Siga este enlace para ver otros tipos de publicaciones sobre el tema: Hackers.

Tesis sobre el tema "Hackers"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores tesis para su investigación sobre el tema "Hackers".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Zubovych, A. "Are hackers outlaws or watchdogs?" Thesis, Київський національний університет технологій та дизайну, 2018. https://er.knutd.edu.ua/handle/123456789/11384.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Wilmes, Justin Allen. "The Red Scare: The Evolution and Impact of Russian Computer Hackers". Miami University Honors Theses / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1146055290.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Obruch, Arseniy. "The hackers attacks and modern viruses". Thesis, Київський національний університет технологій та дизайну, 2019. https://er.knutd.edu.ua/handle/123456789/13105.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Barudy, G. Claudia y A. Loreto Cristi. "Hackers: la identidad de un pirata postmoderno". Tesis, Universidad de Chile, 1999. http://repositorio.uchile.cl/handle/2250/136343.

Texto completo
Resumen
Seminario Para Optar al Grado Académico de Licenciado en Comunicación Social
El autor no autoriza el acceso a texto completo de su documento
Nuestra época se ha visto marcada por un ascendente proceso de globalización en el área de las comunicaciones. La rápida ampliación de las posibilidades de acceso a la comunicación vía Internet se ha constituido en el principal agente de este proceso. Por esto, consideramos que es muy importante poner atención a las relaciones comunicacionales que esta red genera. El hacker se instala en este contexto, nace y se desarrolla dentro de Internet, dedicado a investigar sistemas, obtener, intervenir o borrar información circulante a través de esta red.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Chavez, Nicholas Marshall. "CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?" CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/690.

Texto completo
Resumen
This project examines the protection methods suggested by hackers to guard against online victimization through the lens of Situation Crime Prevention. Data were collected from 85 webpages representing three categories of electronic communications: forums, blogs, and fan pages. The goal of this project was to identify which of the 25 opportunity reduction techniques the hacking community recommend most often, as well as, what level of expertise was associated with the suggested security measures. Results indicate that the technique most recommended by the hacking community was to remove targets with 27% of the total codings. From the results three themes were found: (1) most recommendations are such that implementing the strategies would serve to protect against opportunistic, low-skilled attacks; (2) most recommendations could be considered routine precautions, that when bundled, would secure most people against cyber-theft; and finally, (3) the Situational Crime Prevention framework was not fully realized because much of cyber-theft does not involve direct victim-perpetrator interactions. From these three themes policy recommendation and limitations are presented as well as avenues for future research.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Lockridge, Timothy Alan. "Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery". Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/77355.

Texto completo
Resumen
This dissertation uses a case study of 2600: The Hacker Quarterly to consider how the practices of a hacker public might be theorized as a rhetorical activity. The project is contextualized within a history of hacking (building from a narrative that centers on Levy's 1984 book Hackers) and within the arc of recent copyright legislation, specifically the Digital Millennium Copyright Act (DMCA) and the 2011-12 Stop Online Piracy Act (SOPA) debates. Within this framework, the dissertation examines how specific patterns and cases within 2600 might further our understanding of the rhetorical canons of memory and delivery and of dissent in digital spaces. Specifically, the project presents three practices of memory at work in 2600: Aggregating, Fingerprinting, and Narrating. Drawing on the work of Collin Gifford Brooke and Mary Carruthers, among others, the dissertation examines how texts printed in 2600 present memory not as an inert technology but rather as a practice and a pedagogy—a response to the increasing commercialization of technology. The dissertation then uses Jim Porter's techne of digital delivery to analyze three specific moments in 2600's history (the 1985 U.S. Government raid on New Jersey hackers, the E911 lawsuit, and the DeCSS narrative), illustrating how our spaces of textual production have become increasingly regulated and commercialized and considering how that regulation/commercialization affects our understanding of ownership, circulation, and the public sphere. Building on Michel de Cereteau's concept of strategies and tactics and Michael Warner's theory of (counter)publics, the dissertation ultimately argues that a history of hacker publics offers one way to reconceptualize and reintegrate theories and technologies of digital circulation into our scholarly work and curricular goals.
Ph. D.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Howlett, William IV. "The Rise of China's Hacking Culture: Defining Chinese Hackers". CSUSB ScholarWorks, 2016. https://scholarworks.lib.csusb.edu/etd/383.

Texto completo
Resumen
China has been home to some of the most prominent hackers and hacker groups of the global community throughout the last decade. In the last ten years, countless attacks globally have been linked to the People’s Republic of China (PRC) or those operating within the PRC. This exploration attempts to investigate the story, ideology, institutions, actions, and motivations of the Chinese hackers collectively, as sub-groups, and as individuals. I will do this using sources ranging from basic news coverage, interviews with experts and industry veterans, secondary reportage, leaked documents from government and private sources, government white papers, legal codes, blogs and microblogs, a wide array of materials from the darker corners of the online world, and many other materials. The work will begin to sketch for the reader some of the general and specific aspects of the shadowy world of cybercrime and hacker culture in China in recent years. One of the most prevalent beliefs is that the Chinese government is in fact the one responsible, whether directly or by sponsor, for cyber-attacks on foreign systems. My careful analysis has revealed is not always the case, or at least more complex than simply labeling the group as a state actor. At the root of these attacks is a social movement of "hacktivists," a patriotic sub-culture of Chinese hackers. It is incorrect to allege that all attacks are performed by state-sponsored individuals or groups, because there are many individuals and groups that are motivated by other factors.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

DELFANTI, ALESSANDRO. "GENOME HACKERS. REBEL BIOLOGY, OPEN SOURCE AND SCIENCE ETHIC". Doctoral thesis, Università degli Studi di Milano, 2011. http://hdl.handle.net/2434/159641.

Texto completo
Resumen
Crack the code, share your data, have fun, save the world, be independent, become famous and make a lot of money. The remix between the Mertonian ethic of 20th century science and the hacker ethic is producing an emergent open science culture that is redefining the relation between researchers, scientific institutions and intellectual property is redefined. The case studies, analysed through extensive media analysis, interviews and participatory observation, include the open access turn of the American biologist Craig Venter, the rebellion of the Italian virologist Ilaria Capua against WHO data sharing policies and the emergence of citizen biology projects that explicitly refer to the hacking history. In these cases the problem of access to and sharing of the data emerge as a crucial public issue, and open science tools such as open databases, open access journals and open platforms for data sharing are used. Finally, they operate in different and often opposing institutional settings. These biologists can be a rich model for current transformations in both life sciences and informational capitalism. They use open access tools but also rebel against bureaucracy and claim independence from both academic and corporate institutions. Autonomy, independence and radical openness coexist with other elements such as a radical refusal of interference coming from both academic and corporate incumbents. They insist on bare information as good per se, as long as it is shared and accessible. They rebel against the mechanisms of scholarly publishing and peer review. In some cases they express an explicit drive towards profit and entrepreneurship. Their public images are part of a transformation that involves the proprietary structure of scientific information - who owns and disposes of biological data and knowledge? - and challenges the institutional environment in which biological research takes place. Open science means both open to more participation and cooperation and open to a more diverse set of modes of capitalist appropriation.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Taylor, Paul Anthony. "Hackers : a case-study of the social shaping of computing". Thesis, University of Edinburgh, 1998. http://hdl.handle.net/1842/30821.

Texto completo
Resumen
The study is an examination of hacking, placing the act in the context of theories of technological change. Hacking is found to provide illustrative evidence within computing of theories which emphasise the societal shaping of technology over the notion of technological determination. The evolution of hacking is traced, showing how it reflects changing trends in the nature of information, the most vivid of which is the conceptualisation of information known as 'cyberspace'. Instead of simply cataloguing the impact of technical changes within computing and the effects they have had upon information, the study shows how technical change takes place in a process of negotiation and conflict between groups. The two main groups analysed are those of the Computer Underground (CU) and the Computer Security Industry (CSI). The experiences and views of both groups are recounted in what constitute internalist and externalist accounts, respectively, of hacking and its significance. The internalist account is the evidence provided by hackers themselves. It addresses such issues as what motivates the act of hacking; whether there is an identifiable hacking culture; and why it is almost an exclusively male activity. The externalist account contains the perceptions of hacking held by those outside the activity. The state of computing's security measures and its vulnerability to hacking is described, and evidence is provided of the extent to which hacking gives rise to technical knowledge that could be of potential use in the fixing of security weaknesses. The division within the CSI between those broadly cooperative with hackers and those largely hostile to them is described and the reasons why hacking knowledge is not generally utilised are explored. Hackers are prevented from gaining legitimacy within computing in a process referred to as 'closure', whereby they are stigmatised.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Viroli, Edoardo <1991&gt. "Hackers, cyberterrorismo e relazioni internazionali : Viaggio al centro della cibernetizzazione globale". Master's Degree Thesis, Università Ca' Foscari Venezia, 2016. http://hdl.handle.net/10579/8219.

Texto completo
Resumen
L'informatica e la tecnologia ad essa correlata (dai computer ad Internet) ha cominciato a svilupparsi a partire dal periodo immediatamente successivo alla Seconda guerra mondiale, rivelandosi sia uno strumento utilizzabile a fin di bene sia una potente arma qualora fosse impiegata con intenti dannosi tanto per i singoli individui quanto per la sicurezza degli Stati. L'avvento di Internet e una sempre più facile accessibilità a computer e strumenti multimediali, infatti, ha permesso la nascita prima e l'evoluzione poi di una nuova serie di crimini e criminali in grado di trarre sempre maggior beneficio dal fenomeno conosciuto come “cibernetizzazione” globale. Bisogna altresì tenere in considerazione, come da obiettivo di questa tesi, che non soltanto i crimini nell'accezione più comune del termine hanno subito una variazione, ma anche le metodologie in cui le guerre e, in particolare, gli atti di terrorismo vengono condotte e perpetrate. Obiettivo di questa tesi sarà, quindi, esaminare gli aspetti storici legati all'evoluzione tecnologica (con particolare riguardo ad Internet, il cyberspazio e tutto ciò ad essi correllato), la nascita e l'evoluzione degli attori principali di questa nuova forma di guerra e/o terrorismo (gli hacker) e gli effetti che le loro azioni hanno sulle relazioni internazionali tra gli Stati.
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Humbert, Jean-Philippe. "Les mondes de la cyberdélinquance et images sociales du pirate informatique". Thesis, Metz, 2007. http://www.theses.fr/2007METZ003L/document.

