Tesis sobre el tema "Hackers"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores tesis para su investigación sobre el tema "Hackers".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Zubovych, A. "Are hackers outlaws or watchdogs?" Thesis, Київський національний університет технологій та дизайну, 2018. https://er.knutd.edu.ua/handle/123456789/11384.
Texto completoWilmes, Justin Allen. "The Red Scare: The Evolution and Impact of Russian Computer Hackers". Miami University Honors Theses / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1146055290.
Texto completoObruch, Arseniy. "The hackers attacks and modern viruses". Thesis, Київський національний університет технологій та дизайну, 2019. https://er.knutd.edu.ua/handle/123456789/13105.
Texto completoBarudy, G. Claudia y A. Loreto Cristi. "Hackers: la identidad de un pirata postmoderno". Tesis, Universidad de Chile, 1999. http://repositorio.uchile.cl/handle/2250/136343.
Texto completoEl autor no autoriza el acceso a texto completo de su documento
Nuestra época se ha visto marcada por un ascendente proceso de globalización en el área de las comunicaciones. La rápida ampliación de las posibilidades de acceso a la comunicación vía Internet se ha constituido en el principal agente de este proceso. Por esto, consideramos que es muy importante poner atención a las relaciones comunicacionales que esta red genera. El hacker se instala en este contexto, nace y se desarrolla dentro de Internet, dedicado a investigar sistemas, obtener, intervenir o borrar información circulante a través de esta red.
Chavez, Nicholas Marshall. "CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?" CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/690.
Texto completoLockridge, Timothy Alan. "Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery". Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/77355.
Texto completoPh. D.
Howlett, William IV. "The Rise of China's Hacking Culture: Defining Chinese Hackers". CSUSB ScholarWorks, 2016. https://scholarworks.lib.csusb.edu/etd/383.
Texto completoDELFANTI, ALESSANDRO. "GENOME HACKERS. REBEL BIOLOGY, OPEN SOURCE AND SCIENCE ETHIC". Doctoral thesis, Università degli Studi di Milano, 2011. http://hdl.handle.net/2434/159641.
Texto completoTaylor, Paul Anthony. "Hackers : a case-study of the social shaping of computing". Thesis, University of Edinburgh, 1998. http://hdl.handle.net/1842/30821.
Texto completoViroli, Edoardo <1991>. "Hackers, cyberterrorismo e relazioni internazionali : Viaggio al centro della cibernetizzazione globale". Master's Degree Thesis, Università Ca' Foscari Venezia, 2016. http://hdl.handle.net/10579/8219.
Texto completoHumbert, Jean-Philippe. "Les mondes de la cyberdélinquance et images sociales du pirate informatique". Thesis, Metz, 2007. http://www.theses.fr/2007METZ003L/document.
Texto completoThe cyberdelinquency constitutes an inseparable phenomenon from the numerical world, since the first hackers seeking comprehension of the innovating mechanisms of communication, to the recent computer pirates being posed as true criminals. The evolution and the current state of this phenomenon determine a true questioning on the social reality of the computer pirate responsible for the facts of cyberdelinquency. Indeed how to arrest it and attain knowledge ? To clear the keys of it of understanding, these questionings are approached by the qualitative study of this social actor responsible for acts of computer spitefulness. This research carries specifically the identification of the building processes of the social signification of the computer pirate. We'll answer mainly this question : can we speak, not of a normalized social picture, but rather the existence of several social pictures ? To allow an understanding study, the object will be declined via the reference frame of the concept of "social world". The analysis concerns firstly the social perception of cyberdelinquency, by determining its constructed picture. A second instant is dedicated to the communicative approach of this social context of the cyberdelinquency, declining the media picture predominant as for the signification of the computer pirate. Finally, to anticipate social perception in building of the computer pirate, a last party dedicates itself to a possible integrated approach of social pictures of the computer pirate, via different social worlds of the cyberdelinquency. These three keys of understanding aim at determine the phenomenon of cyberdelinquency better and his main actors, in building socially, across an intercultural dimension
Famiglietti, Andrew A. "Hackers, Cyborgs, and Wikipedians: The Political Economy and Cultural History of Wikipedia". Bowling Green State University / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1300717552.
Texto completoOswald, Kathleen Frazer. "Hacking subject, subjecting hacking crisis in technoculture /". Click here for download, 2006. http://wwwlib.umi.com/cr/villanova/fullcit?p1432838.
Texto completoDalwadi, Chintan. "Network and data security". Birmingham, Ala. : University of Alabama at Birmingham, 2006. http://www.mhsl.uab.edu/dt/2006m/dalwadi.pdf.
Texto completoVignoli, Alessandro. "Identità, prestigio ed etica: analisi antropologica delle motivazioni e delle soddisfazioni degli Hackers". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2010. http://amslaurea.unibo.it/1218/.
Texto completoArtore, Diane. "Honeynet design and implementation". Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/22614.
Texto completoImhof, Robert. "Cyber crime and telecommunications law /". Online version of thesis, 2010. http://hdl.handle.net/1850/12268.
Texto completoMolony, Scott. "Finding Divinity in Fortran". Thesis, Boston College, 2011. http://hdl.handle.net/2345/1980.
