Literatura académica sobre el tema "Hackers"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Hackers".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Hackers"

1

Hausken, Kjell. "Information Sharing Among Cyber Hackers in Successive Attacks." International Game Theory Review 19, no. 02 (2017): 1750010. http://dx.doi.org/10.1142/s0219198917500104.

Texto completo
Resumen
Supplementing the literature on information sharing between firms, the paper seeks to understand information sharing between hackers and how firms defend against increasingly sophisticated hackers. Each hacker seeks financial gain, mutually beneficial information exchange, and reputation gain. The two hackers’ attack and the firm’s defense are inverse U shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The first hacker’s information sharing increases as both hackers focus increasingly on reputation gain. The two hackers largely increase their information sharing, with two exceptions. The second hacker’s attack is deterred by the first hacker’s reputation gain. The firm’s defense against the second hacker increases in the second hacker’s unit cost, decreases in the second hacker’s information sharing effectiveness and utilization of joint sharing, and also decreases in both hackers’ reputation gain. Policy and managerial implications are provided.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Odemis, Murat, Cagatay Yucel, and Ahmet Koltuksuz. "Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System." Security and Communication Networks 2022 (January 27, 2022): 1–28. http://dx.doi.org/10.1155/2022/7620125.

Texto completo
Resumen
This research demonstrates a design of an experiment of a hacker infiltrating a server where it is assumed that the communication between the hacker and the target server is established, and the hacker also escalated his rights on the server. Therefore, the honeypot server setup has been designed to reveal the correlation of a hacker’s actions with that of the hacker’s experience, personality, expertise, and psychology. To the best of our knowledge, such a design of experiment has never been tested rigorously on a honeypot implementation except for self-reporting tests applied to hackers in the literature. However, no study evaluates the actual data of these hackers and these tests. This study also provides a honeypot design to understand the personality and expertise of the hacker and displays the correlation of these data with the tests. Our Honeypsy system is composed of a Big-5 personality test, a cyber expertise test, and a capture-the-flag (CTF) event to collect logs with honeypot applied in this sequence. These three steps generate data on the expertise and psychology of known cyber hackers. The logs of the known hacker activities on honeypots are obtained through the CTF event that they have participated in. The design and deployment of a honeypot, as well as the CTF event, were specifically prepared for this research. Our aim is to predict an unknown hacker's expertise and personality by analyzing these data. By examining/analyzing the data of the known hackers, it is now possible to make predictions about the expertise and personality of the unknown hackers. The same logic applies when one tries to predict the next move of the unknown hackers attacking the server. We have aimed to underline the details of the personalities and expertise of hackers and thus help the defense experts of victimized institutions to develop their cyber defense strategies in accordance with the modus operandi of the hackers.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Bátfai, Norbert, Renátó Besenczi, József Szabó, et al. "DEAC-Hackers: játszó hackerek, hackelő játékosok." Információs Társadalom 18, no. 1 (2018): 132. http://dx.doi.org/10.22503/inftars.xviii.2018.1.9.

Texto completo
Resumen
Klasszikus értelmezésben a hacker a kifinomult problémákat kifinomultan kezelni képes szakértő. Tipikusan programozó, de ugyanúgy mutathat hacker attitűdöket, lehet hacker egy művész, egy feltaláló, egy tudós vagy egy sportoló is. Ebben a cikkben azt mutatjuk be, hogyan lehet hacker egy e-sportoló játékos. A hacker természetéből fakadóan autodidakta, de a tanulási folyamat formális eszközökkel segíthető, katalizálható. A mi ilyen formális keretünk a Debreceni Egyetem Atlétikai Clubjának (DEAC) nemrégiben megalakított e-sport szakosztálya, a cikkben bemutatott DEAC-Hackers. 
 
 ---
 
 DEAC-Hackers - Playing Hackers and Hacking Gamers
 
 In the classic sense of the word, a hacker is an expert who can solve sophisticated problems in a sophisticated way. In most cases, a hacker is a programmer, but hacker attitudes can be demonstrated by an artist, an inventor, a scientist or even an athlete. In this paper, we show how an esport player can be a hacker. A hacker is self-educated in nature, but his learning process can be aided with formal tools. One of our formal tools is the recently founded DEAC-Hackers, the esport department of the University of Debrecen Athletic Club, which is also introduced in this article. 
 
 Keywords: esport, gamer, hacker, esport department
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Hausken, Kjell. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers." International Game Theory Review 20, no. 01 (2018): 1750027. http://dx.doi.org/10.1142/s021919891750027x.

Texto completo
Resumen
One firm defends proactively or retroactively against a first hacker, and thereafter against a second hacker, in four four-period games. The hackers share information for financial gain, mutual advantage, and reputation. The first hacker’s attack and information sharing are strategic substitutes. When the firm is proactive in period 1, the first hacker’s information sharing decreases as the second hacker’s attack cost increases. The deterring effort in eight corner solutions is proportional to the deterred player’s valuation and inverse proportional to the deterred player’s unit effort cost. When the first hacker exerts higher effort and shares more information, lower defense by the firm is sufficient to deter the second hacker. When the firm is deterred by the first hacker, the first hacker attacks less and shares more information than in the interior solution. For the first hacker and the firm, both players commonly prefer the disadvantaged player to move first. The exception is that the firm prefers to deter the first disadvantaged hacker when the two hackers benefit substantially from information sharing, reputation gain, or the second player is advantaged. The results contrast with the literature where the advantaged player commonly prefers to move first, with conflicting sequence preferences.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Cekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking." Communications - Scientific letters of the University of Zilina 20, no. 2 (2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.