Texto completo
Resumen
La cyberdélinquance constitue un phénomène indissociable du monde numérique, depuis les premiers hackers recherchant la compréhension des mécanismes innovants de communication, jusqu'aux pirates informatiques majoritairement voués désormais à la criminalité. L'évolution et l'état actuel de ce phénomène déterminent, dès lors, un véritable questionnement sur la réalité sociale du pirate informatique responsable des faits de cyberdélinquance. En effet, comment l'appréhender et en atteindre la connaissance ? Afin d'en dégager les clés de compréhension, ces interrogations sont abordées par l'étude qualitative de cet acteur social responsable des actes de malveillance informatique. Cette recherche porte spécifiquement sur l'identification des processus de construction des significations sociales du pirate informatique. Nous répondrons principalement à cette question : peut-on parler, non pas d'une image sociale normalisée, mais plutôt de l'existence de plusieurs images sociales du pirate informatique ? Afin d'en permettre une étude compréhensive, l'objet sera décliné via le cadre de référence du concept de "monde social". L'analyse porte en premier lieu sur la représentation sociale de la cyberdélinquance, en déterminant son image construite. Un second moment est consacré à l'approche communicationnelle du contexte social de la cyberdélinquance, déclinant l'image médiatique dominante quant aux significations du pirate informatique. Enfin, afin d'anticiper la représentation sociale en construction du pirate informatique, une dernière partie se consacrera à une approche intégrée possible des images sociales du pirate informatique, via différents mondes sociaux de la cyberdélinquance. Ces trois clés de compréhension visent à mieux comprendre le phénomène de la cyberdélinquance et ses acteurs principaux, en construction socialement, à travers une dimension interculturelle
The cyberdelinquency constitutes an inseparable phenomenon from the numerical world, since the first hackers seeking comprehension of the innovating mechanisms of communication, to the recent computer pirates being posed as true criminals. The evolution and the current state of this phenomenon determine a true questioning on the social reality of the computer pirate responsible for the facts of cyberdelinquency. Indeed how to arrest it and attain knowledge ? To clear the keys of it of understanding, these questionings are approached by the qualitative study of this social actor responsible for acts of computer spitefulness. This research carries specifically the identification of the building processes of the social signification of the computer pirate. We'll answer mainly this question : can we speak, not of a normalized social picture, but rather the existence of several social pictures ? To allow an understanding study, the object will be declined via the reference frame of the concept of "social world". The analysis concerns firstly the social perception of cyberdelinquency, by determining its constructed picture. A second instant is dedicated to the communicative approach of this social context of the cyberdelinquency, declining the media picture predominant as for the signification of the computer pirate. Finally, to anticipate social perception in building of the computer pirate, a last party dedicates itself to a possible integrated approach of social pictures of the computer pirate, via different social worlds of the cyberdelinquency. These three keys of understanding aim at determine the phenomenon of cyberdelinquency better and his main actors, in building socially, across an intercultural dimension
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Famiglietti, Andrew A. "Hackers, Cyborgs, and Wikipedians: The Political Economy and Cultural History of Wikipedia". Bowling Green State University / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1300717552.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Oswald, Kathleen Frazer. "Hacking subject, subjecting hacking crisis in technoculture /". Click here for download, 2006. http://wwwlib.umi.com/cr/villanova/fullcit?p1432838.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Dalwadi, Chintan. "Network and data security". Birmingham, Ala. : University of Alabama at Birmingham, 2006. http://www.mhsl.uab.edu/dt/2006m/dalwadi.pdf.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Vignoli, Alessandro. "Identità, prestigio ed etica: analisi antropologica delle motivazioni e delle soddisfazioni degli Hackers". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2010. http://amslaurea.unibo.it/1218/.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Artore, Diane. "Honeynet design and implementation". Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/22614.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Imhof, Robert. "Cyber crime and telecommunications law /". Online version of thesis, 2010. http://hdl.handle.net/1850/12268.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Molony, Scott. "Finding Divinity in Fortran". Thesis, Boston College, 2011. http://hdl.handle.net/2345/1980.

Texto completo
Resumen
Thesis advisor: Richard Spinello
Thesis advisor: Stephen Pope
The information revolution is the single most important change in society since the printing press. At no other time has our society benefited from nearly limitless access to information and communication, and the changes brought on by this access have changed, and are changing, society in fundamental ways. Our homes, our workplaces, and our democracy have all been transformed by information and communication technologies.However, our ethics have not kept pace with our technological progress, and the immense changes brought by this this revolution have posed some equally immense moral questions. Indeed, there has been an almost total lack of religious discourse regarding the problems which have arisen out of the information revolution. This thesis is an attempt to change that.The thesis itself is structured as a series of essays on four key problems:1. Intellectual Property, as it relates to Scripture2. Information Ethics, the novel moral theory arising from Computer Ethics3. Robotic Ethics, especially the ethics of robotic warfare4. Hacker Culture, and its implicit spiritualityEach of these essays attempts to tackle one of these key problems, and demonstrate how a religious perspective illuminates some aspect of it. As befits a thesis from a Jesuit, Catholic university, most of the essays are drawn from a Catholic, Christian perspective
Thesis (BA) — Boston College, 2011
Submitted to: Boston College. College of Arts and Sciences
Discipline: Theology Honors Program
Discipline: Philosophy Honors Program
Discipline: Theology
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Rota, Andrea. "Hacking the Web 2.0 : user agency and the role of hackers as computational mediators". Thesis, London School of Economics and Political Science (University of London), 2016. http://etheses.lse.ac.uk/3313/.

Texto completo
Resumen
This thesis studies the contested reconfigurations of computational agency within the domain of practices and affordances involved in the use of the Internet in everyday life (here labelled lifeworld Internet), through the transition of the Internet to a much deeper reliance on computation than at any previous stage. Computational agency is here considered not only in terms of capacity to act enabled (or restrained) by the computational layer but also as the recursive capacity to reconfigure the computational layer itself, therefore in turn affecting one’s own and others’ computational agency. My research is based on multisited and diachronic ethnographic fieldwork: an initial (2005–2007) autoethnographic case study focused on the negotiations of computational agency within the development of a Web 2.0 application, later (2010–2011) fieldwork interviews focused on processes through which users make sense of the increasing pervasiveness of the Internet and of computation in everyday life, and a review (2010–2015) of hacker discourses focused on tracing the processes through which hackers constitute themselves as a recursive public able to inscribe counter–narratives in the development of technical form and to reproduce itself as a public of computational mediators with capacity to operate at the intersection of the technical and the social. By grounding my enquiry in the specific context of the lifeworlds of individual end users but by following computational agency through global hacker discourses, my research explores the role of computation, computational capacity and computational mediators in the processes through which users ‘hack’ their everyday Internet environments for practical utility, or develop independent alternatives to centralized Internet services as part of their contestation of values inscribed in the materiality of mainstream Internet.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Lira, Isadora Teixeira de. "Hacktivismo e organizações midiáticas: hackeamento de narrativas em wikileaks e mídia ninja". Universidade Federal da Paraíba, 2017. http://tede.biblioteca.ufpb.br:8080/handle/tede/9789.

Texto completo
Resumen
Submitted by Leonardo Cavalcante (leo.ocavalcante@gmail.com) on 2018-04-06T19:36:10Z No. of bitstreams: 1 Arquivototal.pdf: 2079200 bytes, checksum: 06b2527ecca826172c32b42bb3ef3e3c (MD5)
Made available in DSpace on 2018-04-06T19:36:10Z (GMT). No. of bitstreams: 1 Arquivototal.pdf: 2079200 bytes, checksum: 06b2527ecca826172c32b42bb3ef3e3c (MD5) Previous issue date: 2017-08-21
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
The maxim that says "information is power" takes on a larger and more complex dimension when experienced in the era of the spread of Internet access and the revolution of microcomputing. In this sense, we understand the hacktivist, as a political actor because of the possibilities of activism that are tied to their technical expertise. For this study, we conducted eight interviews, among researchers and hacktivists. We used A. Samuel (2004) to bring typologies of practices and definitions of hacktivism, M. Castells (2003, 2013), to instruct the research about internet legislation, M. Machado (2013, 2015) and S. Silveira (2010, 2015), who approach and research hacktivism in Brazil, and e F. Malini e H. Antoun (2013), with the definition about narrative hacker. Our research is centralized on the hacktivists organizations media, such as WikiLeaks and Mídia Ninja, focusing on two specific cases in which the organizations acted as narrative hackers: during the economic crisis in Iceland in 2008 and during the June Journeys of 2013, in Brazil, respectively. We verify that the two cases of hacking preceded and stressed the debate about digital rights and internet access, resulting in digital rights laws in their respective countries.
A máxima que diz ―informação é poder‖ toma uma dimensão maior e mais complexa quando vivenciada na era da propagação do acesso à internet e da revolução da microinformática. Neste sentido, entendemos o hacktivista, como um ator político em razão das possibilidades de ativismo que estão atreladas à sua perícia técnica. Para este estudo, realizamos oito entrevistas, dentre pesquisadores e hacktivistas e como escopo teórico utilizamos A. Samuel (2004), para trazer tipologias de práticas e definições de hacktivismo, M. Castells (2003, 2013), para tratar das pesquisas sobre legislação na internet, M. Machado (2013, 2015) e S. Silveira (2010, 2015), que abordam e pesquisam o hacktivismo no Brasil, e F. Malini e H. Antoun (2013), com sua definição de hacker de narrativas. Nossa pesquisa fica centrada nas organizações midiáticas hacktivistas, tais como WikiLeaks e Mídia Ninja, focando em dois casos específicos nos quais as organizações atuaram como hacker de narrativas: durante a crise econômica da Islândia em 2008 e durante as Jornadas de Junho de 2013, no Brasil, respectivamente. Constatamos que os dois hackeamentos predisseram e tensionaram o debate acerca de direitos digitais e acesso à internet, resultando em legislações sobre direitos digitais nos respectivos países.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Howell, Christian Jordan-Michael. "The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System". Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6259.

Texto completo
Resumen
System trespassing, which refers to the unauthorized access of computer systems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system trespassing little attention. The current study utilizes data gathered from a Chinese computer network to examine system trespasser behavior after exposure to one of three warning messages: an altruistic message used for moral persuasion (warning 1), a legal sanction threat (warning 2), and an ambiguous threat (warning 3). More specifically, the current study examines the temporal order of various keystroke commands to determine if some keystroke commands are used as a tactical skill to avoid detection. The results of a series of bivariate cross-tabulations show that encountering a standard legal threat or ambiguous threat increase the early use of reconnaissance commands; however, these findings were not pronounced enough to gain statistical significance. Since the current study is the first known test of particularistic restrictive deterrence in cyberspace it informs those working in cyber security, whilst expanding the scope of the theory.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Guimarães, Nathalia Muylaert Locks. "A tese como obra de arte na era de sua reprodutibilidade tecnica /". Araraquara, 2016. http://hdl.handle.net/11449/146686.