Texto completoThesis advisor: Stephen Pope
The information revolution is the single most important change in society since the printing press. At no other time has our society benefited from nearly limitless access to information and communication, and the changes brought on by this access have changed, and are changing, society in fundamental ways. Our homes, our workplaces, and our democracy have all been transformed by information and communication technologies.However, our ethics have not kept pace with our technological progress, and the immense changes brought by this this revolution have posed some equally immense moral questions. Indeed, there has been an almost total lack of religious discourse regarding the problems which have arisen out of the information revolution. This thesis is an attempt to change that.The thesis itself is structured as a series of essays on four key problems:1. Intellectual Property, as it relates to Scripture2. Information Ethics, the novel moral theory arising from Computer Ethics3. Robotic Ethics, especially the ethics of robotic warfare4. Hacker Culture, and its implicit spiritualityEach of these essays attempts to tackle one of these key problems, and demonstrate how a religious perspective illuminates some aspect of it. As befits a thesis from a Jesuit, Catholic university, most of the essays are drawn from a Catholic, Christian perspective
Thesis (BA) — Boston College, 2011
Submitted to: Boston College. College of Arts and Sciences
Discipline: Theology Honors Program
Discipline: Philosophy Honors Program
Discipline: Theology
Rota, Andrea. "Hacking the Web 2.0 : user agency and the role of hackers as computational mediators". Thesis, London School of Economics and Political Science (University of London), 2016. http://etheses.lse.ac.uk/3313/.
Texto completoLira, Isadora Teixeira de. "Hacktivismo e organizações midiáticas: hackeamento de narrativas em wikileaks e mídia ninja". Universidade Federal da Paraíba, 2017. http://tede.biblioteca.ufpb.br:8080/handle/tede/9789.
Texto completoMade available in DSpace on 2018-04-06T19:36:10Z (GMT). No. of bitstreams: 1 Arquivototal.pdf: 2079200 bytes, checksum: 06b2527ecca826172c32b42bb3ef3e3c (MD5) Previous issue date: 2017-08-21
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
The maxim that says "information is power" takes on a larger and more complex dimension when experienced in the era of the spread of Internet access and the revolution of microcomputing. In this sense, we understand the hacktivist, as a political actor because of the possibilities of activism that are tied to their technical expertise. For this study, we conducted eight interviews, among researchers and hacktivists. We used A. Samuel (2004) to bring typologies of practices and definitions of hacktivism, M. Castells (2003, 2013), to instruct the research about internet legislation, M. Machado (2013, 2015) and S. Silveira (2010, 2015), who approach and research hacktivism in Brazil, and e F. Malini e H. Antoun (2013), with the definition about narrative hacker. Our research is centralized on the hacktivists organizations media, such as WikiLeaks and Mídia Ninja, focusing on two specific cases in which the organizations acted as narrative hackers: during the economic crisis in Iceland in 2008 and during the June Journeys of 2013, in Brazil, respectively. We verify that the two cases of hacking preceded and stressed the debate about digital rights and internet access, resulting in digital rights laws in their respective countries.
A máxima que diz ―informação é poder‖ toma uma dimensão maior e mais complexa quando vivenciada na era da propagação do acesso à internet e da revolução da microinformática. Neste sentido, entendemos o hacktivista, como um ator político em razão das possibilidades de ativismo que estão atreladas à sua perícia técnica. Para este estudo, realizamos oito entrevistas, dentre pesquisadores e hacktivistas e como escopo teórico utilizamos A. Samuel (2004), para trazer tipologias de práticas e definições de hacktivismo, M. Castells (2003, 2013), para tratar das pesquisas sobre legislação na internet, M. Machado (2013, 2015) e S. Silveira (2010, 2015), que abordam e pesquisam o hacktivismo no Brasil, e F. Malini e H. Antoun (2013), com sua definição de hacker de narrativas. Nossa pesquisa fica centrada nas organizações midiáticas hacktivistas, tais como WikiLeaks e Mídia Ninja, focando em dois casos específicos nos quais as organizações atuaram como hacker de narrativas: durante a crise econômica da Islândia em 2008 e durante as Jornadas de Junho de 2013, no Brasil, respectivamente. Constatamos que os dois hackeamentos predisseram e tensionaram o debate acerca de direitos digitais e acesso à internet, resultando em legislações sobre direitos digitais nos respectivos países.
Howell, Christian Jordan-Michael. "The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System". Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6259.
Texto completoGuimarães, Nathalia Muylaert Locks. "A tese como obra de arte na era de sua reprodutibilidade tecnica /". Araraquara, 2016. http://hdl.handle.net/11449/146686.
Texto completoBanca: Carlota Josefina M. C. Reis Boto
Banca: Gabriel Henrique Burnatelli de Antônio
Banca: Ana Lúcia de Castro
Banca: Raul Fiker
Resumo: O Objetivo dessa tese foi a de criar um protótipo de tese virtual, que esteja de acordo com as novas formas de produção de conteúdo. A criação desse protótipo, que nada mais é do que a transposição de uma tese escrita para a forma de blog permite que a Universidade se aproprie do espaço Web, uma vez que a Universidade tem perdido o seu papel enquanto instituição de formação. Em uma época de excesso de informação, onde usuários comuns se apropriam da liberdade de criar conteúdo, filtrar informação necessária se torna um problema. Humberto Eco, em um texto sobre o papel das universidades, frente ao fenômeno do mídia mass, diz que é "preciso inventar, e difundir, uma nova arte da depuração", o que esse protótipo se objetiva a ser. É por isso, que chamamos a tese como obra de arte, pois o papel, o texto, a norma precisou ser reinventada para seja possível a apropriação do espaço da world wide web. Em seguida, reforço o argumento da reprodutibilidade técnica, incitando o leitor a conduzir a realizar sua própria mediação de maneira imanente. Desse modo, a paródia do texto de Walter Benjamim A obra de arte na era de sua reprodutibilidade técnica, parodiado como: A tese como obra de arte na era de sua reprodutibilidade técnica; crítica, de forma não discursiva, as normas da abnt, aliando o problema da quantidade no lugar de qualidade a sua forma de exposição e compilação de dados. Nesse sentido, a nota de rodapé, a citação, entre outras normas da abnt são pensadas em uma dimensão vi... (Resumo completo, clicar acesso eletrônico abaixo)
Abstract: The objective of this thesis was to create a virtual prototype thesis, which is in accordance with the new forms of content production. The creation of this prototype, which is nothing more than the implementation of a written thesis in the form of blog, allows the University to appropriate web space, since the University has lost its role as a training institution. In an age of information overload, where ordinary users appropriated the freedom to create content filter through necessary information becomes a problem. Umberto Eco, in a text on the role of universities, compared to the mass media phenomenon, says it is "necessary to invent, and impart a new art clearance", which this prototype is to be objective. That's why we call the thesis as a work of art, for the paper, the text, the standard needed to be reinvented for possible ownership of the world wide web space. Then reinforcing the technical reproducibility of the argument, urging the reader to lead to carry out its own mediation immanent way. Thus, the parody of text Walter Benjamin The Work of Art in the Age of Mechanical Reproduction (1936), parodied as The thesis as a work of art in the age of technical reproducibility; critical, not discursive form, the norms of abnt, combining the problem of quantity instead of quality to their way of exposure and data compilation. In this sense, the footnote, citation, among other standards abnt are thought in a virtual dimension. Number of pages become unnecessary when you can install a tool search. Thus, this study presents the following manner: 1) Thesis Virtual and Critique of abnt: Where has the methodology that was presented by version 1.02 (printed version, and transmedia, moving between the role of information and virtual content via QR-codes). Followed, the presentation of the virtual prototype (version 2.0) finalized on defense on June 9, 2016. And the preparation of the thesi... (Complete abstract click electronic access below)
Doutora
Emerson, William J. III. "Mechanics and The Essence of Technology". Bowling Green State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1395930126.