Texto completo
Resumen
Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker’s point of view as well as the defender’s point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together with the weakness that hackers can use for their own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on the mobile phones and on possible attacks in the announced flood of the internet of things (next IoT) devices.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Guo, Boyu. "Why Hackers Become Crackers – An Analysis of Conflicts Faced by Hackers." Public Administration Research 5, no. 1 (2016): 29. http://dx.doi.org/10.5539/par.v5n1p29.

Texto completo
Resumen
<p>Hacker culture is generally regarded as a subculture, and the public has a high degree of misunderstanding towards hackers. The media reports sometimes depict hackers overly negatively, possibly because hackers could gain a dominant position in the age of information and, therefore, threaten the existing balance of social power distribution. Moreover, those reports, whether intentionally or not, misunderstand the meaning of “hackers”: “Hackers” are people who want to identify and solve problems directly and effectively, but “crackers” are those who cause problems for society.</p>However, it is not merely a problem of media’s misnomer. This research shows that apart from the media distortion of hacker identity, even the hackers with positive intentions still have real potential to become crackers. Therefore, the aim of this paper is to understand why the transition from “hackers” to “crackers” takes place by identifying crucial factors that influence hackers’ behaviors. Specifically, the inherent conflicts between cyberspace and the real world can turn hackers into crackers. Through the research, two major conflicts are identified: the conflict between freedom and responsibility and the conflict between individuality and authority. To support the arguments, the history of hacker culture and specific cases of hacking events are studied and discussed. The research also brings a crucial issue: how do we co-exist with information technology in a society that is increasingly computerized and digitalized? To face this problem, we need to comprehensively understand situations faced by human civilization in the information era. Hacker culture is, therefore, a practical perspective of studying social transformations in the development of technology.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Al-Ajlouni, Mahmoud Mohammad. "Human Resources and their Tendency to Information Security Crimes Based on Holland Theory." Information Resources Management Journal 31, no. 4 (2018): 44–58. http://dx.doi.org/10.4018/irmj.2018100103.

Texto completo
Resumen
Security systems are often the target of cyber-criminals and professional hackers, but often they fail in hiding all traces of the attack, thereby leaving critical evidence that could lead to identifying and arresting the criminal. However, hacking skills vary from one hacker to another depending on the hacker's personal traits, behavior, and intellectual tendencies. The aim of this study is to develop a proposed descriptive model of the behavioral patterns and motives of hackers based on programmable psychological theories, modeled using object-oriented programming models. The study proposes a descriptive model of an inverse algorithm that simulates Holland's Theory of Behavioral Patterns. Findings show that this descriptive model is applicable to be produced as a code map for the human resources of an investigative nature.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Scariot Esquivel, Nelson. "Hackers, política y revolución." Question/Cuestión 3, no. 72 (2022): E716. http://dx.doi.org/10.24215/16696581e716.

Texto completo
Resumen
El siguiente artículo está basado en el capítulo tres de mi tesina de grado La cultura hacker como filosofía de vida en la era del capitalismo cibernético. Una aproximación al caso en Mendoza. Aquí analizamos el potencial revolucionario de les hackers frente al actual sistema económico, político e informático que gobierna el mundo: el capitalismo cibernético (Tiqqun, 2016). Centrándonos en el aspecto político y filosófico de la cultura hacker. En efecto, buscamos responder a las siguientes preguntas: ¿Pueden los/as hackers constituirse en una clase política? ¿Por qué pensar a los/as hackers en términos revolucionarios? ¿Presentan efectivamente una actitud revolucionaria frente al capitalismo cibernético? ¿Cuáles son sus posibilidades para establecer una revolución? ¿Es correcto hablar de filosofía hacker?
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Bratus, Sergey. "Hacker Curriculum : How Hackers Learn Networking." IEEE Distributed Systems Online 8, no. 10 (2007): 2. http://dx.doi.org/10.1109/mdso.2007.4384582.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Banda, Raphael, Jackson Phiri, Mayumbo Nyirenda, and Monica M. Kabemba. "Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools." Zambia ICT Journal 3, no. 1 (2019): 40–51. http://dx.doi.org/10.33260/zictjournal.v3i1.74.

Texto completo
Resumen
Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and will be there and we can be victims of their existence. In essence hackers seem to beget hackers and the tools that they use are getting more and more advanced by the day. We shall take a quick analysis of selected tools from thousands of tools used by ethical and unethical hackers.We shall systematically review three major types of hackers that we can identify. It is not easy to draw a line between them. Three main hackers and minor hackers have been discussed in this paper. The three main hackers are black hat, grey hat and white hat hackers.We have adopted a systematic review of literature to discuss and analyse some of the common tools the black hat hackers have developed to hack into selected systems and commercial software and why they do it?
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!