1–8. https://doi.org/10.34190/eccws.24.1.3337.
Full textSumartiningsih, Siti, Susanto Santiago Pararuk, and Ngestu Dwi Setyo Pambudi. "Mechanism for Protecting Personal Data Against Crimes in Cyber-Space (Cyber Crime)." Journal of Development Research 7, no. 1 (2023): 95–103. http://dx.doi.org/10.28926/jdr.v7i1.278.
Full textJohri, Amar, and Shailendra Kumar. "Exploring Customer Awareness towards Their Cyber Security in the Kingdom of Saudi Arabia: A Study in the Era of Banking Digital Transformation." Human Behavior and Emerging Technologies 2023 (January 12, 2023): 1–10. http://dx.doi.org/10.1155/2023/2103442.
Full textPappa, Tim. "Bahrun Naim’s Hacking Manifesto: How A Historical Model of Cyber Threat Mischaracterization Helps Us Diffuse a Dead Cyberterrorist Influencer." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 251–61. http://dx.doi.org/10.34190/iccws.19.1.2034.
Full textЯКІВЧЕНКО, Андрій. "GROWTH-HACKING ЯК ІНСТРУМЕНТ ЗАБЕЗПЕЧЕННЯ МОДЕЛІ РОЗВИТКУІННОВАЦІЙНОГО МАРКЕТИНГУ ПРОМИСЛОВОГО ПІДПРИЄМСТВА". Herald of Khmelnytskyi National University. Economic sciences 338, № 1 (2025): 343–53. https://doi.org/10.31891/2307-5740-2025-338-51.
Full textPaulon, Moreno. "Social Ontology, Transient Mental Illness and Justified False Belief." Symposion 12, no. 1 (2025): 55–81. https://doi.org/10.5840/symposion20251214.
Full textLee, Wanbil W. "Ethical Computing for Data Protection." International Journal of Technoethics 11, no. 1 (2020): 43–58. http://dx.doi.org/10.4018/ijt.2020010104.
Full textCrane, Harry. "The Impact ofP-hacking on “Redefine Statistical Significance”." Basic and Applied Social Psychology 40, no. 4 (2018): 219–35. http://dx.doi.org/10.1080/01973533.2018.1474111.
Full textKarlgren, Kasper, Barry Brown, and Donald McMillan. "From Self-Tracking to Sleep-Hacking." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022): 1–26. http://dx.doi.org/10.1145/3555630.
Full textHatfield, Joseph M. "Virtuous human hacking: The ethics of social engineering in penetration-testing." Computers & Security 83 (June 2019): 354–66. http://dx.doi.org/10.1016/j.cose.2019.02.012.
Full textChristloy Totota Karo-Karo and Handar Subhandi Bakhtiar. "Analisis Kasus Peretasan Media Sosial melalui Digital Forensik sebagai Upaya Preventif Penyidik Mencegah Kejadian Salah Tangkap." Terang : Jurnal Kajian Ilmu Sosial, Politik dan Hukum 1, no. 4 (2024): 177–84. https://doi.org/10.62383/terang.v1i4.638.
Full textCamussi, Elisabetta, Cinzia Sassi, Edoardo Zulato, Chiara Annovazzi, and Maria Cristina Ginevra. "Hacking women’s health: A new methodology." Journal of Prevention & Intervention in the Community 48, no. 2 (2019): 174–88. http://dx.doi.org/10.1080/10852352.2019.1624356.
Full text