Texto completo
Resumen
Orientador: Milton Lahuerta
Banca: Carlota Josefina M. C. Reis Boto
Banca: Gabriel Henrique Burnatelli de Antônio
Banca: Ana Lúcia de Castro
Banca: Raul Fiker
Resumo: O Objetivo dessa tese foi a de criar um protótipo de tese virtual, que esteja de acordo com as novas formas de produção de conteúdo. A criação desse protótipo, que nada mais é do que a transposição de uma tese escrita para a forma de blog permite que a Universidade se aproprie do espaço Web, uma vez que a Universidade tem perdido o seu papel enquanto instituição de formação. Em uma época de excesso de informação, onde usuários comuns se apropriam da liberdade de criar conteúdo, filtrar informação necessária se torna um problema. Humberto Eco, em um texto sobre o papel das universidades, frente ao fenômeno do mídia mass, diz que é "preciso inventar, e difundir, uma nova arte da depuração", o que esse protótipo se objetiva a ser. É por isso, que chamamos a tese como obra de arte, pois o papel, o texto, a norma precisou ser reinventada para seja possível a apropriação do espaço da world wide web. Em seguida, reforço o argumento da reprodutibilidade técnica, incitando o leitor a conduzir a realizar sua própria mediação de maneira imanente. Desse modo, a paródia do texto de Walter Benjamim A obra de arte na era de sua reprodutibilidade técnica, parodiado como: A tese como obra de arte na era de sua reprodutibilidade técnica; crítica, de forma não discursiva, as normas da abnt, aliando o problema da quantidade no lugar de qualidade a sua forma de exposição e compilação de dados. Nesse sentido, a nota de rodapé, a citação, entre outras normas da abnt são pensadas em uma dimensão vi... (Resumo completo, clicar acesso eletrônico abaixo)
Abstract: The objective of this thesis was to create a virtual prototype thesis, which is in accordance with the new forms of content production. The creation of this prototype, which is nothing more than the implementation of a written thesis in the form of blog, allows the University to appropriate web space, since the University has lost its role as a training institution. In an age of information overload, where ordinary users appropriated the freedom to create content filter through necessary information becomes a problem. Umberto Eco, in a text on the role of universities, compared to the mass media phenomenon, says it is "necessary to invent, and impart a new art clearance", which this prototype is to be objective. That's why we call the thesis as a work of art, for the paper, the text, the standard needed to be reinvented for possible ownership of the world wide web space. Then reinforcing the technical reproducibility of the argument, urging the reader to lead to carry out its own mediation immanent way. Thus, the parody of text Walter Benjamin The Work of Art in the Age of Mechanical Reproduction (1936), parodied as The thesis as a work of art in the age of technical reproducibility; critical, not discursive form, the norms of abnt, combining the problem of quantity instead of quality to their way of exposure and data compilation. In this sense, the footnote, citation, among other standards abnt are thought in a virtual dimension. Number of pages become unnecessary when you can install a tool search. Thus, this study presents the following manner: 1) Thesis Virtual and Critique of abnt: Where has the methodology that was presented by version 1.02 (printed version, and transmedia, moving between the role of information and virtual content via QR-codes). Followed, the presentation of the virtual prototype (version 2.0) finalized on defense on June 9, 2016. And the preparation of the thesi... (Complete abstract click electronic access below)
Doutora
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Emerson, William J. III. "Mechanics and The Essence of Technology". Bowling Green State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1395930126.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Fontoura, Marcelo Crispim da. "Hackers e participação: uma análise de aplicativos de dados públicos do Brasil e seus criadores". Pontifícia Universidade Católica do Rio Grande do Sul, 2014. http://hdl.handle.net/10923/5691.

Texto completo
Resumen
Made available in DSpace on 2014-03-26T02:01:20Z (GMT). No. of bitstreams: 1 000455564-Texto+Completo-0.pdf: 2427221 bytes, checksum: 395629c80655b9bca09b8c14836ed987 (MD5) Previous issue date: 2014
This work seeks to explore the phenomenon of public data applications in Brazil. Mobile or not, they are digital programs created from public databases of the government. These programs reformat the information so as to make them more comprehensive and publicized to the general public. These applications are created by programmers and people interested in computer science, which are dedicated to explore government data and create visualizations and digital resources with them. The object of study thus lies at the intersection between the idea of government transparency and online participation, especially the work of hackers. We use the reconstructions of Coleman (2012), Levy (2010) and Castells (2003) to explore the work and practices of hackers. This is complemented with reflections from Jenkins (2009) and Shirky (2011) with regard to online participation, and the contributions of Rodriguez (2001), Schaffer (2007), Bowman and Willis (2003) and Bruns (2009) about citizen media. We apply, in addition, the thoughts of Williams (2005) and Castells (2001) on the assimilation of technologies and the relationship between technology and society, as well as the reconstruction of Briggs and Burke (2006) of the historical process of openness and circulation of information. This study, then, embeds a two-dimensional analysis. We analyze 17 applications from open data competitions in Brazil with the aim of contrasting the phenomenon of these programs with the concept of citizen media. We intended to understand how the two areas are related and what can be inferred from this manifestation in relation to other cases of online participation from the audience. This study also seeks to understand the motivations that lead these individuals to become involved in this area, exploring the underlying logic in their participations, and also the comprehension of their contributions. This was accomplished through semi-structured interviews with seven application developers. Moreover, we also created a typology of public data applications, with the goal of mapping this phenomenon. We seek to understand this recent concept, which is important from a social and communicational point of view.
Este trabalho se dedica a explorar o fenômeno dos aplicativos de dados públicos no Brasil. São programas digitais, móveis ou não, criados a partir de bancos de dados governamentais e públicos, que reformatam estas informações de modo a torná-las mais compreensivas e publicizadas para o público em geral. Eles são criados por programadores e interessados em informática, que se dedicam a explorar os dados governamentais e criar visualizações e recursos através deles. O objeto de estudo, assim, se encontra na intersecção entre a ideia de transparência governamental, a participação online e a atuação dos hackers. Utilizam-se as reconstruções de Coleman (2012), Levy (2010) e Castells (2003) para se apreender a atuação dos hackers. Isto é complementado com as reflexões de Jenkins (2009) e Shirky (2011) no que diz respeito à participação online, e com as contribuições de Rodriguez (2001), Schaffer (2007), Bowman e Willis (2003) e Bruns (2009) sobre a mídia cidadã. Se dispõe, além disso, dos pensamentos de Williams (2005) e Castells (2001) sobre a assimilação de tecnologias em meios sociais e a relação entre tecnologia e sociedade, e a reconstrução de Briggs e Burke (2006) sobre o processo histórico de abertura e circulação de informações.O presente estudo, então, parte de uma análise em duas dimensões. Se faz uma apreciação de 17 aplicativos de competições brasileiras de dados abertos, visando analisar o fenômeno destes programas à luz do conceito de mídia cidadã, para compreender como os dois âmbitos se relacionam e o que se pode depreender da manifestação com relação a outros casos de participação online da audiência. Busca-se também entender as motivações que levam estes indivíduos a se envolver com esta área, explorando as lógicas subjacentes a suas participações, além do entendimento sobre suas contribuições. Isto foi cumprido através de entrevista semi-estruturada em profundidade com sete criadores de aplicativos. De forma complementar, criou-se também uma tipologia dos aplicativos de dados públicos, objetivando mapear esta manifestação. Busca-se compreender amplamente este conceito recente, importante do ponto de vista social e comunicacional.
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Summers, Timothy Corneal. "HOW HACKERS THINK: A MIXED METHOD STUDY OF MENTAL MODELSAND COGNITIVE PATTERNS OF HIGH-TECH WIZARDS". Case Western Reserve University School of Graduate Studies / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=case1427809862.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Almeida, Fernanda Albuquerque de. "Machinima: entre a narrativa e a experimentação". Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/93/93131/tde-24042015-164451/.

Texto completo
Resumen
Desde os primeiros filmes realizados em jogos digitais nos anos 1990, a noção de machinima vem sendo associada às convenções do cinema clássico. Com isso, ela falha em abranger a diversidade das obras audiovisuais produzidas em ambientes virtuais interativos em tempo real. Assim, o presente estudo busca contribuir com uma melhor compreensão dessa noção, através da análise interpretativa dos seus filmes experimentais e da bibliografia específica. Ele também pretende colaborar com a sua expansão como meio de comunicação e expressão artística. Em um primeiro momento, busca-se evidenciar a associação da noção de machinima com o cinema clássico, através da apresentação dos filmes relevantes durante a sua história e também de uma análise interpretativa das primeiras publicações teóricas. A partir dessa constatação, são apresentadas práticas audiovisuais precedentes e filmes experimentais realizados nos seus anos iniciais. Em seguida, pretende-se demonstrar que o afastamento da narrativa representado pelas obras experimentais de machinima abre espaço para a identificação de outros elementos que possam colaborar com um entendimento mais aprofundado da sua noção. Dessa forma, as seguintes características são apresentadas e analisadas em relação a essa ideia: a performance, a intervenção e o registro. Essa aproximação é prosseguida pela análise interpretativa dos filmes Formation (Difference and Repetition), de Baden Pailthorpe, 30 Seconds or More One Animation a Day, de Victor Morales e Abstract Livecoded Machinima (Missile Command), de David Griffiths. Ao enfatizar as obras experimentais de machinima, a proposta deste estudo é evidenciar que há uma diversidade de caminhos, entre a narrativa e a experimentação, a serem percorridos pelos artistas com machinima e que a sua noção deve abranger a pluralidade dessas produções audiovisuais.
Since the first films accomplished in digital games in the 1990s, the concept of machinima has been associated to the conventions of classical cinema. Therewith, it fails to embrace the diversity of audiovisual works produced in real-time interactive virtual environments. Therefore, this study aims to contribute to a deepen comprehension of this concept through an interpretative analysis of its experimental films and also of the specific bibliography. It also intends to collaborate with its expansion as a communication and an artistic expression medium. First, it is aimed to evince the association of the idea of machinima with the classical cinema, through the presentation of the relevant films of its history and also through an interpretative analysis of the first theoretical publications. From this verification, the previous audiovisual practices and experimental movies accomplished in its first years are presented. Then, it is intended to demonstrate that the distance from narrative represented by the experimental works in machinima makes room for the identification of other features that may collaborate to a deepening understanding of its concept. Thus, the following features are presented and analyzed in relation to this idea: the performance, the intervention, and the record. This approximation is followed by the interpretative analysis of the films Formation (Difference and Repetition), by Baden Pailthorpe, 30 Seconds or More One Animation a Day, by Victor Morales, and Abstract Livecoded Machinima (Missile Command), by David Griffiths. By emphasizing the experimental works in machinima, the proposal of this study is to evince that there is a diversity of paths, between the narrative and the experimentation, to go through by the artists with machinima. Thus, its concept must include the plurality of these audiovisual productions.
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Bilan, Carolina y Carl Hedberg. "Säkerhetshot och lösningar för privatpersoner med bredband". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1491.