Texto completoFontoura, Marcelo Crispim da. "Hackers e participação: uma análise de aplicativos de dados públicos do Brasil e seus criadores". Pontifícia Universidade Católica do Rio Grande do Sul, 2014. http://hdl.handle.net/10923/5691.
Texto completoThis work seeks to explore the phenomenon of public data applications in Brazil. Mobile or not, they are digital programs created from public databases of the government. These programs reformat the information so as to make them more comprehensive and publicized to the general public. These applications are created by programmers and people interested in computer science, which are dedicated to explore government data and create visualizations and digital resources with them. The object of study thus lies at the intersection between the idea of government transparency and online participation, especially the work of hackers. We use the reconstructions of Coleman (2012), Levy (2010) and Castells (2003) to explore the work and practices of hackers. This is complemented with reflections from Jenkins (2009) and Shirky (2011) with regard to online participation, and the contributions of Rodriguez (2001), Schaffer (2007), Bowman and Willis (2003) and Bruns (2009) about citizen media. We apply, in addition, the thoughts of Williams (2005) and Castells (2001) on the assimilation of technologies and the relationship between technology and society, as well as the reconstruction of Briggs and Burke (2006) of the historical process of openness and circulation of information. This study, then, embeds a two-dimensional analysis. We analyze 17 applications from open data competitions in Brazil with the aim of contrasting the phenomenon of these programs with the concept of citizen media. We intended to understand how the two areas are related and what can be inferred from this manifestation in relation to other cases of online participation from the audience. This study also seeks to understand the motivations that lead these individuals to become involved in this area, exploring the underlying logic in their participations, and also the comprehension of their contributions. This was accomplished through semi-structured interviews with seven application developers. Moreover, we also created a typology of public data applications, with the goal of mapping this phenomenon. We seek to understand this recent concept, which is important from a social and communicational point of view.
Este trabalho se dedica a explorar o fenômeno dos aplicativos de dados públicos no Brasil. São programas digitais, móveis ou não, criados a partir de bancos de dados governamentais e públicos, que reformatam estas informações de modo a torná-las mais compreensivas e publicizadas para o público em geral. Eles são criados por programadores e interessados em informática, que se dedicam a explorar os dados governamentais e criar visualizações e recursos através deles. O objeto de estudo, assim, se encontra na intersecção entre a ideia de transparência governamental, a participação online e a atuação dos hackers. Utilizam-se as reconstruções de Coleman (2012), Levy (2010) e Castells (2003) para se apreender a atuação dos hackers. Isto é complementado com as reflexões de Jenkins (2009) e Shirky (2011) no que diz respeito à participação online, e com as contribuições de Rodriguez (2001), Schaffer (2007), Bowman e Willis (2003) e Bruns (2009) sobre a mídia cidadã. Se dispõe, além disso, dos pensamentos de Williams (2005) e Castells (2001) sobre a assimilação de tecnologias em meios sociais e a relação entre tecnologia e sociedade, e a reconstrução de Briggs e Burke (2006) sobre o processo histórico de abertura e circulação de informações.O presente estudo, então, parte de uma análise em duas dimensões. Se faz uma apreciação de 17 aplicativos de competições brasileiras de dados abertos, visando analisar o fenômeno destes programas à luz do conceito de mídia cidadã, para compreender como os dois âmbitos se relacionam e o que se pode depreender da manifestação com relação a outros casos de participação online da audiência. Busca-se também entender as motivações que levam estes indivíduos a se envolver com esta área, explorando as lógicas subjacentes a suas participações, além do entendimento sobre suas contribuições. Isto foi cumprido através de entrevista semi-estruturada em profundidade com sete criadores de aplicativos. De forma complementar, criou-se também uma tipologia dos aplicativos de dados públicos, objetivando mapear esta manifestação. Busca-se compreender amplamente este conceito recente, importante do ponto de vista social e comunicacional.
Summers, Timothy Corneal. "HOW HACKERS THINK: A MIXED METHOD STUDY OF MENTAL MODELSAND COGNITIVE PATTERNS OF HIGH-TECH WIZARDS". Case Western Reserve University School of Graduate Studies / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=case1427809862.
Texto completoAlmeida, Fernanda Albuquerque de. "Machinima: entre a narrativa e a experimentação". Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/93/93131/tde-24042015-164451/.