Texto completo
Resumen
As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats.
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Zufferey, Eric. "Changer le travail ou changer la société ? : Les hackers entre conformation à l’ordre social et volonté d’innover". Thesis, Lille 1, 2018. http://www.theses.fr/2018LIL1A001/document.

Texto completo
Resumen
Cette thèse vise à interroger le hacking comme source de changement social, voire de subversion de l’ordre social. En mettant en jeu une forme d’autodidaxie et un décloisonnement social entre amateurs, professionnels et militants, il fait espérer des changements dans l’accès aux savoirs, ainsi que dans les manières de penser le rôle de la technologie au sein de nos sociétés. Dans le prolongement d’une sociologie bourdieusienne, l’enquête analyse comment la pratique du hacking s’articule aux instances classiques de la socialisation – famille, amis, institutions scolaires, etc. – et examine quels types de mobilité sociale elle produit. En partant des cas de hackers suisses et français, nous montrons que l’autodidaxie se décline différemment selon l’origine sociale et la trajectoire : elle permet les trajectoires les plus ascendantes lorsqu’elle se combine avec la culture scientifique légitime. En cela, les hackers n’échappent à la pesanteur des rapports sociaux de classes, alors même qu’ils développent une propension à transférer leurs manières d’agir et de penser atypiques dans différentes sphères d’activités. La thèse montre que le travail est la principale cible de leurs investissements. Les succès ou les échecs à innover dans la sphère professionnelle expliquent pour une large part les investissements des hackers dans des activités de loisirs, des associations ou des formes de militantisme. Les implications dans la sphère politique restent limitées et ponctuelles, car y accéder suppose d’autres ressources que celles possédées par les hackers. Mettant en évidence la diversité du hacking, ce travail permet d’appréhender la complexité de ses potentiels impacts sociétaux
This thesis looks at hacking as source of social change, or even subversion of the social order. Hacking involves self-directed learning and remove social barriers between hobbyists, professionals and activists. Therefore, it raises the hope to renew the access to knowledge and the role of technologies in society. In line with the bourdieusian thought on reproduction of social inequalities, the study analyses how hacking articulate itself with the classical instances of socialization – family, friends, school system, etc. – and how it influences social mobility. By studying Swiss and French hackers, it shows that self-directed learning varies according to social origins and trajectories: it enables upward trajectories when it is combined with the legitimate scientific culture. In this regards, hackers do not escape the weight of social classes’ relations, although they are are willing to transfer their unusual behaviors and thought process across different areas of activities. Workplace is generally their main focus. Along with careerpath, success or failures to innovate in the professionnal sphere are key to understand the hackers’ involvement in leisure activities, associations, or various forms of activism. The participation in the political sphere is limited because hackers usually do not have the proper ressources. By highlighting the complexity of hacking, the thesis proposes a better understanding of its potential societal impacts
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Treguer, Félix. "Pouvoir et résistance dans l’espace public : une contre-histoire d’Internet (XVe -XXIe siècle)". Thesis, Paris, EHESS, 2017. http://www.theses.fr/2017EHES0117/document.

Texto completo
Resumen
Prenant pour point de départ les controverses contemporaines sur la liberté d’expression et la vie privée à l’ère numérique, cette thèse propose de revisiter l’histoire d’Internet au croisement de l’histoire du droit, des théories politiques et de l’histoire des sciences et des techniques. À travers une enquête de temps long sur l’affrontement des stratégies de pouvoir et de résistance associées aux techniques de communication, elle se veut une contribution à l’histoire de l’espace public et de l’activisme numérique. À partir de la « naissance » de l’imprimerie, la première partie retrace les formes de contrôle de l’espace public qui se structurent en même temps que l’État moderne, et la manière dont elles sont reconduites dans le cadre des régimes représentatifs-libéraux (XVe-XXe siècle). Dans un deuxième temps, l’étude suit l’émergence des projets antagonistes qui ont présidé au développement des réseaux informatiques, et ce afin d’expliquer la profonde ambivalence des appropriations politiques de ces technologies, à la fois instrument de la domination technocratique et outil d’émancipation (1930-1990). La troisième partie revient sur les premières controverses autour des libertés sur Internet et la structuration de l’activisme numérique, Internet étant bientôt investi comme un espace et un objet de luttes politiques, dans une période marquée par la mondialisation néo-libérale (1990-2001). La quatrième illustre, à travers les mesures de contrôle d’Internet adoptées au nom de la « guerre contre le terrorisme » et à travers la répression de certaines franges de l’activisme numérique, les mutations illibérales des États (2001-2017). L’étude entend ainsi contribuer à une réflexion collective sur l’un des en jeux identifiés par Michel Foucault dans ses écrits sur le pouvoir, à savoir : « comment déconnecter la croissance des capacités » – en l’espèce, les capacités associées aux « techniques de communication » – « et l’intensification des relations de pouvoir » ?
Taking contemporary debates on freedom of expression and privacy in the digital age as a starting point, this thesis revisits the history of the Internet at the intersection of legal history, political theory and history of science and technology. Through a long-time study of the clash between power and resistance strategies associated with communication technologies, it aims to contribute to the history of the public sphere and of digital activism. From the inception of the printing press on, the first part provides an overview of the forms of control of the public sphere developed under the modern state power, and of their extension under liberal-representative regimes (15th 21st century). In the second part, the study follows the antagonist utopias that shaped the development of computing technologies to explain the pro found ambivalence of their political appropriations, these technologies being construed both as an instrument of technocratic domination and a tool for emancipation (1930-1990). The third part analyses early controversies around the protection of civil rights online and the growth of digital activism, as the Internet becomes a locus of political struggles in a period marked by neoliberal globalization (1990-2001). Finally, the fourth part surveys recent Internet control measures adopted in the name of the "war on terror" and the repression of some segments of digital activism to illustrate the illiberal drift in state practices (2001-2017). The study thus aims to advance a collective thinking on one of the key questions identified by Michel Foucault in his writings on power: "How can the growth of capabilities" – and more specifically those brought about by "techniques of communication" – "be disconnected from the intensification of power relations?"
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Villavicencio, Terreros Felipe A. "Cybercrimes". IUS ET VERITAS, 2014. http://repositorio.pucp.edu.pe/index/handle/123456789/123541.

Texto completo
Resumen
In recent times, due to the development of information technology,a new form of crime called informational crimes has developed. in relation to this new type of crime, a special criminal law was issued, whose purpose is to prevent and punish illegal activities that affect computer systems and datas, secret communications, and other legal goods that are affected withthis type of crime, such as equity, public faith and sexual freedom.
En los últimos tiempos, producto del desarrollo de las tecnologías informáticas se ha ido desarrollando una nueva forma de criminalidad denominada delitos informativos. en relación a esta nueva forma delictiva, se ha emitido una Ley penal especial cuya finalidad es prevenir y sancionar las conductas ilícitas que afectan los sistemas y datos informáticos, así como el secreto de las comunicaciones, y los demás bienes jurídicos que resulten afectados con esta modalidad delictiva, como son el patrimonio, la fe pública y la libertad sexual.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Fontoura, Marcelo Crispim da. "Hackers e participa??o : uma an?lise de aplicativos de dados p?blicos do Brasil e seus criadores". Pontif?cia Universidade Cat?lica do Rio Grande do Sul, 2014. http://tede2.pucrs.br/tede2/handle/tede/4561.

Texto completo
Resumen
Made available in DSpace on 2015-04-14T14:41:54Z (GMT). No. of bitstreams: 1 455564.pdf: 2427221 bytes, checksum: 395629c80655b9bca09b8c14836ed987 (MD5) Previous issue date: 2014-01-14
This work seeks to explore the phenomenon of public data applications in Brazil. Mobile or not, they are digital programs created from public databases of the government. These programs reformat the information so as to make them more comprehensive and publicized to the general public. These applications are created by programmers and people interested in computer science, which are dedicated to explore government data and create visualizations and digital resources with them. The object of study thus lies at the intersection between the idea of government transparency and online participation, especially the work of hackers. We use the reconstructions of Coleman (2012), Levy (2010) and Castells (2003) to explore the work and practices of hackers. This is complemented with reflections from Jenkins (2009) and Shirky (2011) with regard to online participation, and the contributions of Rodriguez (2001), Schaffer (2007), Bowman and Willis (2003) and Bruns (2009) about citizen media. We apply, in addition, the thoughts of Williams (2005) and Castells (2001) on the assimilation of technologies and the relationship between technology and society, as well as the reconstruction of Briggs and Burke (2006) of the historical process of openness and circulation of information. This study, then, embeds a two-dimensional analysis. We analyze 17 applications from open data competitions in Brazil with the aim of contrasting the phenomenon of these programs with the concept of citizen media. We intended to understand how the two areas are related and what can be inferred from this manifestation in relation to other cases of online participation from the audience. This study also seeks to understand the motivations that lead these individuals to become involved in this area, exploring the underlying logic in their participations, and also the comprehension of their contributions. This was accomplished through semi-structured interviews with seven application developers. Moreover, we also created a typology of public data applications, with the goal of mapping this phenomenon. We seek to understand this recent concept, which is important from a social and communicational point of view.
Este trabalho se dedica a explorar o fen?meno dos aplicativos de dados p?blicos no Brasil. S?o programas digitais, m?veis ou n?o, criados a partir de bancos de dados governamentais e p?blicos, que reformatam estas informa??es de modo a torn?-las mais compreensivas e publicizadas para o p?blico em geral. Eles s?o criados por programadores e interessados em inform?tica, que se dedicam a explorar os dados governamentais e criar visualiza??es e recursos atrav?s deles. O objeto de estudo, assim, se encontra na intersec??o entre a ideia de transpar?ncia governamental, a participa??o online e a atua??o dos hackers. Utilizam-se as reconstru??es de Coleman (2012), Levy (2010) e Castells (2003) para se apreender a atua??o dos hackers. Isto ? complementado com as reflex?es de Jenkins (2009) e Shirky (2011) no que diz respeito ? participa??o online, e com as contribui??es de Rodriguez (2001), Schaffer (2007), Bowman e Willis (2003) e Bruns (2009) sobre a m?dia cidad?. Se disp?e, al?m disso, dos pensamentos de Williams (2005) e Castells (2001) sobre a assimila??o de tecnologias em meios sociais e a rela??o entre tecnologia e sociedade, e a reconstru??o de Briggs e Burke (2006) sobre o processo hist?rico de abertura e circula??o de informa??es. O presente estudo, ent?o, parte de uma an?lise em duas dimens?es. Se faz uma aprecia??o de 17 aplicativos de competi??es brasileiras de dados abertos, visando analisar o fen?meno destes programas ? luz do conceito de m?dia cidad?, para compreender como os dois ?mbitos se relacionam e o que se pode depreender da manifesta??o com rela??o a outros casos de participa??o online da audi?ncia. Busca-se tamb?m entender as motiva??es que levam estes indiv?duos a se envolver com esta ?rea, explorando as l?gicas subjacentes a suas participa??es, al?m do entendimento sobre suas contribui??es. Isto foi cumprido atrav?s de entrevista semi-estruturada em profundidade com sete criadores de aplicativos. De forma complementar, criou-se tamb?m uma tipologia dos aplicativos de dados p?blicos, objetivando mapear esta manifesta??o. Busca-se compreender amplamente este conceito recente, importante do ponto de vista social e comunicacional.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Bachmann, Michael. "WHAT MAKES THEM CLICK? APPLYING THE RATIONAL CHOICE PERSPECTIVE TO THE HACKING UNDERGROUND". Doctoral diss., University of Central Florida, 2008. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2277.

Texto completo
Resumen
The increasing dependence of modern societies, industries, and individuals on information technology and computer networks renders them ever more vulnerable to attacks on critical IT infrastructures. While the societal threat posed by hackers and other types of cyber-criminals has been growing significantly in the last decade, main-stream criminology has only recently begun to realize the significance of this threat. Cyber-criminology is slowly emerging as a subfield of criminological study and has yet to overcome many of the problems other areas of criminological research have already mastered. Aside from substantial methodological and theoretical problems, cyber-criminology currently also suffers from the scarcity of available data. As a result, scientific answers to crucial questions, such as who exactly the attackers are and why they engage in hacking activities, remain largely fragmentary. The present study begins to fill this remaining gap in the literature. It examines survey data about hackers, their involvement in hacking, their motivations to hack, and their hacking careers. The data for this study was collected during a large hacking convention in Washington D.C. in February 2008. The theoretical framework guiding the analyses is the rational choice perspective (Clarke & Cornish, 1985). Several hypotheses about hackers are derived from the theory and some of its models are transposed into the context of hackers. Results suggest that the rational choice perspective is a viable theory when applied to cyber-criminals. Findings also demonstrate that the creation of more effective countermeasures requires adjustments to our understanding of who hackers really are and why they hack.
Ph.D.
Department of Sociology
Sciences
Sociology PhD
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Bach, Sirlei Lourdes. "Contribuição do hacker para o desenvolvimento tecnológico da informática". Florianópolis, SC, 2001. http://repositorio.ufsc.br/xmlui/handle/123456789/82176.

Texto completo
Resumen
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós-Graduação em Ciência da Computação.
Made available in DSpace on 2012-10-19T12:25:48Z (GMT). No. of bitstreams: 0Bitstream added on 2014-09-25T20:01:43Z : No. of bitstreams: 1 184565.pdf: 8279207 bytes, checksum: 24d5f3b085dc3ef82704a988dfaf46c0 (MD5)
Dada a enorme importância política, econômica e social da Internet, urge realizar-se um estudo sobre a evolução das formas de invasão dos chamados piratas eletrônicos. Para tal, buscou-se primeiramente classificá-los de acordo com a terminologia empregada no ambiente virtual, resgatando a origem do termo hacker, o qual tem sofrido mutações devido ao uso equivocado pela mídia. Na seqüência, as falhas que são exploradas pelos piratas eletrônicos são apresentadas, seus modus operandis e as tecnologias de defesa e de prevenção, as quais são divulgadas e passíveis de conhecimento, embora sejam ignoradas ou desconhecidas por muitos administradores e desenvolvedores de sistemas, já que a insegurança nos sistemas é decorrente de falhas amplamente conhecidas com soluções já determinadas. Por fim, buscou-se resgatar a contribuição que tais piratas exercem no desenvolvimento e no aprimoramento tecnológico, evidenciado em suas habilidades, agregadas à dedicação e ao trabalho cooperativo, exigindo assim qualidade nos produtos e serviços oferecidos. Uma maneira de minimizar a insegurança dos sistemas, é manter um conhecimento detalhado e atualizado das tecnologias existentes, característica inerente aos piratas eletrônicos. Assim, reconhecendo suas habilidades e incentivando-os a aprimorarem os sistemas de segurança, os esforços que hoje são despendidos nestes sistemas, poderão ser transferidos para outros desafios.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Levine, John G. (John Glenn). "A Methodology for Detecting and Classifying Rootkit Exploits". Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5139.

Texto completo
Resumen
A Methodology for Detecting and Classifying Rootkit Exploits John G. Levine 164 Pages Directed by Dr. Henry L. Owen We propose a methodology to detect and classify rootkit exploits. The goal of this research is to provide system administrators, researchers, and security personnel with the information necessary in order to take the best possible recovery actions concerning systems that are compromised by rootkits. There is no such methodolgoy available at present to perform this function. This may also help to detect and fingerprint additional instances and prevent further security instances involving rootkits. A formal framework was developed in order to define rootkit exploits as an existing rootkit, a modification to an exisiting, or an entirely new rootkit. A methodology was then described in order to apply this framework against rootkits that are to be investigated. We then proposed some new methods to detect and characterize specific types of rootkit exploits. These methods consisted of identifying unique string signatures of binary executable files as well as examining the system call table within the system kernel. We established a Honeynet in order to aid in our research efforts and then applied our methodology to a previously unseen rootkit that was targeted against the Honeynet. By using our methodology we were able to uniquely characterize this rootkit and identify some unique signatures that could be used in the detection of this specific rootkit. We applied our methodolgy against nine additional rootkit exploits and were were able to identify unique characterstics for each of these rootkits. These charactersitics could also be used in the prevention and detection of these rootkits.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Kelly, Nicholas M. "The freedom of information hacked: console cowboys, computer wizards, and personal freedom in the digital age". Diss., University of Iowa, 2016. https://ir.uiowa.edu/etd/6778.

Texto completo
Resumen
“The Freedom of Information Hacked: Console Cowboys, Computer Wizards, and Personal Freedom in the Digital Age” examines depictions of computer hackers in fiction, the media, and popular culture, assessing how such depictions both influence and reflect popular conceptions of hackers and what they do. In doing so, the dissertation demonstrates the central concerns of hacker stories—concerns about digital security, privacy, and the value of information—have become the concerns of digital culture as a whole, hackers laying bare collective hopes and fears regarding digital networks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Menezes, Karina Moreira. "Pirâmide da pedagogia hacker =[vivências do (in) possível]". Faculdade de Educação, 2018. http://repositorio.ufba.br/ri/handle/ri/27168.

Texto completo
Resumen
Submitted by Karina Moreira Menezes (kaikamenezes@gmail.com) on 2018-08-23T18:04:29Z No. of bitstreams: 1 Kamenezes_P2H_EntregaPublica_Repositorio.pdf: 3636178 bytes, checksum: 81e197b6d5183b8028c2d340f16e8cb3 (MD5)
Rejected by Ana Miria Moreira (anamiriamoreira@hotmail.com), reason: Prezada Karina,gentileza retificar a ficha catalográfica, que deve ser exclusivamente elaborada pela bibliotecária responsável da Biblioteca Anísio Teixeira da Faculdade de Educação, por favor entrar em contato. (71) 3283-7255/7256; e-mail: biedu@ufba.br on 2018-08-24T17:24:03Z (GMT)
Submitted by Karina Moreira Menezes (kaikamenezes@gmail.com) on 2018-08-30T15:17:21Z No. of bitstreams: 1 Kamenezes_P2H_Entrega_RepositorioUFBA.pdf: 3548555 bytes, checksum: 0ad2a8b4948bd6bee64a5d4f18fe0ebf (MD5)
Approved for entry into archive by Ana Miria Moreira (anamiriamoreira@hotmail.com) on 2018-08-30T17:42:57Z (GMT) No. of bitstreams: 1 Kamenezes_P2H_Entrega_RepositorioUFBA.pdf: 3548555 bytes, checksum: 0ad2a8b4948bd6bee64a5d4f18fe0ebf (MD5)
Made available in DSpace on 2018-08-30T17:42:57Z (GMT). No. of bitstreams: 1 Kamenezes_P2H_Entrega_RepositorioUFBA.pdf: 3548555 bytes, checksum: 0ad2a8b4948bd6bee64a5d4f18fe0ebf (MD5)
Capes
Um espaço hacker (hackerspace) é um local físico no qual convergem pessoas interessadas em tecnologias numa perspectiva hackerista, ou seja, como potencialmente criadoras de novas realidades tendo a abertura e o compartilhamento como princípios. Ao primeiro contato, um hackerspace pode parecer um lugar no qual tudo acontece ao mesmo tempo ou então nada acontece, e apesar da atmosfera informal e caótica, os integrantes afirmam aprender muito nesses espaços, o que nos levou a colocar em foco os processos educativos que neles acontecem. Com o objetivo de analisar o fenômeno educativo em hackerspaces brasileiros para sistematizar elementos da pedagogia desses espaços, empreendeu-se uma investigação cuja a vivência no campo de pesquisa teve seu início antes de uma sistematização teórica mais profunda. Diante disso, assumindo-se a metodologia como criação dialógica com o objeto de estudo, respaldamo-nos na Teoria Fundamentada e na Pesquisa Participante, tendo como foco os processos educativos de hackerspaces brasileiros. Integrantes de vinte e dois espaços hackers contribuíram diretamente para a pesquisa através de 1) entrevistas semi-estruturadas por e-mail e/ou presenciais, 2) conversas informais e 3) um questionário online, fornecendo os construtos indicadores de que o ponto de sustentação da educação em hackerspaces é a necessidade de manutenção de sua própria existência como espaço físico, portanto, a vida NO hackerspace tal como a vida DO hackerspace são a força motriz dos seus processos educativos. Daí, emerge a tese de que a pedagogia hacker em hackerspaces é uma pedagogia de engajamento multifacetado, com quatro faces específicas e inter-relacionais: uma técnica, uma afetiva, uma ideária e uma política. Destaca-se que engajamento é tomado como decisão sobre si e ao mesmo tempo, ação sobre o outro e os quatro tipos de engajamento podem ser representados como faces pirâmide tridimensional, um tetraedro, na qual a pedagogia hacker em hackerspaces se estrutura no exercício de tornar possíveis vivências coerentes dentro de suas próprias contradições.
Abstract A hackerspace is a physical place in which converge people interested in technology in a hackertist perspective, in other words, as potentially creating new realities taking the openness and sharing as principles, upon first contact, a hackerspace can seem like a place where everything happens at the same time or then nothing happens, and despite the informal and chaotic atmosphere, members say learn a lot in these spaces, which led us to put into focus the educational processes that occur therein. With the objective of analyzing the educational phenomenon in Brazilian hackerspaces to systematize elements of pedagogy of these spaces, in addition, assuming the methodology as dialogic creation with the object of study, support methodologically in Grounded Theory and Research Participant, taking as its focus the educational processes of hackerspaces Brazilians. Members of twenty-two hacker spaces have contributed to the research through 1) semi-structured interviews by e-mail and/or courses, 2) informal conversations and 3) a questionnaire online, providing the constructs indicators that the point of sustaining the education in hackerspaces is the need to maintain their own existence as a physical space, therefore, life IN THE hackerspace as the life OF THE hackerspace are the driving force of its educational processes. Therefore, there emerges the thesis that the pedagogy hacker in hackerspaces is a pedagogy of engagement multifaceted, with four faces specific and inter-relational: a technique, an affective, a devise and a policy. It is noteworthy that, engagement is taken as a decision about themselves and at the same time, action about the other and the four faces are types of engagements that form a 3-dimensional pyramid in which the pedagogy hacker in hackerspaces is structured in the exercise of making possible the experiences that are consistent within their own contradictions.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Albuquerque, Mônica Ramalho de. "Existe vida além do código binário? Os hackers e o redimensionamento de princípios modernos em práticas pós-modernas na sociedade informacional". Universidade Federal da Paraí­ba, 2009. http://tede.biblioteca.ufpb.br:8080/handle/tede/7266.