Texto completoSince the first films accomplished in digital games in the 1990s, the concept of machinima has been associated to the conventions of classical cinema. Therewith, it fails to embrace the diversity of audiovisual works produced in real-time interactive virtual environments. Therefore, this study aims to contribute to a deepen comprehension of this concept through an interpretative analysis of its experimental films and also of the specific bibliography. It also intends to collaborate with its expansion as a communication and an artistic expression medium. First, it is aimed to evince the association of the idea of machinima with the classical cinema, through the presentation of the relevant films of its history and also through an interpretative analysis of the first theoretical publications. From this verification, the previous audiovisual practices and experimental movies accomplished in its first years are presented. Then, it is intended to demonstrate that the distance from narrative represented by the experimental works in machinima makes room for the identification of other features that may collaborate to a deepening understanding of its concept. Thus, the following features are presented and analyzed in relation to this idea: the performance, the intervention, and the record. This approximation is followed by the interpretative analysis of the films Formation (Difference and Repetition), by Baden Pailthorpe, 30 Seconds or More One Animation a Day, by Victor Morales, and Abstract Livecoded Machinima (Missile Command), by David Griffiths. By emphasizing the experimental works in machinima, the proposal of this study is to evince that there is a diversity of paths, between the narrative and the experimentation, to go through by the artists with machinima. Thus, its concept must include the plurality of these audiovisual productions.
Bilan, Carolina y Carl Hedberg. "Säkerhetshot och lösningar för privatpersoner med bredband". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1491.
Texto completoZufferey, Eric. "Changer le travail ou changer la société ? : Les hackers entre conformation à l’ordre social et volonté d’innover". Thesis, Lille 1, 2018. http://www.theses.fr/2018LIL1A001/document.
Texto completoThis thesis looks at hacking as source of social change, or even subversion of the social order. Hacking involves self-directed learning and remove social barriers between hobbyists, professionals and activists. Therefore, it raises the hope to renew the access to knowledge and the role of technologies in society. In line with the bourdieusian thought on reproduction of social inequalities, the study analyses how hacking articulate itself with the classical instances of socialization – family, friends, school system, etc. – and how it influences social mobility. By studying Swiss and French hackers, it shows that self-directed learning varies according to social origins and trajectories: it enables upward trajectories when it is combined with the legitimate scientific culture. In this regards, hackers do not escape the weight of social classes’ relations, although they are are willing to transfer their unusual behaviors and thought process across different areas of activities. Workplace is generally their main focus. Along with careerpath, success or failures to innovate in the professionnal sphere are key to understand the hackers’ involvement in leisure activities, associations, or various forms of activism. The participation in the political sphere is limited because hackers usually do not have the proper ressources. By highlighting the complexity of hacking, the thesis proposes a better understanding of its potential societal impacts
Treguer, Félix. "Pouvoir et résistance dans l’espace public : une contre-histoire d’Internet (XVe -XXIe siècle)". Thesis, Paris, EHESS, 2017. http://www.theses.fr/2017EHES0117/document.
Texto completoTaking contemporary debates on freedom of expression and privacy in the digital age as a starting point, this thesis revisits the history of the Internet at the intersection of legal history, political theory and history of science and technology. Through a long-time study of the clash between power and resistance strategies associated with communication technologies, it aims to contribute to the history of the public sphere and of digital activism. From the inception of the printing press on, the first part provides an overview of the forms of control of the public sphere developed under the modern state power, and of their extension under liberal-representative regimes (15th 21st century). In the second part, the study follows the antagonist utopias that shaped the development of computing technologies to explain the pro found ambivalence of their political appropriations, these technologies being construed both as an instrument of technocratic domination and a tool for emancipation (1930-1990). The third part analyses early controversies around the protection of civil rights online and the growth of digital activism, as the Internet becomes a locus of political struggles in a period marked by neoliberal globalization (1990-2001). Finally, the fourth part surveys recent Internet control measures adopted in the name of the "war on terror" and the repression of some segments of digital activism to illustrate the illiberal drift in state practices (2001-2017). The study thus aims to advance a collective thinking on one of the key questions identified by Michel Foucault in his writings on power: "How can the growth of capabilities" – and more specifically those brought about by "techniques of communication" – "be disconnected from the intensification of power relations?"
Villavicencio, Terreros Felipe A. "Cybercrimes". IUS ET VERITAS, 2014. http://repositorio.pucp.edu.pe/index/handle/123456789/123541.
Texto completoEn los últimos tiempos, producto del desarrollo de las tecnologías informáticas se ha ido desarrollando una nueva forma de criminalidad denominada delitos informativos. en relación a esta nueva forma delictiva, se ha emitido una Ley penal especial cuya finalidad es prevenir y sancionar las conductas ilícitas que afectan los sistemas y datos informáticos, así como el secreto de las comunicaciones, y los demás bienes jurídicos que resulten afectados con esta modalidad delictiva, como son el patrimonio, la fe pública y la libertad sexual.
Fontoura, Marcelo Crispim da. "Hackers e participa??o : uma an?lise de aplicativos de dados p?blicos do Brasil e seus criadores". Pontif?cia Universidade Cat?lica do Rio Grande do Sul, 2014. http://tede2.pucrs.br/tede2/handle/tede/4561.
Texto completoThis work seeks to explore the phenomenon of public data applications in Brazil. Mobile or not, they are digital programs created from public databases of the government. These programs reformat the information so as to make them more comprehensive and publicized to the general public. These applications are created by programmers and people interested in computer science, which are dedicated to explore government data and create visualizations and digital resources with them. The object of study thus lies at the intersection between the idea of government transparency and online participation, especially the work of hackers. We use the reconstructions of Coleman (2012), Levy (2010) and Castells (2003) to explore the work and practices of hackers. This is complemented with reflections from Jenkins (2009) and Shirky (2011) with regard to online participation, and the contributions of Rodriguez (2001), Schaffer (2007), Bowman and Willis (2003) and Bruns (2009) about citizen media. We apply, in addition, the thoughts of Williams (2005) and Castells (2001) on the assimilation of technologies and the relationship between technology and society, as well as the reconstruction of Briggs and Burke (2006) of the historical process of openness and circulation of information. This study, then, embeds a two-dimensional analysis. We analyze 17 applications from open data competitions in Brazil with the aim of contrasting the phenomenon of these programs with the concept of citizen media. We intended to understand how the two areas are related and what can be inferred from this manifestation in relation to other cases of online participation from the audience. This study also seeks to understand the motivations that lead these individuals to become involved in this area, exploring the underlying logic in their participations, and also the comprehension of their contributions. This was accomplished through semi-structured interviews with seven application developers. Moreover, we also created a typology of public data applications, with the goal of mapping this phenomenon. We seek to understand this recent concept, which is important from a social and communicational point of view.
Este trabalho se dedica a explorar o fen?meno dos aplicativos de dados p?blicos no Brasil. S?o programas digitais, m?veis ou n?o, criados a partir de bancos de dados governamentais e p?blicos, que reformatam estas informa??es de modo a torn?-las mais compreensivas e publicizadas para o p?blico em geral. Eles s?o criados por programadores e interessados em inform?tica, que se dedicam a explorar os dados governamentais e criar visualiza??es e recursos atrav?s deles. O objeto de estudo, assim, se encontra na intersec??o entre a ideia de transpar?ncia governamental, a participa??o online e a atua??o dos hackers. Utilizam-se as reconstru??es de Coleman (2012), Levy (2010) e Castells (2003) para se apreender a atua??o dos hackers. Isto ? complementado com as reflex?es de Jenkins (2009) e Shirky (2011) no que diz respeito ? participa??o online, e com as contribui??es de Rodriguez (2001), Schaffer (2007), Bowman e Willis (2003) e Bruns (2009) sobre a m?dia cidad?. Se disp?e, al?m disso, dos pensamentos de Williams (2005) e Castells (2001) sobre a assimila??o de tecnologias em meios sociais e a rela??o entre tecnologia e sociedade, e a reconstru??o de Briggs e Burke (2006) sobre o processo hist?rico de abertura e circula??o de informa??es. O presente estudo, ent?o, parte de uma an?lise em duas dimens?es. Se faz uma aprecia??o de 17 aplicativos de competi??es brasileiras de dados abertos, visando analisar o fen?meno destes programas ? luz do conceito de m?dia cidad?, para compreender como os dois ?mbitos se relacionam e o que se pode depreender da manifesta??o com rela??o a outros casos de participa??o online da audi?ncia. Busca-se tamb?m entender as motiva??es que levam estes indiv?duos a se envolver com esta ?rea, explorando as l?gicas subjacentes a suas participa??es, al?m do entendimento sobre suas contribui??es. Isto foi cumprido atrav?s de entrevista semi-estruturada em profundidade com sete criadores de aplicativos. De forma complementar, criou-se tamb?m uma tipologia dos aplicativos de dados p?blicos, objetivando mapear esta manifesta??o. Busca-se compreender amplamente este conceito recente, importante do ponto de vista social e comunicacional.
Bachmann, Michael. "WHAT MAKES THEM CLICK? APPLYING THE RATIONAL CHOICE PERSPECTIVE TO THE HACKING UNDERGROUND". Doctoral diss., University of Central Florida, 2008. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2277.
Texto completoPh.D.
Department of Sociology
Sciences
Sociology PhD
Bach, Sirlei Lourdes. "Contribuição do hacker para o desenvolvimento tecnológico da informática". Florianópolis, SC, 2001. http://repositorio.ufsc.br/xmlui/handle/123456789/82176.
Texto completoMade available in DSpace on 2012-10-19T12:25:48Z (GMT). No. of bitstreams: 0Bitstream added on 2014-09-25T20:01:43Z : No. of bitstreams: 1 184565.pdf: 8279207 bytes, checksum: 24d5f3b085dc3ef82704a988dfaf46c0 (MD5)
Dada a enorme importância política, econômica e social da Internet, urge realizar-se um estudo sobre a evolução das formas de invasão dos chamados piratas eletrônicos. Para tal, buscou-se primeiramente classificá-los de acordo com a terminologia empregada no ambiente virtual, resgatando a origem do termo hacker, o qual tem sofrido mutações devido ao uso equivocado pela mídia. Na seqüência, as falhas que são exploradas pelos piratas eletrônicos são apresentadas, seus modus operandis e as tecnologias de defesa e de prevenção, as quais são divulgadas e passíveis de conhecimento, embora sejam ignoradas ou desconhecidas por muitos administradores e desenvolvedores de sistemas, já que a insegurança nos sistemas é decorrente de falhas amplamente conhecidas com soluções já determinadas. Por fim, buscou-se resgatar a contribuição que tais piratas exercem no desenvolvimento e no aprimoramento tecnológico, evidenciado em suas habilidades, agregadas à dedicação e ao trabalho cooperativo, exigindo assim qualidade nos produtos e serviços oferecidos. Uma maneira de minimizar a insegurança dos sistemas, é manter um conhecimento detalhado e atualizado das tecnologias existentes, característica inerente aos piratas eletrônicos. Assim, reconhecendo suas habilidades e incentivando-os a aprimorarem os sistemas de segurança, os esforços que hoje são despendidos nestes sistemas, poderão ser transferidos para outros desafios.
Levine, John G. (John Glenn). "A Methodology for Detecting and Classifying Rootkit Exploits". Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5139.
Texto completoKelly, Nicholas M. "The freedom of information hacked: console cowboys, computer wizards, and personal freedom in the digital age". Diss., University of Iowa, 2016. https://ir.uiowa.edu/etd/6778.
Texto completoMenezes, Karina Moreira. "Pirâmide da pedagogia hacker =[vivências do (in) possível]". Faculdade de Educação, 2018. http://repositorio.ufba.br/ri/handle/ri/27168.
Texto completoRejected by Ana Miria Moreira (anamiriamoreira@hotmail.com), reason: Prezada Karina,gentileza retificar a ficha catalográfica, que deve ser exclusivamente elaborada pela bibliotecária responsável da Biblioteca Anísio Teixeira da Faculdade de Educação, por favor entrar em contato. (71) 3283-7255/7256; e-mail: biedu@ufba.br on 2018-08-24T17:24:03Z (GMT)
Submitted by Karina Moreira Menezes (kaikamenezes@gmail.com) on 2018-08-30T15:17:21Z No. of bitstreams: 1 Kamenezes_P2H_Entrega_RepositorioUFBA.pdf: 3548555 bytes, checksum: 0ad2a8b4948bd6bee64a5d4f18fe0ebf (MD5)
Approved for entry into archive by Ana Miria Moreira (anamiriamoreira@hotmail.com) on 2018-08-30T17:42:57Z (GMT) No. of bitstreams: 1 Kamenezes_P2H_Entrega_RepositorioUFBA.pdf: 3548555 bytes, checksum: 0ad2a8b4948bd6bee64a5d4f18fe0ebf (MD5)
Made available in DSpace on 2018-08-30T17:42:57Z (GMT). No. of bitstreams: 1 Kamenezes_P2H_Entrega_RepositorioUFBA.pdf: 3548555 bytes, checksum: 0ad2a8b4948bd6bee64a5d4f18fe0ebf (MD5)
Capes
Um espaço hacker (hackerspace) é um local físico no qual convergem pessoas interessadas em tecnologias numa perspectiva hackerista, ou seja, como potencialmente criadoras de novas realidades tendo a abertura e o compartilhamento como princípios. Ao primeiro contato, um hackerspace pode parecer um lugar no qual tudo acontece ao mesmo tempo ou então nada acontece, e apesar da atmosfera informal e caótica, os integrantes afirmam aprender muito nesses espaços, o que nos levou a colocar em foco os processos educativos que neles acontecem. Com o objetivo de analisar o fenômeno educativo em hackerspaces brasileiros para sistematizar elementos da pedagogia desses espaços, empreendeu-se uma investigação cuja a vivência no campo de pesquisa teve seu início antes de uma sistematização teórica mais profunda. Diante disso, assumindo-se a metodologia como criação dialógica com o objeto de estudo, respaldamo-nos na Teoria Fundamentada e na Pesquisa Participante, tendo como foco os processos educativos de hackerspaces brasileiros. Integrantes de vinte e dois espaços hackers contribuíram diretamente para a pesquisa através de 1) entrevistas semi-estruturadas por e-mail e/ou presenciais, 2) conversas informais e 3) um questionário online, fornecendo os construtos indicadores de que o ponto de sustentação da educação em hackerspaces é a necessidade de manutenção de sua própria existência como espaço físico, portanto, a vida NO hackerspace tal como a vida DO hackerspace são a força motriz dos seus processos educativos. Daí, emerge a tese de que a pedagogia hacker em hackerspaces é uma pedagogia de engajamento multifacetado, com quatro faces específicas e inter-relacionais: uma técnica, uma afetiva, uma ideária e uma política. Destaca-se que engajamento é tomado como decisão sobre si e ao mesmo tempo, ação sobre o outro e os quatro tipos de engajamento podem ser representados como faces pirâmide tridimensional, um tetraedro, na qual a pedagogia hacker em hackerspaces se estrutura no exercício de tornar possíveis vivências coerentes dentro de suas próprias contradições.
Abstract A hackerspace is a physical place in which converge people interested in technology in a hackertist perspective, in other words, as potentially creating new realities taking the openness and sharing as principles, upon first contact, a hackerspace can seem like a place where everything happens at the same time or then nothing happens, and despite the informal and chaotic atmosphere, members say learn a lot in these spaces, which led us to put into focus the educational processes that occur therein. With the objective of analyzing the educational phenomenon in Brazilian hackerspaces to systematize elements of pedagogy of these spaces, in addition, assuming the methodology as dialogic creation with the object of study, support methodologically in Grounded Theory and Research Participant, taking as its focus the educational processes of hackerspaces Brazilians. Members of twenty-two hacker spaces have contributed to the research through 1) semi-structured interviews by e-mail and/or courses, 2) informal conversations and 3) a questionnaire online, providing the constructs indicators that the point of sustaining the education in hackerspaces is the need to maintain their own existence as a physical space, therefore, life IN THE hackerspace as the life OF THE hackerspace are the driving force of its educational processes. Therefore, there emerges the thesis that the pedagogy hacker in hackerspaces is a pedagogy of engagement multifaceted, with four faces specific and inter-relational: a technique, an affective, a devise and a policy. It is noteworthy that, engagement is taken as a decision about themselves and at the same time, action about the other and the four faces are types of engagements that form a 3-dimensional pyramid in which the pedagogy hacker in hackerspaces is structured in the exercise of making possible the experiences that are consistent within their own contradictions.
Albuquerque, Mônica Ramalho de. "Existe vida além do código binário? Os hackers e o redimensionamento de princípios modernos em práticas pós-modernas na sociedade informacional". Universidade Federal da Paraíba, 2009. http://tede.biblioteca.ufpb.br:8080/handle/tede/7266.
Texto completoCoordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
After the development of new information and communication technologies in the twentieth century, new social and aesthetic phenomena emerged by the adaptation of cultural, political and economic elements reestablishment. The hacker s and their actions are an unfolding of this scenario and they are part of the computer underground. This study seeks to understand the influence of new information and communication technologies in social relations, the emergence of new subjects and elements of identification that are represented here by the hackers. Thus, it is necessary to make a theoretical discussion about the development of modernity and the post-modernity, considering post-industrial theory and following the relationship of science and technology in this discussion that turned to informational society. This implies to recognize the elements that form the cyberculture and counter activities and ideals of the hackers with aspects that show the instrumentation and information technology as a way to control knowledge and the dynamics of society today. Finally, we hope to identify through interviews that were conducted, the issues that structure the hacker s identity elements, their ideals, ethics and social practices.
A partir do desenvolvimento das novas tecnologias da informação e comunicação no século XX, novos fenômenos sociais e estéticos surgiram na adaptação de elementos culturais, políticos e econômicos a esse redimensionamento. Os hackers e suas práticas são um desdobramento deste cenário e compõe o underground da informática. Este trabalho se propõe a buscar compreender a partir da influência das novas tecnologias da informação e comunicação nas relações sociais, o surgimento de novos sujeitos e elementos de identificação representados aqui pelos hackers. Para tanto, se faz necessário tecer uma discussão teórica acerca do desenvolvimento da modernidade e pós-modernidade, considerando a teoria pós-industrial e a relação da ciência e tecnologia nessa discussão voltada para a sociedade informacional. Isso implica em reconhecer os elementos que compõem a cibercultura e contrapor as atividades e ideais dos hackers com aspectos que demonstram a instrumentalização tecnológica e da informação como forma de controle do conhecimento e da dinâmica da sociedade atual. Por fim, esperamos identificar através das entrevistas feitas, os aspectos que estruturam a os elementos de identificação hacker, seus ideais, ética e práticas sociais.
Gupta, Nirbhay. "Determining the effectiveness of deceptive honeynets". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1303.
Texto completoPaulo, Luis Gonzaga de. "Um modelo complementar para aprimorar a segurança da informação no SDLC para dispositivos móveis: SDD - security driven development". Universidade Tecnológica Federal do Paraná, 2015. http://repositorio.utfpr.edu.br/jspui/handle/1/1895.
Texto completoThe increasingly wide and intense use of mobile devices - whose processing and storage capacity grows almost overcoming the desktops - exposes greatly issues relating to information security in this environment. This is a worrying fact. However, the models currently found in the literature and used by software industry in developing mobile applications with the highest information security requirements are not yet answering users’ needs for more security, and may be improved adding specific methods or techniques, sometimes already used in desktop - or not mobile ones - applications development. This work proposes to insert information security approach early in the software development life cycle using threats and vulnerabilities study, the early application of abuse case - also called misuse cases, the risk analysis, the risk based security test and the use of attack machines in the development process. To reach the research goal, this work analyzed usual models used on SDLC from the information security point of view, and presents a new approach thru the use of a security driven development complementary model. The work also presents some templates and uses a case study for apply the concepts and evaluate the main contributions discussed in the text, also as the preliminary results obtained on the research.
Ogbanufe, Obiageli. "Three Essays on Information Security Risk Management". Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157576/.
Texto completoDiGiusto, Dennis Michael. "A protection motivation theory approach to home wireless network security in New Zealand establishing if groups of concerned wireless network users exist and exploring characteristics of behavioral intention : submitted to the School of Information Management, Victoria University of Wellington in partial fulfilment of the requirements for the degree of Master of Information Management /". ResearchArchive@Victoria e-Thesis, 2008. http://hdl.handle.net/10063/1148.
Texto completoBuys, Stephanus. "Log analysis aided by latent semantic mapping". Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002963.
Texto completoLaTeX with hyperref package
Adobe Acrobat 9.54 Paper Capture Plug-in
Withers, Kim. "A Psychosocial Behavioral Attribution Model: Examining the Relationship Between the “Dark Triad” and Cyber-Criminal Behaviors Impacting Social Networking Sites". Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1072.
Texto completoKrutisch, Dorothee. "Strafbarkeit des unberechtigten Zugangs zu Computerdaten und -systemen /". Frankfurt am Main [u.a.] : Lang, 2004. http://www.gbv.de/dms/spk/sbb/recht/toc/376082763.pdf.
Texto completoGozukeles, Ibrahim Izlem. "Free And Open Source Software In Turkey". Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607173/index.pdf.
Texto completoДумчиков, Михайло Олександрович, Михаил Александрович Думчиков, Mykhailo Oleksandrovych Dumchykov, Олена Сергіївна Бондаренко, Елена Сергеевна Бондаренко y Olena Serhiivna Bondarenko. "Сучасні аспекти кібербезпеки в контексті глобальних загроз". Thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/78666.
Texto completoWidyasari, Nuria. "Les hackers d'Airputih dans la reconstruction de ACEH : Indonésie, Post-Tsunami 2004 : contribution à l'Anthropologie des Sciences et Technologies de l'Information et de la Communication". Electronic Thesis or Diss., Paris 8, 2014. http://www.theses.fr/2014PA080003.
Texto completoThis study focuses on Michel Serres’ theory of “Milieu” as part of his bigger concept of communication systems. The theory considers that the surrounding Noises of a message in the canal of communication are the important elements that will decide whether the message is well understood (or not) by the receiver.This study places the theory in a wider context of communication in Aceh, Indonesia, reflecting the socio-politico-culture elements in the reconstruction of Aceh region after the Tsunami disaster of 2004.Using the approach of the Anthropology of Infocom, this study observes the “Noises” in the communication between the ICT Emergency Response Team “AirPutih” - which this study considers as Hackers - and the local inhabitants of Aceh.The first “Noise” comes from the Sender of the message: AirPutih, with its Hackers’ ideology and its Javanese code of behavior. The term ‘Hacker’ is technically used for a person who writes code and exploits it in issues related to a security system. This study, instead, will use the term ‘hackers’ to describe the mindset of AirPutih, the Indonesian group of young people who arrived in Aceh, Indonesia, only four days after the tsunami devastated the region in 2004, and re-established the ICT connection with almost no money at hand. This mindset of the hackers embraces the Javanese worldviews rooted in the everyday lives of the members of AirPutih, who are mostly of Javanese origin. The second “noise” comes from the Receiver of the message: the Acehnese. The cultural context of the Acehnese had endured two robust events: the civil war that raged between the Acehnese and the Indonesian central government for 30 years and the tsunami that hit Aceh in 2004. The Acehnese are also proud of their long history as a vigorous Islamic state.These “Noises” were in the “milieu” of the communication between AirPutih and the Acehnese. These “Noises” are scrutinized as the negotiation of cultures that is strongly framed by the post-disaster condition of Aceh, Indonesia. Surrounded by the intriguing result of the successful work of AirPutih in reestablishing the ICT infrastructure in Aceh, the values that come out from this discussion are then opposed to the prevailing hegemony of capitalist logic that dominates the world of today
Widyasari, Nuria. "Les hackers d'Airputih dans la reconstruction de ACEH : Indonésie, Post-Tsunami 2004 : contribution à l'Anthropologie des Sciences et Technologies de l'Information et de la Communication". Thesis, Paris 8, 2014. http://www.theses.fr/2014PA080003.
Texto completoThis study focuses on Michel Serres’ theory of “Milieu” as part of his bigger concept of communication systems. The theory considers that the surrounding Noises of a message in the canal of communication are the important elements that will decide whether the message is well understood (or not) by the receiver.This study places the theory in a wider context of communication in Aceh, Indonesia, reflecting the socio-politico-culture elements in the reconstruction of Aceh region after the Tsunami disaster of 2004.Using the approach of the Anthropology of Infocom, this study observes the “Noises” in the communication between the ICT Emergency Response Team “AirPutih” - which this study considers as Hackers - and the local inhabitants of Aceh.The first “Noise” comes from the Sender of the message: AirPutih, with its Hackers’ ideology and its Javanese code of behavior. The term ‘Hacker’ is technically used for a person who writes code and exploits it in issues related to a security system. This study, instead, will use the term ‘hackers’ to describe the mindset of AirPutih, the Indonesian group of young people who arrived in Aceh, Indonesia, only four days after the tsunami devastated the region in 2004, and re-established the ICT connection with almost no money at hand. This mindset of the hackers embraces the Javanese worldviews rooted in the everyday lives of the members of AirPutih, who are mostly of Javanese origin. The second “noise” comes from the Receiver of the message: the Acehnese. The cultural context of the Acehnese had endured two robust events: the civil war that raged between the Acehnese and the Indonesian central government for 30 years and the tsunami that hit Aceh in 2004. The Acehnese are also proud of their long history as a vigorous Islamic state.These “Noises” were in the “milieu” of the communication between AirPutih and the Acehnese. These “Noises” are scrutinized as the negotiation of cultures that is strongly framed by the post-disaster condition of Aceh, Indonesia. Surrounded by the intriguing result of the successful work of AirPutih in reestablishing the ICT infrastructure in Aceh, the values that come out from this discussion are then opposed to the prevailing hegemony of capitalist logic that dominates the world of today
Burtet, Cecilia Gerhardt. "Os saberes desenvolvidos nas práticas em um hackerspace de Porto Alegre". reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2014. http://hdl.handle.net/10183/109016.
Texto completoIn order to understand how the knowledge is developed in the practices of a hackerspace group, this research proceeds from the learning perspective of practices based on the theoretical and methodological approach of the actor-network theory bias to monitor daily activities of a collective in a hackerspace. Without previous definition of the concept of hackerspace, this study objective is to comprehend how the knowledge is developed in a group, in a hackerspace, and how it is accomplished by the relationship between the various heterogeneous network elements. For this, it was necessary, in addition to analyze the current practices in the daily life of the group, identify and describe – considering symmetrically humans and nonhumans – how the learning processes are fomented in these practices and built into knowledge. In order to accredit the research, a study was developed, based on the actor-network theory as the method of the analysis, from December 2013 to September 2014, in a hackerspace located in Porto Alegre, RS. With the purpose to achieve the goals of this research, the key practices and learning processes of the studied organization are described and analyzed, revealing that practice, knowledge and learning are intertwined and coexist in the group. The incompleteness of being and the hybridizations accomplished in the practices are discussed posteriorly and denote the agency of nonhumans, emerged from momentaneous arrangements established among the actants of the network. The study reveals the complexity of knowledge, which is linked to a group of practices, as it is constituted by them and in the same time it constitutes them, being engendered in the heterogeneous relations of the network.
Sanches, Wilken David. "O movimento de software livre e a produção colaborativa do conhecimento". Pontifícia Universidade Católica de São Paulo, 2007. http://tede2.pucsp.br/handle/handle/2676.
Texto completoThis dissertation approaches the construction of a collaborative model of knowledge production disseminated by the Free Software Movement and its opposition to the current law of intelectual property. It describes the genesis of the free software movement as well as how it has become consolidated as an independent domain of knowledge production. In order to better illustrate the model of production proposed by the Free Software Movement and its virtual communities, this paper presents an analysis on the Debian project´s organization and structure for the making of decisions. It explores the limitations of the current model of intelectual property and how it has become a powerful tool for making knowledge a prisoner of private institutions. At last, this dissertation presents how this new model of collaborative production surpasses the software development and begins to influence different areas of knowledge, leaving behing the idea of intelectual property and becoming a concept of intelectual inheritance
A dissertação trata da construção de um modelo colaborativo de produção do conhecimento pelo Movimento de Software Livre e seu embate com a atual legislação de propriedade intelectual. É descrita a gênese do movimento de software livre e como ele vem sendo consolidado como um campo autônomo de produção do conhecimento. Para exemplificar o modelo de produção proposto pelo Movimento de Software Livre e suas comunidades virtuais, é feita uma análise da organização e da estrutura para tomada de decisões do projeto Debian. A dissertação explora as limitações do atual modelo de propriedade intelectual e como este vem se tornando uma poderosa ferramenta para o aprisionamento do conhecimento dentro de instituições privadas. Por fim, é apresentado, de que forma esse novo modelo de produção colaborativa ultrapassa o desenvolvimento de softwares e passa a influenciar outras áreas do conhecimento, abandonando a idéia de propriedade intelectual e aproximandose do conceito de patrimônio intelectual