Texto completo
Resumen
Made available in DSpace on 2015-05-14T13:26:56Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 440560 bytes, checksum: c6c94dec998cdfdda6c1e605e4e45a52 (MD5) Previous issue date: 2009-12-02
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
After the development of new information and communication technologies in the twentieth century, new social and aesthetic phenomena emerged by the adaptation of cultural, political and economic elements reestablishment. The hacker s and their actions are an unfolding of this scenario and they are part of the computer underground. This study seeks to understand the influence of new information and communication technologies in social relations, the emergence of new subjects and elements of identification that are represented here by the hackers. Thus, it is necessary to make a theoretical discussion about the development of modernity and the post-modernity, considering post-industrial theory and following the relationship of science and technology in this discussion that turned to informational society. This implies to recognize the elements that form the cyberculture and counter activities and ideals of the hackers with aspects that show the instrumentation and information technology as a way to control knowledge and the dynamics of society today. Finally, we hope to identify through interviews that were conducted, the issues that structure the hacker s identity elements, their ideals, ethics and social practices.
A partir do desenvolvimento das novas tecnologias da informação e comunicação no século XX, novos fenômenos sociais e estéticos surgiram na adaptação de elementos culturais, políticos e econômicos a esse redimensionamento. Os hackers e suas práticas são um desdobramento deste cenário e compõe o underground da informática. Este trabalho se propõe a buscar compreender a partir da influência das novas tecnologias da informação e comunicação nas relações sociais, o surgimento de novos sujeitos e elementos de identificação representados aqui pelos hackers. Para tanto, se faz necessário tecer uma discussão teórica acerca do desenvolvimento da modernidade e pós-modernidade, considerando a teoria pós-industrial e a relação da ciência e tecnologia nessa discussão voltada para a sociedade informacional. Isso implica em reconhecer os elementos que compõem a cibercultura e contrapor as atividades e ideais dos hackers com aspectos que demonstram a instrumentalização tecnológica e da informação como forma de controle do conhecimento e da dinâmica da sociedade atual. Por fim, esperamos identificar através das entrevistas feitas, os aspectos que estruturam a os elementos de identificação hacker, seus ideais, ética e práticas sociais.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Gupta, Nirbhay. "Determining the effectiveness of deceptive honeynets". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1303.

Texto completo
Resumen
Over the last few years, incidents of network based intrusions have rapidly increased, due to the increase and popularity of various attack tools easily available for download from the Internet. Due to this increase in intrusions, the concept of a network defence known as Honeypots developed. These honeypots are designed to ensnare attackers and monitor their activities. Honeypots use the principles of deception such as masking, mimicry, decoying, inventing, repackaging and dazzling to deceive attackers. Deception exists in various forms. It is a tactic to survive and defeat the motives of attackers. Due to its presence in the nature, deception has been widely used during wars and now in Information Systems. This thesis considers the current state of honeypot technology as well as describes the framework of how to improve the effectiveness of honeypots through the effective use of deception. In this research, a legitimate corporate deceptive network is created using Honeyd (a type of honeypot) which is attacked and improved using empirical learning approach. The data collected during the attacking exercise were analysed, using various measures, to determine the effectiveness of the deception in the honeypot network created using honeyd. The results indicate that the attackers were deceived into believing the honeynet was a real network which instead was a deceptive network.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Paulo, Luis Gonzaga de. "Um modelo complementar para aprimorar a segurança da informação no SDLC para dispositivos móveis: SDD - security driven development". Universidade Tecnológica Federal do Paraná, 2015. http://repositorio.utfpr.edu.br/jspui/handle/1/1895.

Texto completo
Resumen
O uso de dispositivos móveis por um número cada vez maior de pessoas, e em um número crescente de atividades que requerem mais segurança da informação, coloca em evidência a necessidade de prover segurança nos softwares desse ambiente. O aspecto de segurança da informação em dispositivos móveis é preocupante. Entretanto os modelos utilizados pela indústria de software – e os encontrados na literatura atual - no desenvolvimento de aplicações móveis com requisitos de segurança da informação de alto nível ainda não respondem às necessidades de mais segurança reclamadas pelos usuários. O presente estudo considera que tais modelos podem ser melhorados com o incremento de métodos e técnicas específicas, algumas já utilizadas com sucesso no desenvolvimento de aplicações desktop ou não voltadas para o ambiente de dispositivos móveis. Este trabalho propõe a inclusão de abordagem de segurança da informação no início do ciclo de vida do desenvolvimento de software, a partir do estudo das ameaças e vulnerabilidades, da aplicação antecipada dos casos de abuso – aqui chamados de casos de uso impróprio, da análise de risco, dos testes de segurança baseados no risco e do uso de máquinas de ataque nos testes de segurança durante o processo de desenvolvimento do software. Para alcançar o objetivo desta pesquisa, os modelos mais conhecidos e utilizados no ciclo de vida do desenvolvimento de software são analisados do ponto de vista da segurança da informação, e uma nova abordagem é proposta por meio do uso de um modelo complementar de desenvolvimento de software voltado para a segurança. Alguns modelos de artefatos são apresentados e um estudo de caso aplicando os conceitos tratados na pesquisa é utilizado com o intuito de avaliar as principais contribuições discutidas no texto, e também alguns dos resultados preliminares obtidos com a realização do trabalho de pesquisa.
The increasingly wide and intense use of mobile devices - whose processing and storage capacity grows almost overcoming the desktops - exposes greatly issues relating to information security in this environment. This is a worrying fact. However, the models currently found in the literature and used by software industry in developing mobile applications with the highest information security requirements are not yet answering users’ needs for more security, and may be improved adding specific methods or techniques, sometimes already used in desktop - or not mobile ones - applications development. This work proposes to insert information security approach early in the software development life cycle using threats and vulnerabilities study, the early application of abuse case - also called misuse cases, the risk analysis, the risk based security test and the use of attack machines in the development process. To reach the research goal, this work analyzed usual models used on SDLC from the information security point of view, and presents a new approach thru the use of a security driven development complementary model. The work also presents some templates and uses a case study for apply the concepts and evaluate the main contributions discussed in the text, also as the preliminary results obtained on the research.
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Ogbanufe, Obiageli. "Three Essays on Information Security Risk Management". Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157576/.

Texto completo
Resumen
Today's environment is filled with the proliferation of cyber-attacks that result in losses for organizations and individuals. Hackers often use compromised websites to distribute malware, making it difficult for individuals to detect. The impact of clicking through a link on the Internet that is malware infected can result in consequences such as private information theft and identity theft. Hackers are also known to perpetrate cyber-attacks that result in organizational security breaches that adversely affect organizations' finances, reputation, and market value. Risk management approaches for minimizing and recovering from cyber-attack losses and preventing further cyber-attacks are gaining more importance. Many studies exist that have increased our understanding of how individuals and organizations are motivated to reduce or avoid the risks of security breaches and cyber-attacks using safeguard mechanisms. The safeguards are sometimes technical in nature, such as intrusion detection software and anti-virus software. Other times, the safeguards are procedural in nature such as security policy adherence and security awareness and training. Many of these safeguards fall under the risk mitigation and risk avoidance aspects of risk management, and do not address other aspects of risk management, such as risk transfer. Researchers have argued that technological approaches to security risks are rarely sufficient for providing an overall protection of information system assets. Moreover, others argue that an overall protection must include a risk transfer strategy. Hence, there is a need to understand the risk transfer approach for managing information security risks. Further, in order to effectively address the information security puzzle, there also needs to be an understanding of the nature of the perpetrators of the problem – the hackers. Though hacker incidents proliferate the news, there are few theory based hacker studies. Even though the very nature of their actions presents a difficulty in their accessibility to research, a glimpse of how hackers perpetrate attacks can be obtained through the examination of their knowledge sharing behavior. Gaining some understanding about hackers through their knowledge sharing behavior may help researchers fine-tune future information security research. The insights could also help practitioners design more effective defensive security strategies and risk management efforts aimed at protecting information systems. Hence, this dissertation is interested in understanding the hackers that perpetrate cyber-attacks on individuals and organizations through their knowledge sharing behavior. Then, of interest also is how individuals form their URL click-through intention in the face of proliferated cyber risks. Finally, we explore how and why organizations that are faced with the risk of security breaches, commit to cyberinsurance as a risk management strategy. Thus, the fundamental research question of this dissertation is: how do individuals and organizations manage information security risks?
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

DiGiusto, Dennis Michael. "A protection motivation theory approach to home wireless network security in New Zealand establishing if groups of concerned wireless network users exist and exploring characteristics of behavioral intention : submitted to the School of Information Management, Victoria University of Wellington in partial fulfilment of the requirements for the degree of Master of Information Management /". ResearchArchive@Victoria e-Thesis, 2008. http://hdl.handle.net/10063/1148.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Buys, Stephanus. "Log analysis aided by latent semantic mapping". Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002963.

Texto completo
Resumen
In an age of zero-day exploits and increased on-line attacks on computing infrastructure, operational security practitioners are becoming increasingly aware of the value of the information captured in log events. Analysis of these events is critical during incident response, forensic investigations related to network breaches, hacking attacks and data leaks. Such analysis has led to the discipline of Security Event Analysis, also known as Log Analysis. There are several challenges when dealing with events, foremost being the increased volumes at which events are often generated and stored. Furthermore, events are often captured as unstructured data, with very little consistency in the formats or contents of the events. In this environment, security analysts and implementers of Log Management (LM) or Security Information and Event Management (SIEM) systems face the daunting task of identifying, classifying and disambiguating massive volumes of events in order for security analysis and automation to proceed. Latent Semantic Mapping (LSM) is a proven paradigm shown to be an effective method of, among other things, enabling word clustering, document clustering, topic clustering and semantic inference. This research is an investigation into the practical application of LSM in the discipline of Security Event Analysis, showing the value of using LSM to assist practitioners in identifying types of events, classifying events as belonging to certain sources or technologies and disambiguating different events from each other. The culmination of this research presents adaptations to traditional natural language processing techniques that resulted in improved efficacy of LSM when dealing with Security Event Analysis. This research provides strong evidence supporting the wider adoption and use of LSM, as well as further investigation into Security Event Analysis assisted by LSM and other natural language or computer-learning processing techniques.
LaTeX with hyperref package
Adobe Acrobat 9.54 Paper Capture Plug-in
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Withers, Kim. "A Psychosocial Behavioral Attribution Model: Examining the Relationship Between the “Dark Triad” and Cyber-Criminal Behaviors Impacting Social Networking Sites". Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1072.

Texto completo
Resumen
This study proposes that individual personality characteristics and behavioral triggering effects come together to motivate online victimization. It draws from psychology’s current understanding of personality traits, attribution theory, and criminological research. This study combines the current computer deviancy and hacker taxonomies with that of the Dark Triad model of personality mapping. Each computer deviant behavior is identified by its distinct dimensions of cyber-criminal behavior (e.g., unethical hacking, cyberbullying, cyberstalking, and identity theft) and analyzed against the Dark Triad personality factors (i.e., narcissism, Machiavellianism, and psychopathy). The goal of this study is to explore whether there are significant relationships among the Dark Triad personality traits and specific cyber-criminal behaviors within social network sites (SNSs). The study targets offensive security engineers and computer deviants from specific hacker conferences and from websites that discuss or promote computer deviant behavior (e.g., hacking). Additional sampling is taken from a general population of SNS users. Using a snowball sampling method, 235 subjects completed an anonymous, self-report survey that includes items measuring computer deviance, personality traits, and demographics. Results yield that there was no significant relationship between Dark Triad and cyber-criminal behaviors defined in the perceived hypotheses. The final chapter of the study summarizes the results and discusses the mechanisms potentially underlying the findings. In the context of achieving the latter objective, exploratory analyses are incorporated and partly relied upon. It also includes a discussion concerning the implications of the findings in terms of providing theoretical insights on the Dark Triad traits and cyber-criminal behaviors more generally.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Krutisch, Dorothee. "Strafbarkeit des unberechtigten Zugangs zu Computerdaten und -systemen /". Frankfurt am Main [u.a.] : Lang, 2004. http://www.gbv.de/dms/spk/sbb/recht/toc/376082763.pdf.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Gozukeles, Ibrahim Izlem. "Free And Open Source Software In Turkey". Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607173/index.pdf.

Texto completo
Resumen
In recent years, there has been growing interest of governments and firms for Free and Open Source Software (FOSS). However, FOSS is still a puzzlement for a wide spectrum of academic disciplines. Social scientists ask why FOSS hackers participate in FOSS if they do not get any monetary rewards. On the other hand firms ask, how a firm can earn money from FOSS. In this study, motivations of FOSS hackers and firms are taken as an interrelated phenomenon. For FOSS hackers, social and technical aspects of FOSS are essential. On the contrary to FOSS hackers, firms have profit oriented goals. In this context, conflicting and coinciding interests of FOSS hackers and firms are investigated through development of FOSS in Turkey. Software industry in Turkey is not developed enough and FOSS may play a prominent role in developing its own software industry. This study discusses FOSS both from the view of hackers and the firms in Turkey. In that respect, social conditions that make hackers voluntarily contribute, discrepancies between attitudes and behaviors of the firms and FOSS licenses are explored. According to these facts, possible FOSS business strategies which may be adopted in Turkey are presented.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Думчиков, Михайло Олександрович, Михаил Александрович Думчиков, Mykhailo Oleksandrovych Dumchykov, Олена Сергіївна Бондаренко, Елена Сергеевна Бондаренко y Olena Serhiivna Bondarenko. "Сучасні аспекти кібербезпеки в контексті глобальних загроз". Thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/78666.

Texto completo
Resumen
В умовах глобальних загроз забезпечення безпеки в світі, вимагає координації і врегулювання багатьох політичних і економічних питань. Зокрема, це осередки цивільних, міжетнічних конфліктів і воєн, продовольчі загрози, негативні наслідки зміни клімату, забруднення навколишнього середовища, виснаження природнихресурсів і уповільнення їх повторного відновлення. Однак серед усіх компонентівзабезпечення безпеки з’явився новий і одночасно складний елемент безпеки – кібербезпека. Щорічно зростає збиток великих організацій, компаній, окремих громадян і ділових людей від кібер атак і нападів зловмисників. Згідно з прогнозами компанії Gartner щорічні витрати корпорацій і компаній світу по підвищенню безпеки системи інформаційних технологій складають 76-77 млрд. дол. США [1]. А в цілому зростання кіберизиків за 2019 рік коштувала світовій економіці 445 млрд. дол. З цієї суми 108 млрд. припали на частку США. Ризики, пов’язані з кібершпіонажем і злочинами в сфері Інтернет-діяльності, продовжують нести все більші загрози для бізнесу. Половина витрат по запобіганню кіберризиків несли на собі економіки США, Китаю, Німеччини і Японії, що становить понад 200 млрд. дол. США.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Widyasari, Nuria. "Les hackers d'Airputih dans la reconstruction de ACEH : Indonésie, Post-Tsunami 2004 : contribution à l'Anthropologie des Sciences et Technologies de l'Information et de la Communication". Electronic Thesis or Diss., Paris 8, 2014. http://www.theses.fr/2014PA080003.

Texto completo
Resumen
Cette étude utilise à titre principal la théorie du « milieu » de Michel Serres dans le cadre de son grand concept de système de communication. Cette théorie considère les bruits qui environnent un message dans un canal de communication, comme des éléments importants qui décideront si le message est bien compris (ou non) par le Récepteur.Cette étude relie la théorie à un contexte plus large de la communication dans la province d’Aceh, en Indonésie, et reflète les éléments socio-politico-culture de sa reconstruction, après le tsunami de 2004.En appliquant l'approche de l'Anthropologie aux Technologies d’Information et de Communication (TIC), cette étude observe les « bruits » de la communication entre les habitants d'Aceh et l'équipe d'intervention d'urgence en TIC « AirPutih », composée de ce que l’on appelle communément des « hackers ».Le premier « bruit » vient de l'Emetteur du message, « AirPutih », avec son idéologie de Hackers et sa vision du monde javanaise. Le terme « Hacker » est techniquement utilisé pour une personne qui a écrit le code informatique et l'exploite dans les questions relatives à un système de sécurité de réseau. Mais cette étude utilisera préférablement le terme « Hacker » pour décrire l'état d'esprit d'AirPutih, le groupe de jeunes gens indonésiens qui sont arrivés à Aceh quatre jours après le tsunami qui a dévasté la région en 2004, pour rétablir la connexion TIC avec très peu d’argent en poche. L’état d'esprit de ces hackers qui sont, pour la plupart, d'origine javanaise, s’enracine dans les visions du monde javanais. Le second « bruit » vient du récepteur du message : les habitants d'Aceh. Le contexte culturel d'Aceh a connu deux évènements importants : la guerre civile qui a fait rage entre les habitants d'Aceh et le gouvernement central indonésien depuis 30 ans et le tsunami qui a frappé la zone en 2004. Il importe d’ailleurs de noter que les habitants d'Aceh sont de la longue histoire de leur vigoureux Etat islamique.Ces « bruits » se manifestent dans le « milieu » de la communication entre AirPutih et les habitants d'Aceh. Ces « bruits » seront examinés ici comme une négociation entre deux cultures, fortement contrainte par l'état post-catastrophe de région d'Aceh.Fondées sur les extraordinaires résultats d'AirPutih pour rétablir l'infrastructure des TIC en Aceh, les valeurs sociales qui ressortent de cette situation apparaissent alors comme opposées à l'hégémonie de la logique capitaliste qui domine le monde d'aujourd'hui
This study focuses on Michel Serres’ theory of “Milieu” as part of his bigger concept of communication systems. The theory considers that the surrounding Noises of a message in the canal of communication are the important elements that will decide whether the message is well understood (or not) by the receiver.This study places the theory in a wider context of communication in Aceh, Indonesia, reflecting the socio-politico-culture elements in the reconstruction of Aceh region after the Tsunami disaster of 2004.Using the approach of the Anthropology of Infocom, this study observes the “Noises” in the communication between the ICT Emergency Response Team “AirPutih” - which this study considers as Hackers - and the local inhabitants of Aceh.The first “Noise” comes from the Sender of the message: AirPutih, with its Hackers’ ideology and its Javanese code of behavior. The term ‘Hacker’ is technically used for a person who writes code and exploits it in issues related to a security system. This study, instead, will use the term ‘hackers’ to describe the mindset of AirPutih, the Indonesian group of young people who arrived in Aceh, Indonesia, only four days after the tsunami devastated the region in 2004, and re-established the ICT connection with almost no money at hand. This mindset of the hackers embraces the Javanese worldviews rooted in the everyday lives of the members of AirPutih, who are mostly of Javanese origin. The second “noise” comes from the Receiver of the message: the Acehnese. The cultural context of the Acehnese had endured two robust events: the civil war that raged between the Acehnese and the Indonesian central government for 30 years and the tsunami that hit Aceh in 2004. The Acehnese are also proud of their long history as a vigorous Islamic state.These “Noises” were in the “milieu” of the communication between AirPutih and the Acehnese. These “Noises” are scrutinized as the negotiation of cultures that is strongly framed by the post-disaster condition of Aceh, Indonesia. Surrounded by the intriguing result of the successful work of AirPutih in reestablishing the ICT infrastructure in Aceh, the values that come out from this discussion are then opposed to the prevailing hegemony of capitalist logic that dominates the world of today
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Widyasari, Nuria. "Les hackers d'Airputih dans la reconstruction de ACEH : Indonésie, Post-Tsunami 2004 : contribution à l'Anthropologie des Sciences et Technologies de l'Information et de la Communication". Thesis, Paris 8, 2014. http://www.theses.fr/2014PA080003.

Texto completo
Resumen
Cette étude utilise à titre principal la théorie du « milieu » de Michel Serres dans le cadre de son grand concept de système de communication. Cette théorie considère les bruits qui environnent un message dans un canal de communication, comme des éléments importants qui décideront si le message est bien compris (ou non) par le Récepteur.Cette étude relie la théorie à un contexte plus large de la communication dans la province d’Aceh, en Indonésie, et reflète les éléments socio-politico-culture de sa reconstruction, après le tsunami de 2004.En appliquant l'approche de l'Anthropologie aux Technologies d’Information et de Communication (TIC), cette étude observe les « bruits » de la communication entre les habitants d'Aceh et l'équipe d'intervention d'urgence en TIC « AirPutih », composée de ce que l’on appelle communément des « hackers ».Le premier « bruit » vient de l'Emetteur du message, « AirPutih », avec son idéologie de Hackers et sa vision du monde javanaise. Le terme « Hacker » est techniquement utilisé pour une personne qui a écrit le code informatique et l'exploite dans les questions relatives à un système de sécurité de réseau. Mais cette étude utilisera préférablement le terme « Hacker » pour décrire l'état d'esprit d'AirPutih, le groupe de jeunes gens indonésiens qui sont arrivés à Aceh quatre jours après le tsunami qui a dévasté la région en 2004, pour rétablir la connexion TIC avec très peu d’argent en poche. L’état d'esprit de ces hackers qui sont, pour la plupart, d'origine javanaise, s’enracine dans les visions du monde javanais. Le second « bruit » vient du récepteur du message : les habitants d'Aceh. Le contexte culturel d'Aceh a connu deux évènements importants : la guerre civile qui a fait rage entre les habitants d'Aceh et le gouvernement central indonésien depuis 30 ans et le tsunami qui a frappé la zone en 2004. Il importe d’ailleurs de noter que les habitants d'Aceh sont de la longue histoire de leur vigoureux Etat islamique.Ces « bruits » se manifestent dans le « milieu » de la communication entre AirPutih et les habitants d'Aceh. Ces « bruits » seront examinés ici comme une négociation entre deux cultures, fortement contrainte par l'état post-catastrophe de région d'Aceh.Fondées sur les extraordinaires résultats d'AirPutih pour rétablir l'infrastructure des TIC en Aceh, les valeurs sociales qui ressortent de cette situation apparaissent alors comme opposées à l'hégémonie de la logique capitaliste qui domine le monde d'aujourd'hui
This study focuses on Michel Serres’ theory of “Milieu” as part of his bigger concept of communication systems. The theory considers that the surrounding Noises of a message in the canal of communication are the important elements that will decide whether the message is well understood (or not) by the receiver.This study places the theory in a wider context of communication in Aceh, Indonesia, reflecting the socio-politico-culture elements in the reconstruction of Aceh region after the Tsunami disaster of 2004.Using the approach of the Anthropology of Infocom, this study observes the “Noises” in the communication between the ICT Emergency Response Team “AirPutih” - which this study considers as Hackers - and the local inhabitants of Aceh.The first “Noise” comes from the Sender of the message: AirPutih, with its Hackers’ ideology and its Javanese code of behavior. The term ‘Hacker’ is technically used for a person who writes code and exploits it in issues related to a security system. This study, instead, will use the term ‘hackers’ to describe the mindset of AirPutih, the Indonesian group of young people who arrived in Aceh, Indonesia, only four days after the tsunami devastated the region in 2004, and re-established the ICT connection with almost no money at hand. This mindset of the hackers embraces the Javanese worldviews rooted in the everyday lives of the members of AirPutih, who are mostly of Javanese origin. The second “noise” comes from the Receiver of the message: the Acehnese. The cultural context of the Acehnese had endured two robust events: the civil war that raged between the Acehnese and the Indonesian central government for 30 years and the tsunami that hit Aceh in 2004. The Acehnese are also proud of their long history as a vigorous Islamic state.These “Noises” were in the “milieu” of the communication between AirPutih and the Acehnese. These “Noises” are scrutinized as the negotiation of cultures that is strongly framed by the post-disaster condition of Aceh, Indonesia. Surrounded by the intriguing result of the successful work of AirPutih in reestablishing the ICT infrastructure in Aceh, the values that come out from this discussion are then opposed to the prevailing hegemony of capitalist logic that dominates the world of today
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Burtet, Cecilia Gerhardt. "Os saberes desenvolvidos nas práticas em um hackerspace de Porto Alegre". reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2014. http://hdl.handle.net/10183/109016.

Texto completo
Resumen
Na tentativa de compreender como os saberes são desenvolvidos nas práticas de um grupo em um hackerspace, este estudo parte da perspectiva da aprendizagem baseada em práticas pelo viés da abordagem teórico-metodológica da teoria atorrede para acompanhar a realização das atividades cotidianas de um coletivo em um hackerspace. Sem definições prévias estabelecidas acerca do conceito de hackerspace, o estudo tem como objetivo compreender como os saberes são desenvolvidos nas práticas de um grupo, em um hackerspace, e como são enactados pelas relações entre os diversos elementos heterogêneos da rede. Para isso, foi necessário, além da análise das práticas predominantes no cotidiano do coletivo, identificar e descrever – considerando humanos e não humanos de forma simétrica – como os processos de aprendizagem são engendrados nessas práticas, passando a constituir saberes. A fim de viabilizar a pesquisa, desenvolveu-se um estudo, orientado pela teoria ator-rede como método e lente de análise, entre os meses de dezembro de 2013 e setembro de 2014, em um hackerspace localizado em Porto Alegre, RS. Com o propósito de alcançar os objetivos formulados nesse trabalho, são descritas e analisadas as principais práticas predominantes na organização pesquisada e seus processos de aprendizagem, revelando que práticas, saberes e aprendizagem coexistem e se encontram imbricadas no constante organizar do coletivo. A incompletude de ser e as hibridizações enactadas nas práticas são discutidas posteriormente e denotam a agência dos não humanos, oriunda de arranjos momentaneamente estabelecidos entre os actantes da rede. A pesquisa revelou a complexidade dos saberes, que se encontram vinculados a um conjunto de práticas conectadas, uma vez que são constituídos por elas, ao mesmo tempo em que as constituem, sendo engendrados nas relações heterogêneas da rede.
In order to understand how the knowledge is developed in the practices of a hackerspace group, this research proceeds from the learning perspective of practices based on the theoretical and methodological approach of the actor-network theory bias to monitor daily activities of a collective in a hackerspace. Without previous definition of the concept of hackerspace, this study objective is to comprehend how the knowledge is developed in a group, in a hackerspace, and how it is accomplished by the relationship between the various heterogeneous network elements. For this, it was necessary, in addition to analyze the current practices in the daily life of the group, identify and describe – considering symmetrically humans and nonhumans – how the learning processes are fomented in these practices and built into knowledge. In order to accredit the research, a study was developed, based on the actor-network theory as the method of the analysis, from December 2013 to September 2014, in a hackerspace located in Porto Alegre, RS. With the purpose to achieve the goals of this research, the key practices and learning processes of the studied organization are described and analyzed, revealing that practice, knowledge and learning are intertwined and coexist in the group. The incompleteness of being and the hybridizations accomplished in the practices are discussed posteriorly and denote the agency of nonhumans, emerged from momentaneous arrangements established among the actants of the network. The study reveals the complexity of knowledge, which is linked to a group of practices, as it is constituted by them and in the same time it constitutes them, being engendered in the heterogeneous relations of the network.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Sanches, Wilken David. "O movimento de software livre e a produção colaborativa do conhecimento". Pontifícia Universidade Católica de São Paulo, 2007. http://tede2.pucsp.br/handle/handle/2676.

Texto completo
Resumen
Made available in DSpace on 2016-04-25T20:21:49Z (GMT). No. of bitstreams: 1 Wilken.pdf: 1398546 bytes, checksum: 829e2098dbfebfbb3ec091d6b72d1bfd (MD5) Previous issue date: 2007-05-25
This dissertation approaches the construction of a collaborative model of knowledge production disseminated by the Free Software Movement and its opposition to the current law of intelectual property. It describes the genesis of the free software movement as well as how it has become consolidated as an independent domain of knowledge production. In order to better illustrate the model of production proposed by the Free Software Movement and its virtual communities, this paper presents an analysis on the Debian project´s organization and structure for the making of decisions. It explores the limitations of the current model of intelectual property and how it has become a powerful tool for making knowledge a prisoner of private institutions. At last, this dissertation presents how this new model of collaborative production surpasses the software development and begins to influence different areas of knowledge, leaving behing the idea of intelectual property and becoming a concept of intelectual inheritance
A dissertação trata da construção de um modelo colaborativo de produção do conhecimento pelo Movimento de Software Livre e seu embate com a atual legislação de propriedade intelectual. É descrita a gênese do movimento de software livre e como ele vem sendo consolidado como um campo autônomo de produção do conhecimento. Para exemplificar o modelo de produção proposto pelo Movimento de Software Livre e suas comunidades virtuais, é feita uma análise da organização e da estrutura para tomada de decisões do projeto Debian. A dissertação explora as limitações do atual modelo de propriedade intelectual e como este vem se tornando uma poderosa ferramenta para o aprisionamento do conhecimento dentro de instituições privadas. Por fim, é apresentado, de que forma esse novo modelo de produção colaborativa ultrapassa o desenvolvimento de softwares e passa a influenciar outras áreas do conhecimento, abandonando a idéia de propriedade intelectual e aproximandose do conceito de patrimônio intelectual
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía