Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:( Hackers). Showing records 1 – 30 of 68 total matches.

[1] [2] [3]

Search Limiters

Last 2 Years | English Only

Levels

▼ Search Limiters


McMaster University

1. Owen, Kenneth. MOTIVATION AND DEMOTIVATION OF HACKERS IN THE SELECTION OF A HACKING TASK – A CONTEXTUAL APPROACH.

Degree: PhD, 2016, McMaster University

This research explores hacker motivation, demotivation and task selection through the lenses of the Theory of Reasoned Action (TRA) and General Deterrence Theory (GDT). The… (more)

Subjects/Keywords: Hackers; security; Motivation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Owen, K. (2016). MOTIVATION AND DEMOTIVATION OF HACKERS IN THE SELECTION OF A HACKING TASK – A CONTEXTUAL APPROACH. (Doctoral Dissertation). McMaster University. Retrieved from http://hdl.handle.net/11375/19114

Chicago Manual of Style (16th Edition):

Owen, Kenneth. “MOTIVATION AND DEMOTIVATION OF HACKERS IN THE SELECTION OF A HACKING TASK – A CONTEXTUAL APPROACH.” 2016. Doctoral Dissertation, McMaster University. Accessed September 21, 2020. http://hdl.handle.net/11375/19114.

MLA Handbook (7th Edition):

Owen, Kenneth. “MOTIVATION AND DEMOTIVATION OF HACKERS IN THE SELECTION OF A HACKING TASK – A CONTEXTUAL APPROACH.” 2016. Web. 21 Sep 2020.

Vancouver:

Owen K. MOTIVATION AND DEMOTIVATION OF HACKERS IN THE SELECTION OF A HACKING TASK – A CONTEXTUAL APPROACH. [Internet] [Doctoral dissertation]. McMaster University; 2016. [cited 2020 Sep 21]. Available from: http://hdl.handle.net/11375/19114.

Council of Science Editors:

Owen K. MOTIVATION AND DEMOTIVATION OF HACKERS IN THE SELECTION OF A HACKING TASK – A CONTEXTUAL APPROACH. [Doctoral Dissertation]. McMaster University; 2016. Available from: http://hdl.handle.net/11375/19114


Pontifícia Universidade Católica de São Paulo

2. Vera Lúcia Viveiros Sá. Hackers - mocinhos e bandidos: estudo de grupos brasileiros desfiguradores de sites.

Degree: 2005, Pontifícia Universidade Católica de São Paulo

In this work I tracked the history of hackers, the growth and the internal complexity of its culture. At the same time, the study of… (more)

Subjects/Keywords: Hackers; CIENCIAS SOCIAIS APLICADAS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sá, V. L. V. (2005). Hackers - mocinhos e bandidos: estudo de grupos brasileiros desfiguradores de sites. (Thesis). Pontifícia Universidade Católica de São Paulo. Retrieved from http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=7897

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sá, Vera Lúcia Viveiros. “Hackers - mocinhos e bandidos: estudo de grupos brasileiros desfiguradores de sites.” 2005. Thesis, Pontifícia Universidade Católica de São Paulo. Accessed September 21, 2020. http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=7897.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sá, Vera Lúcia Viveiros. “Hackers - mocinhos e bandidos: estudo de grupos brasileiros desfiguradores de sites.” 2005. Web. 21 Sep 2020.

Vancouver:

Sá VLV. Hackers - mocinhos e bandidos: estudo de grupos brasileiros desfiguradores de sites. [Internet] [Thesis]. Pontifícia Universidade Católica de São Paulo; 2005. [cited 2020 Sep 21]. Available from: http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=7897.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sá VLV. Hackers - mocinhos e bandidos: estudo de grupos brasileiros desfiguradores de sites. [Thesis]. Pontifícia Universidade Católica de São Paulo; 2005. Available from: http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=7897

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Stockholm University

3. Åkerman, Emelie. Anonymous ansikten : En undersökningar av några svenska dagstidningars konstruktioner av hackernätverket Anonymous.

Degree: Media Studies, 2012, Stockholm University

  This study examines how a couple of Swedish daily newspapers construct the hacker network Anonymous, with an aim to discuss its possible effects. The… (more)

Subjects/Keywords: Hackers; Anonymous; DDoS; Civil olydnad

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Åkerman, E. (2012). Anonymous ansikten : En undersökningar av några svenska dagstidningars konstruktioner av hackernätverket Anonymous. (Thesis). Stockholm University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-97113

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Åkerman, Emelie. “Anonymous ansikten : En undersökningar av några svenska dagstidningars konstruktioner av hackernätverket Anonymous.” 2012. Thesis, Stockholm University. Accessed September 21, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-97113.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Åkerman, Emelie. “Anonymous ansikten : En undersökningar av några svenska dagstidningars konstruktioner av hackernätverket Anonymous.” 2012. Web. 21 Sep 2020.

Vancouver:

Åkerman E. Anonymous ansikten : En undersökningar av några svenska dagstidningars konstruktioner av hackernätverket Anonymous. [Internet] [Thesis]. Stockholm University; 2012. [cited 2020 Sep 21]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-97113.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Åkerman E. Anonymous ansikten : En undersökningar av några svenska dagstidningars konstruktioner av hackernätverket Anonymous. [Thesis]. Stockholm University; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-97113

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Bowling Green State University

4. Emerson, William J. , III. Mechanics and The Essence of Technology.

Degree: PhD, American Culture Studies, 2014, Bowling Green State University

 The mechanic is a worker of contested meaning in American popular culture. The cultural significance of mechanics reflects technological trends throughout American industrial history. Mechanics… (more)

Subjects/Keywords: American Studies; Mechanics; Technology; Luddites; Hackers; Survivalism

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Emerson, William J. , I. (2014). Mechanics and The Essence of Technology. (Doctoral Dissertation). Bowling Green State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1395930126

Chicago Manual of Style (16th Edition):

Emerson, William J. , III. “Mechanics and The Essence of Technology.” 2014. Doctoral Dissertation, Bowling Green State University. Accessed September 21, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1395930126.

MLA Handbook (7th Edition):

Emerson, William J. , III. “Mechanics and The Essence of Technology.” 2014. Web. 21 Sep 2020.

Vancouver:

Emerson, William J. I. Mechanics and The Essence of Technology. [Internet] [Doctoral dissertation]. Bowling Green State University; 2014. [cited 2020 Sep 21]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1395930126.

Council of Science Editors:

Emerson, William J. I. Mechanics and The Essence of Technology. [Doctoral Dissertation]. Bowling Green State University; 2014. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1395930126


Michigan State University

5. Loper, D., Kall. The criminology of computer hackers : a qualitative and quantitative analysis.

Degree: PhD, College of Social Science, 2000, Michigan State University

Subjects/Keywords: Hackers; Computer crimes

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Loper, D., K. (2000). The criminology of computer hackers : a qualitative and quantitative analysis. (Doctoral Dissertation). Michigan State University. Retrieved from http://etd.lib.msu.edu/islandora/object/etd:28359

Chicago Manual of Style (16th Edition):

Loper, D., Kall. “The criminology of computer hackers : a qualitative and quantitative analysis.” 2000. Doctoral Dissertation, Michigan State University. Accessed September 21, 2020. http://etd.lib.msu.edu/islandora/object/etd:28359.

MLA Handbook (7th Edition):

Loper, D., Kall. “The criminology of computer hackers : a qualitative and quantitative analysis.” 2000. Web. 21 Sep 2020.

Vancouver:

Loper, D. K. The criminology of computer hackers : a qualitative and quantitative analysis. [Internet] [Doctoral dissertation]. Michigan State University; 2000. [cited 2020 Sep 21]. Available from: http://etd.lib.msu.edu/islandora/object/etd:28359.

Council of Science Editors:

Loper, D. K. The criminology of computer hackers : a qualitative and quantitative analysis. [Doctoral Dissertation]. Michigan State University; 2000. Available from: http://etd.lib.msu.edu/islandora/object/etd:28359

6. Almeida, Fernanda Albuquerque de. Machinima: entre a narrativa e a experimentação.

Degree: Mestrado, Estética e História da Arte, 2014, University of São Paulo

Desde os primeiros filmes realizados em jogos digitais nos anos 1990, a noção de machinima vem sendo associada às convenções do cinema clássico. Com isso,… (more)

Subjects/Keywords: Arte contemporânea; Arte digital; Cinema experimental; Computer games; Contemporary art; Digital art; Experimental cinema; Hackers; Hackers; Jogos de computador; Machinima; Machinima

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Almeida, F. A. d. (2014). Machinima: entre a narrativa e a experimentação. (Masters Thesis). University of São Paulo. Retrieved from http://www.teses.usp.br/teses/disponiveis/93/93131/tde-24042015-164451/ ;

Chicago Manual of Style (16th Edition):

Almeida, Fernanda Albuquerque de. “Machinima: entre a narrativa e a experimentação.” 2014. Masters Thesis, University of São Paulo. Accessed September 21, 2020. http://www.teses.usp.br/teses/disponiveis/93/93131/tde-24042015-164451/ ;.

MLA Handbook (7th Edition):

Almeida, Fernanda Albuquerque de. “Machinima: entre a narrativa e a experimentação.” 2014. Web. 21 Sep 2020.

Vancouver:

Almeida FAd. Machinima: entre a narrativa e a experimentação. [Internet] [Masters thesis]. University of São Paulo; 2014. [cited 2020 Sep 21]. Available from: http://www.teses.usp.br/teses/disponiveis/93/93131/tde-24042015-164451/ ;.

Council of Science Editors:

Almeida FAd. Machinima: entre a narrativa e a experimentação. [Masters Thesis]. University of São Paulo; 2014. Available from: http://www.teses.usp.br/teses/disponiveis/93/93131/tde-24042015-164451/ ;

7. Treguer, Félix. Pouvoir et résistance dans l’espace public : une contre-histoire d’Internet (XVe -XXIe siècle) : Power and Resistance in the Public Sphere : a Counter-History of the Internet (15th-21st century).

Degree: Docteur es, Etudes politiques, 2017, Paris, EHESS

Prenant pour point de départ les controverses contemporaines sur la liberté d’expression et la vie privée à l’ère numérique, cette thèse propose de revisiter l’histoire… (more)

Subjects/Keywords: Activisme numérique; Censure; Hackers; Internet; Liberté d’expression; Surveillance; Technocritique; Digital Activism; Censorship; Hackers; Internet; Freedom of expression; Surveillance; Technocriticism

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Treguer, F. (2017). Pouvoir et résistance dans l’espace public : une contre-histoire d’Internet (XVe -XXIe siècle) : Power and Resistance in the Public Sphere : a Counter-History of the Internet (15th-21st century). (Doctoral Dissertation). Paris, EHESS. Retrieved from http://www.theses.fr/2017EHES0117

Chicago Manual of Style (16th Edition):

Treguer, Félix. “Pouvoir et résistance dans l’espace public : une contre-histoire d’Internet (XVe -XXIe siècle) : Power and Resistance in the Public Sphere : a Counter-History of the Internet (15th-21st century).” 2017. Doctoral Dissertation, Paris, EHESS. Accessed September 21, 2020. http://www.theses.fr/2017EHES0117.

MLA Handbook (7th Edition):

Treguer, Félix. “Pouvoir et résistance dans l’espace public : une contre-histoire d’Internet (XVe -XXIe siècle) : Power and Resistance in the Public Sphere : a Counter-History of the Internet (15th-21st century).” 2017. Web. 21 Sep 2020.

Vancouver:

Treguer F. Pouvoir et résistance dans l’espace public : une contre-histoire d’Internet (XVe -XXIe siècle) : Power and Resistance in the Public Sphere : a Counter-History of the Internet (15th-21st century). [Internet] [Doctoral dissertation]. Paris, EHESS; 2017. [cited 2020 Sep 21]. Available from: http://www.theses.fr/2017EHES0117.

Council of Science Editors:

Treguer F. Pouvoir et résistance dans l’espace public : une contre-histoire d’Internet (XVe -XXIe siècle) : Power and Resistance in the Public Sphere : a Counter-History of the Internet (15th-21st century). [Doctoral Dissertation]. Paris, EHESS; 2017. Available from: http://www.theses.fr/2017EHES0117


University of South Florida

8. Howell, Christian Jordan-Michael. The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System.

Degree: 2016, University of South Florida

 System trespassing, which refers to the unauthorized access of computer systems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system… (more)

Subjects/Keywords: Cybercrime; Particularistic restrictive deterrence; Hacking; Hackers; Cybercrime; Particularistic restrictive deterrence; Hacking; Hackers; System trespassers; Criminology and Criminal Justice

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Howell, C. J. (2016). The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System. (Thesis). University of South Florida. Retrieved from https://scholarcommons.usf.edu/etd/6259

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Howell, Christian Jordan-Michael. “The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System.” 2016. Thesis, University of South Florida. Accessed September 21, 2020. https://scholarcommons.usf.edu/etd/6259.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Howell, Christian Jordan-Michael. “The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System.” 2016. Web. 21 Sep 2020.

Vancouver:

Howell CJ. The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System. [Internet] [Thesis]. University of South Florida; 2016. [cited 2020 Sep 21]. Available from: https://scholarcommons.usf.edu/etd/6259.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Howell CJ. The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System. [Thesis]. University of South Florida; 2016. Available from: https://scholarcommons.usf.edu/etd/6259

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

9. Santos, Ana Felícia Canilho. O cibercrime: desafios e respostas do direito.

Degree: 2016, RCAAP

 O Cibercrime não pode ser considerado um “novo” tipo de crime que é capaz de transpor várias jurisdições e leis, já que existem outros exemplos… (more)

Subjects/Keywords: Cibercrime; Convenção Cibercrime; criminalidade informática; cooperação internacional; Hackers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Santos, A. F. C. (2016). O cibercrime: desafios e respostas do direito. (Thesis). RCAAP. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ual.pt:11144/2640

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Santos, Ana Felícia Canilho. “O cibercrime: desafios e respostas do direito.” 2016. Thesis, RCAAP. Accessed September 21, 2020. http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ual.pt:11144/2640.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Santos, Ana Felícia Canilho. “O cibercrime: desafios e respostas do direito.” 2016. Web. 21 Sep 2020.

Vancouver:

Santos AFC. O cibercrime: desafios e respostas do direito. [Internet] [Thesis]. RCAAP; 2016. [cited 2020 Sep 21]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ual.pt:11144/2640.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Santos AFC. O cibercrime: desafios e respostas do direito. [Thesis]. RCAAP; 2016. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ual.pt:11144/2640

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Ramos, José João Afonso. Sistema automático para realização de testes de penetração.

Degree: 2013, Instituto Politécnico de Beja

Dissertaação de mestrado em Engenharia de Segurança Informática. Instituto Politécnico de Beja. Escola Superior de Tecnologia e Gestão, 2013.

As Tecnologias de Informação são um… (more)

Subjects/Keywords: Hackers; Vulnerabilidade; Segurança informática; Testes de penetração; Ética; Legislação

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ramos, J. J. A. (2013). Sistema automático para realização de testes de penetração. (Thesis). Instituto Politécnico de Beja. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio:123456789/720

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ramos, José João Afonso. “Sistema automático para realização de testes de penetração.” 2013. Thesis, Instituto Politécnico de Beja. Accessed September 21, 2020. http://www.rcaap.pt/detail.jsp?id=oai:repositorio:123456789/720.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ramos, José João Afonso. “Sistema automático para realização de testes de penetração.” 2013. Web. 21 Sep 2020.

Vancouver:

Ramos JJA. Sistema automático para realização de testes de penetração. [Internet] [Thesis]. Instituto Politécnico de Beja; 2013. [cited 2020 Sep 21]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio:123456789/720.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ramos JJA. Sistema automático para realização de testes de penetração. [Thesis]. Instituto Politécnico de Beja; 2013. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio:123456789/720

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Wayne State University

11. Sarat-st peter, Hilary Anne. Wired & dangerous: hacks, hair extensions and other twists on traditional technical communication.

Degree: PhD, English, 2012, Wayne State University

  Ever since its inception as a "humanistic" research discipline (Miller, 1979; Dombrowski, 1994), technical communication has striven to balance workplace exigencies with attention to… (more)

Subjects/Keywords: Extra-Institutional, Hackers, Professional Communication, Rhetoric, Technical Communication; Arts and Humanities

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sarat-st peter, H. A. (2012). Wired & dangerous: hacks, hair extensions and other twists on traditional technical communication. (Doctoral Dissertation). Wayne State University. Retrieved from https://digitalcommons.wayne.edu/oa_dissertations/556

Chicago Manual of Style (16th Edition):

Sarat-st peter, Hilary Anne. “Wired & dangerous: hacks, hair extensions and other twists on traditional technical communication.” 2012. Doctoral Dissertation, Wayne State University. Accessed September 21, 2020. https://digitalcommons.wayne.edu/oa_dissertations/556.

MLA Handbook (7th Edition):

Sarat-st peter, Hilary Anne. “Wired & dangerous: hacks, hair extensions and other twists on traditional technical communication.” 2012. Web. 21 Sep 2020.

Vancouver:

Sarat-st peter HA. Wired & dangerous: hacks, hair extensions and other twists on traditional technical communication. [Internet] [Doctoral dissertation]. Wayne State University; 2012. [cited 2020 Sep 21]. Available from: https://digitalcommons.wayne.edu/oa_dissertations/556.

Council of Science Editors:

Sarat-st peter HA. Wired & dangerous: hacks, hair extensions and other twists on traditional technical communication. [Doctoral Dissertation]. Wayne State University; 2012. Available from: https://digitalcommons.wayne.edu/oa_dissertations/556

12. Humbert, Jean-Philippe. Les mondes de la cyberdélinquance et images sociales du pirate informatique : The cyberdelinquency's worlds and the social images of the computer pirate.

Degree: Docteur es, Sciences de l'information et de la communication, 2007, Metz

La cyberdélinquance constitue un phénomène indissociable du monde numérique, depuis les premiers hackers recherchant la compréhension des mécanismes innovants de communication, jusqu'aux pirates informatiques majoritairement… (more)

Subjects/Keywords: Cyberdélinquance; Représentation sociale; Hackers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Humbert, J. (2007). Les mondes de la cyberdélinquance et images sociales du pirate informatique : The cyberdelinquency's worlds and the social images of the computer pirate. (Doctoral Dissertation). Metz. Retrieved from http://www.theses.fr/2007METZ003L

Chicago Manual of Style (16th Edition):

Humbert, Jean-Philippe. “Les mondes de la cyberdélinquance et images sociales du pirate informatique : The cyberdelinquency's worlds and the social images of the computer pirate.” 2007. Doctoral Dissertation, Metz. Accessed September 21, 2020. http://www.theses.fr/2007METZ003L.

MLA Handbook (7th Edition):

Humbert, Jean-Philippe. “Les mondes de la cyberdélinquance et images sociales du pirate informatique : The cyberdelinquency's worlds and the social images of the computer pirate.” 2007. Web. 21 Sep 2020.

Vancouver:

Humbert J. Les mondes de la cyberdélinquance et images sociales du pirate informatique : The cyberdelinquency's worlds and the social images of the computer pirate. [Internet] [Doctoral dissertation]. Metz; 2007. [cited 2020 Sep 21]. Available from: http://www.theses.fr/2007METZ003L.

Council of Science Editors:

Humbert J. Les mondes de la cyberdélinquance et images sociales du pirate informatique : The cyberdelinquency's worlds and the social images of the computer pirate. [Doctoral Dissertation]. Metz; 2007. Available from: http://www.theses.fr/2007METZ003L


California State University – San Bernardino

13. Chavez, Nicholas Marshall. CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?.

Degree: MAin Criminal Justice, Criminal Justice, 2018, California State University – San Bernardino

  This project examines the protection methods suggested by hackers to guard against online victimization through the lens of Situation Crime Prevention. Data were collected… (more)

Subjects/Keywords: Situational Crime Prevention; Hackers; Cyber-theft; Criminology and Criminal Justice

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chavez, N. M. (2018). CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?. (Thesis). California State University – San Bernardino. Retrieved from https://scholarworks.lib.csusb.edu/etd/690

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chavez, Nicholas Marshall. “CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?.” 2018. Thesis, California State University – San Bernardino. Accessed September 21, 2020. https://scholarworks.lib.csusb.edu/etd/690.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chavez, Nicholas Marshall. “CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?.” 2018. Web. 21 Sep 2020.

Vancouver:

Chavez NM. CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?. [Internet] [Thesis]. California State University – San Bernardino; 2018. [cited 2020 Sep 21]. Available from: https://scholarworks.lib.csusb.edu/etd/690.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chavez NM. CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?. [Thesis]. California State University – San Bernardino; 2018. Available from: https://scholarworks.lib.csusb.edu/etd/690

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidad de Chile

14. Barudy G., Claudia. Hackers: la identidad de un pirata postmoderno.

Degree: 1999, Universidad de Chile

 Nuestra época se ha visto marcada por un ascendente proceso de globalización en el área de las comunicaciones. La rápida ampliación de las posibilidades de… (more)

Subjects/Keywords: Hackers; Redes de computadores

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Barudy G., C. (1999). Hackers: la identidad de un pirata postmoderno. (Thesis). Universidad de Chile. Retrieved from http://repositorio.uchile.cl/handle/2250/136343

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Barudy G., Claudia. “Hackers: la identidad de un pirata postmoderno.” 1999. Thesis, Universidad de Chile. Accessed September 21, 2020. http://repositorio.uchile.cl/handle/2250/136343.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Barudy G., Claudia. “Hackers: la identidad de un pirata postmoderno.” 1999. Web. 21 Sep 2020.

Vancouver:

Barudy G. C. Hackers: la identidad de un pirata postmoderno. [Internet] [Thesis]. Universidad de Chile; 1999. [cited 2020 Sep 21]. Available from: http://repositorio.uchile.cl/handle/2250/136343.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Barudy G. C. Hackers: la identidad de un pirata postmoderno. [Thesis]. Universidad de Chile; 1999. Available from: http://repositorio.uchile.cl/handle/2250/136343

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Texas State University – San Marcos

15. Jennings, Kevin W. Who are Computer Criminals?.

Degree: PhD, Criminal Justice, 2014, Texas State University – San Marcos

 Computer criminals are compared to non-computer criminals in a 2004 sample of state and Federal prison inmates. Offenders are compared on their age, race, gender,… (more)

Subjects/Keywords: Computer crime; Hackers; Computer crimes; Criminal behavior, Prediction of

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jennings, K. W. (2014). Who are Computer Criminals?. (Doctoral Dissertation). Texas State University – San Marcos. Retrieved from https://digital.library.txstate.edu/handle/10877/5258

Chicago Manual of Style (16th Edition):

Jennings, Kevin W. “Who are Computer Criminals?.” 2014. Doctoral Dissertation, Texas State University – San Marcos. Accessed September 21, 2020. https://digital.library.txstate.edu/handle/10877/5258.

MLA Handbook (7th Edition):

Jennings, Kevin W. “Who are Computer Criminals?.” 2014. Web. 21 Sep 2020.

Vancouver:

Jennings KW. Who are Computer Criminals?. [Internet] [Doctoral dissertation]. Texas State University – San Marcos; 2014. [cited 2020 Sep 21]. Available from: https://digital.library.txstate.edu/handle/10877/5258.

Council of Science Editors:

Jennings KW. Who are Computer Criminals?. [Doctoral Dissertation]. Texas State University – San Marcos; 2014. Available from: https://digital.library.txstate.edu/handle/10877/5258

16. Dalwadi, Chintan. Network and data security.

Degree: MS, 2006, University of Alabama – Birmingham

With a growing number of users getting connected to the Internet and given their growing reliance on computers, it has become increasingly important to protect… (more)

Subjects/Keywords: Computer networks  – Security measures <; br>; Cyberterrorism <; br>; Computer hackers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dalwadi, C. (2006). Network and data security. (Masters Thesis). University of Alabama – Birmingham. Retrieved from http://contentdm.mhsl.uab.edu/u?/etd,24

Chicago Manual of Style (16th Edition):

Dalwadi, Chintan. “Network and data security.” 2006. Masters Thesis, University of Alabama – Birmingham. Accessed September 21, 2020. http://contentdm.mhsl.uab.edu/u?/etd,24.

MLA Handbook (7th Edition):

Dalwadi, Chintan. “Network and data security.” 2006. Web. 21 Sep 2020.

Vancouver:

Dalwadi C. Network and data security. [Internet] [Masters thesis]. University of Alabama – Birmingham; 2006. [cited 2020 Sep 21]. Available from: http://contentdm.mhsl.uab.edu/u?/etd,24.

Council of Science Editors:

Dalwadi C. Network and data security. [Masters Thesis]. University of Alabama – Birmingham; 2006. Available from: http://contentdm.mhsl.uab.edu/u?/etd,24


University of Georgia

17. Woo, Hyung-Jin. The hacker mentality : exploring the relationship between psychological variables and hacking activities.

Degree: 2014, University of Georgia

 This study investigated hackers’ psychological variables and how these variables affect their hacking activities in cyberspace. 1,385 hackers from 30 different countries participated in an… (more)

Subjects/Keywords: Hackers; Cyberterrorism; Narcissism; Flow; Terror Management; Theory; Intrinsic and Extrinsic motivation; Aggressiveness

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Woo, H. (2014). The hacker mentality : exploring the relationship between psychological variables and hacking activities. (Thesis). University of Georgia. Retrieved from http://hdl.handle.net/10724/20955

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Woo, Hyung-Jin. “The hacker mentality : exploring the relationship between psychological variables and hacking activities.” 2014. Thesis, University of Georgia. Accessed September 21, 2020. http://hdl.handle.net/10724/20955.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Woo, Hyung-Jin. “The hacker mentality : exploring the relationship between psychological variables and hacking activities.” 2014. Web. 21 Sep 2020.

Vancouver:

Woo H. The hacker mentality : exploring the relationship between psychological variables and hacking activities. [Internet] [Thesis]. University of Georgia; 2014. [cited 2020 Sep 21]. Available from: http://hdl.handle.net/10724/20955.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Woo H. The hacker mentality : exploring the relationship between psychological variables and hacking activities. [Thesis]. University of Georgia; 2014. Available from: http://hdl.handle.net/10724/20955

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

18. Roos, Christiaan J. Governance responses to hacking in the banking sector of South Africa : an exploratory study.

Degree: 2013, University of Johannesburg

D.Comm. (Auditing)

Organisations today are critically dependent on IT to enable business operations and ensure competitiveness in a growing international marketplace. At the same time,… (more)

Subjects/Keywords: Computer security - Auditing; Computer hackers; Banks and banking - Security measures - South Africa; Risk management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Roos, C. J. (2013). Governance responses to hacking in the banking sector of South Africa : an exploratory study. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/8642

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Roos, Christiaan J. “Governance responses to hacking in the banking sector of South Africa : an exploratory study.” 2013. Thesis, University of Johannesburg. Accessed September 21, 2020. http://hdl.handle.net/10210/8642.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Roos, Christiaan J. “Governance responses to hacking in the banking sector of South Africa : an exploratory study.” 2013. Web. 21 Sep 2020.

Vancouver:

Roos CJ. Governance responses to hacking in the banking sector of South Africa : an exploratory study. [Internet] [Thesis]. University of Johannesburg; 2013. [cited 2020 Sep 21]. Available from: http://hdl.handle.net/10210/8642.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Roos CJ. Governance responses to hacking in the banking sector of South Africa : an exploratory study. [Thesis]. University of Johannesburg; 2013. Available from: http://hdl.handle.net/10210/8642

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rhodes University

19. Buys, Stephanus. Log analysis aided by latent semantic mapping.

Degree: Faculty of Science, Computer Science, 2013, Rhodes University

In an age of zero-day exploits and increased on-line attacks on computing infrastructure, operational security practitioners are becoming increasingly aware of the value of the… (more)

Subjects/Keywords: Latent semantic indexing; Data mining; Computer networks  – Security measures; Computer hackers; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Buys, S. (2013). Log analysis aided by latent semantic mapping. (Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/d1002963

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Buys, Stephanus. “Log analysis aided by latent semantic mapping.” 2013. Thesis, Rhodes University. Accessed September 21, 2020. http://hdl.handle.net/10962/d1002963.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Buys, Stephanus. “Log analysis aided by latent semantic mapping.” 2013. Web. 21 Sep 2020.

Vancouver:

Buys S. Log analysis aided by latent semantic mapping. [Internet] [Thesis]. Rhodes University; 2013. [cited 2020 Sep 21]. Available from: http://hdl.handle.net/10962/d1002963.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Buys S. Log analysis aided by latent semantic mapping. [Thesis]. Rhodes University; 2013. Available from: http://hdl.handle.net/10962/d1002963

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

20. Palma, Daniel Ângelo. Desenvolvimento de cenários de internetworking virtualizados para ensino de segurança em redes de comunicação.

Degree: 2017, RCAAP

 Este documento relata o desenvolvimento de cenários de ensino virtualizados no âmbito da segurança em redes de comunicação. Cenários esses que funcionam em ambiente virtualizado… (more)

Subjects/Keywords: Ethical hacking; Cenários de ensino; Hackers; Vulnerabilidades conhecidas; Exploits; Máquinas virtuais; Redes de comunicação

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Palma, D. . (2017). Desenvolvimento de cenários de internetworking virtualizados para ensino de segurança em redes de comunicação. (Thesis). RCAAP. Retrieved from https://www.rcaap.pt/detail.jsp?id=oai:repositorio.ipbeja.pt:20.500.12207/4711

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Palma, Daniel Ângelo. “Desenvolvimento de cenários de internetworking virtualizados para ensino de segurança em redes de comunicação.” 2017. Thesis, RCAAP. Accessed September 21, 2020. https://www.rcaap.pt/detail.jsp?id=oai:repositorio.ipbeja.pt:20.500.12207/4711.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Palma, Daniel Ângelo. “Desenvolvimento de cenários de internetworking virtualizados para ensino de segurança em redes de comunicação.” 2017. Web. 21 Sep 2020.

Vancouver:

Palma D. Desenvolvimento de cenários de internetworking virtualizados para ensino de segurança em redes de comunicação. [Internet] [Thesis]. RCAAP; 2017. [cited 2020 Sep 21]. Available from: https://www.rcaap.pt/detail.jsp?id=oai:repositorio.ipbeja.pt:20.500.12207/4711.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Palma D. Desenvolvimento de cenários de internetworking virtualizados para ensino de segurança em redes de comunicação. [Thesis]. RCAAP; 2017. Available from: https://www.rcaap.pt/detail.jsp?id=oai:repositorio.ipbeja.pt:20.500.12207/4711

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade do Rio Grande do Sul

21. Burtet, Cecilia Gerhardt. Os saberes desenvolvidos nas práticas em um hackerspace de Porto Alegre.

Degree: 2014, Universidade do Rio Grande do Sul

Na tentativa de compreender como os saberes são desenvolvidos nas práticas de um grupo em um hackerspace, este estudo parte da perspectiva da aprendizagem baseada… (more)

Subjects/Keywords: Aprendizado baseado na experiência; Practices based learning perspective; Hackers; Actor-network theory; Saber-Fazer; Hackerspace

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Burtet, C. G. (2014). Os saberes desenvolvidos nas práticas em um hackerspace de Porto Alegre. (Thesis). Universidade do Rio Grande do Sul. Retrieved from http://hdl.handle.net/10183/109016

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Burtet, Cecilia Gerhardt. “Os saberes desenvolvidos nas práticas em um hackerspace de Porto Alegre.” 2014. Thesis, Universidade do Rio Grande do Sul. Accessed September 21, 2020. http://hdl.handle.net/10183/109016.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Burtet, Cecilia Gerhardt. “Os saberes desenvolvidos nas práticas em um hackerspace de Porto Alegre.” 2014. Web. 21 Sep 2020.

Vancouver:

Burtet CG. Os saberes desenvolvidos nas práticas em um hackerspace de Porto Alegre. [Internet] [Thesis]. Universidade do Rio Grande do Sul; 2014. [cited 2020 Sep 21]. Available from: http://hdl.handle.net/10183/109016.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Burtet CG. Os saberes desenvolvidos nas práticas em um hackerspace de Porto Alegre. [Thesis]. Universidade do Rio Grande do Sul; 2014. Available from: http://hdl.handle.net/10183/109016

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Kansas

22. Garcia, Hernan Manuel. La globalización desfigurada o la postglobalización imaginada: La estética cyberpunk (post)mexicana.

Degree: PhD, Spanish & Portuguese, 2011, University of Kansas

 In my dissertation I propose an analysis of technology from a literary and cultural studies perspective. This allows me to establish a theoretical framework through… (more)

Subjects/Keywords: Latin American literature; Latin American studies; Cyberpunk; Hackers; Mexican literature; Mexico; Science fiction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Garcia, H. M. (2011). La globalización desfigurada o la postglobalización imaginada: La estética cyberpunk (post)mexicana. (Doctoral Dissertation). University of Kansas. Retrieved from http://hdl.handle.net/1808/8073

Chicago Manual of Style (16th Edition):

Garcia, Hernan Manuel. “La globalización desfigurada o la postglobalización imaginada: La estética cyberpunk (post)mexicana.” 2011. Doctoral Dissertation, University of Kansas. Accessed September 21, 2020. http://hdl.handle.net/1808/8073.

MLA Handbook (7th Edition):

Garcia, Hernan Manuel. “La globalización desfigurada o la postglobalización imaginada: La estética cyberpunk (post)mexicana.” 2011. Web. 21 Sep 2020.

Vancouver:

Garcia HM. La globalización desfigurada o la postglobalización imaginada: La estética cyberpunk (post)mexicana. [Internet] [Doctoral dissertation]. University of Kansas; 2011. [cited 2020 Sep 21]. Available from: http://hdl.handle.net/1808/8073.

Council of Science Editors:

Garcia HM. La globalización desfigurada o la postglobalización imaginada: La estética cyberpunk (post)mexicana. [Doctoral Dissertation]. University of Kansas; 2011. Available from: http://hdl.handle.net/1808/8073


University of Gothenburg / Göteborgs Universitet

23. Söderberg, Johan. Free software to open hardware: Critical theory on the frontiers of hacking.

Degree: 2011, University of Gothenburg / Göteborgs Universitet

 Starting from the experiences of hackers developing free software and open hardware, this thesis addresses some key and recurrent themes in the field of Science… (more)

Subjects/Keywords: hackers; constructivism; innovation; free software; critical theory; immanent critique; technology; lay expertise; open hardware

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Söderberg, J. (2011). Free software to open hardware: Critical theory on the frontiers of hacking. (Thesis). University of Gothenburg / Göteborgs Universitet. Retrieved from http://hdl.handle.net/2077/24450

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Söderberg, Johan. “Free software to open hardware: Critical theory on the frontiers of hacking.” 2011. Thesis, University of Gothenburg / Göteborgs Universitet. Accessed September 21, 2020. http://hdl.handle.net/2077/24450.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Söderberg, Johan. “Free software to open hardware: Critical theory on the frontiers of hacking.” 2011. Web. 21 Sep 2020.

Vancouver:

Söderberg J. Free software to open hardware: Critical theory on the frontiers of hacking. [Internet] [Thesis]. University of Gothenburg / Göteborgs Universitet; 2011. [cited 2020 Sep 21]. Available from: http://hdl.handle.net/2077/24450.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Söderberg J. Free software to open hardware: Critical theory on the frontiers of hacking. [Thesis]. University of Gothenburg / Göteborgs Universitet; 2011. Available from: http://hdl.handle.net/2077/24450

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

24. Sanchez, G.A. (author). We Are Biohackers: Exploring the Collective Identity of the DIYbio Movement.

Degree: 2014, Delft University of Technology

Social movements are important sociological phenomena because they are the key agents that provide societies with new ideas and ideals to change people's behavior or… (more)

Subjects/Keywords: social movement; collective identity; DIYbio; biohackers; hackers; commons-based peer-production; open-source

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sanchez, G. A. (. (2014). We Are Biohackers: Exploring the Collective Identity of the DIYbio Movement. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:2996be4c-8614-4014-8d3a-6b8ff63c8ee6

Chicago Manual of Style (16th Edition):

Sanchez, G A (author). “We Are Biohackers: Exploring the Collective Identity of the DIYbio Movement.” 2014. Masters Thesis, Delft University of Technology. Accessed September 21, 2020. http://resolver.tudelft.nl/uuid:2996be4c-8614-4014-8d3a-6b8ff63c8ee6.

MLA Handbook (7th Edition):

Sanchez, G A (author). “We Are Biohackers: Exploring the Collective Identity of the DIYbio Movement.” 2014. Web. 21 Sep 2020.

Vancouver:

Sanchez GA(. We Are Biohackers: Exploring the Collective Identity of the DIYbio Movement. [Internet] [Masters thesis]. Delft University of Technology; 2014. [cited 2020 Sep 21]. Available from: http://resolver.tudelft.nl/uuid:2996be4c-8614-4014-8d3a-6b8ff63c8ee6.

Council of Science Editors:

Sanchez GA(. We Are Biohackers: Exploring the Collective Identity of the DIYbio Movement. [Masters Thesis]. Delft University of Technology; 2014. Available from: http://resolver.tudelft.nl/uuid:2996be4c-8614-4014-8d3a-6b8ff63c8ee6

25. Smith, Evan. Masked Immortality: The Thematic Tactic of The Real and Anonymous .

Degree: 2013, California State University – San Marcos

 In this thesis, Mr. Smith explores the structure and implications of the collective Anonymous. By drawing from anthropology, cultural studies, film studies, psychoanalysis, literary theory,… (more)

Subjects/Keywords: anonymous; cultural studies; hackers; mask; Guy Fawkes; V for Vendetta; OWS; Wikileaks; anarchy; movements; anonymity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Smith, E. (2013). Masked Immortality: The Thematic Tactic of The Real and Anonymous . (Thesis). California State University – San Marcos. Retrieved from http://hdl.handle.net/10211.8/339

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Smith, Evan. “Masked Immortality: The Thematic Tactic of The Real and Anonymous .” 2013. Thesis, California State University – San Marcos. Accessed September 21, 2020. http://hdl.handle.net/10211.8/339.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Smith, Evan. “Masked Immortality: The Thematic Tactic of The Real and Anonymous .” 2013. Web. 21 Sep 2020.

Vancouver:

Smith E. Masked Immortality: The Thematic Tactic of The Real and Anonymous . [Internet] [Thesis]. California State University – San Marcos; 2013. [cited 2020 Sep 21]. Available from: http://hdl.handle.net/10211.8/339.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Smith E. Masked Immortality: The Thematic Tactic of The Real and Anonymous . [Thesis]. California State University – San Marcos; 2013. Available from: http://hdl.handle.net/10211.8/339

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Columbia University

26. Patel, Isha. Hacking as Adaptation: A New Agenda for Planning Through the Lens of Copenhagen's Sharing Economy.

Degree: 2016, Columbia University

 This thesis examines the impacts of entrepreneurial initiatives in associated with Copenhagen’s sharing economy, in an effort to understand the role of hacking in adapting… (more)

Subjects/Keywords: New business enterprises; City planning – Economic aspects; Hackers; City planning; Economics; Entrepreneurship

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Patel, I. (2016). Hacking as Adaptation: A New Agenda for Planning Through the Lens of Copenhagen's Sharing Economy. (Masters Thesis). Columbia University. Retrieved from https://doi.org/10.7916/D8N016MV

Chicago Manual of Style (16th Edition):

Patel, Isha. “Hacking as Adaptation: A New Agenda for Planning Through the Lens of Copenhagen's Sharing Economy.” 2016. Masters Thesis, Columbia University. Accessed September 21, 2020. https://doi.org/10.7916/D8N016MV.

MLA Handbook (7th Edition):

Patel, Isha. “Hacking as Adaptation: A New Agenda for Planning Through the Lens of Copenhagen's Sharing Economy.” 2016. Web. 21 Sep 2020.

Vancouver:

Patel I. Hacking as Adaptation: A New Agenda for Planning Through the Lens of Copenhagen's Sharing Economy. [Internet] [Masters thesis]. Columbia University; 2016. [cited 2020 Sep 21]. Available from: https://doi.org/10.7916/D8N016MV.

Council of Science Editors:

Patel I. Hacking as Adaptation: A New Agenda for Planning Through the Lens of Copenhagen's Sharing Economy. [Masters Thesis]. Columbia University; 2016. Available from: https://doi.org/10.7916/D8N016MV


University of North Texas

27. Ogbanufe, Obiageli. Three Essays on Information Security Risk Management.

Degree: 2018, University of North Texas

 Today's environment is filled with the proliferation of cyber-attacks that result in losses for organizations and individuals. Hackers often use compromised websites to distribute malware,… (more)

Subjects/Keywords: hackers; security risk management; malware; cyberinsurance; risk transfer; knowledge sharing; social network analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ogbanufe, O. (2018). Three Essays on Information Security Risk Management. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc1157576/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ogbanufe, Obiageli. “Three Essays on Information Security Risk Management.” 2018. Thesis, University of North Texas. Accessed September 21, 2020. https://digital.library.unt.edu/ark:/67531/metadc1157576/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ogbanufe, Obiageli. “Three Essays on Information Security Risk Management.” 2018. Web. 21 Sep 2020.

Vancouver:

Ogbanufe O. Three Essays on Information Security Risk Management. [Internet] [Thesis]. University of North Texas; 2018. [cited 2020 Sep 21]. Available from: https://digital.library.unt.edu/ark:/67531/metadc1157576/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ogbanufe O. Three Essays on Information Security Risk Management. [Thesis]. University of North Texas; 2018. Available from: https://digital.library.unt.edu/ark:/67531/metadc1157576/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Texas State University – San Marcos

28. Held, Warren V. Hacktivism: An Analysis of the Motive to Disseminate Confidential Information.

Degree: MS, Criminal Justice, 2012, Texas State University – San Marcos

 Research conducted within this thesis will focus on the following groups which have in recent times gained a substantial amount of fame and attention for… (more)

Subjects/Keywords: Hacktivism; Anonymous; LulzSec; Antisec; Hacktivism; Computer hackers; Computer crimes; Information warfare; Cyberterrorism; Internet – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Held, W. V. (2012). Hacktivism: An Analysis of the Motive to Disseminate Confidential Information. (Masters Thesis). Texas State University – San Marcos. Retrieved from https://digital.library.txstate.edu/handle/10877/4381

Chicago Manual of Style (16th Edition):

Held, Warren V. “Hacktivism: An Analysis of the Motive to Disseminate Confidential Information.” 2012. Masters Thesis, Texas State University – San Marcos. Accessed September 21, 2020. https://digital.library.txstate.edu/handle/10877/4381.

MLA Handbook (7th Edition):

Held, Warren V. “Hacktivism: An Analysis of the Motive to Disseminate Confidential Information.” 2012. Web. 21 Sep 2020.

Vancouver:

Held WV. Hacktivism: An Analysis of the Motive to Disseminate Confidential Information. [Internet] [Masters thesis]. Texas State University – San Marcos; 2012. [cited 2020 Sep 21]. Available from: https://digital.library.txstate.edu/handle/10877/4381.

Council of Science Editors:

Held WV. Hacktivism: An Analysis of the Motive to Disseminate Confidential Information. [Masters Thesis]. Texas State University – San Marcos; 2012. Available from: https://digital.library.txstate.edu/handle/10877/4381

29. Daza, José Daniel. Libertades enredadas: Etnografía del aprendizaje y el activismo en los informáticos que arman redes inalámbricas libres con Internet comunitaria en Buenos Aires.

Degree: 2019, Universidad Nacional de San Martín (Argentina)

El propósito de esta tesis es estudiar el aprendizaje y el activismo en los grupos de informáticos que gestionan estructuras de Internet comunitaria libre en… (more)

Subjects/Keywords: Antropología Social; Etnografía Digital; Activismo Informático; Aprendizaje autónomo; Sociotécnica; Software Libre; Hackers; Social Anthropology; Digital Ethnography; Computer Activism; Autonomous learning; Sociotechnics; Free Software; Hackers; Antropologia Social; Etnografia Digital; Ativismo por Computador; Aprendizagem Autônoma; Sociotecnia; Software Livre; Hackers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Daza, J. D. (2019). Libertades enredadas: Etnografía del aprendizaje y el activismo en los informáticos que arman redes inalámbricas libres con Internet comunitaria en Buenos Aires. (Thesis). Universidad Nacional de San Martín (Argentina). Retrieved from https://dialnet.unirioja.es/servlet/oaites?codigo=267021

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Daza, José Daniel. “Libertades enredadas: Etnografía del aprendizaje y el activismo en los informáticos que arman redes inalámbricas libres con Internet comunitaria en Buenos Aires.” 2019. Thesis, Universidad Nacional de San Martín (Argentina). Accessed September 21, 2020. https://dialnet.unirioja.es/servlet/oaites?codigo=267021.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Daza, José Daniel. “Libertades enredadas: Etnografía del aprendizaje y el activismo en los informáticos que arman redes inalámbricas libres con Internet comunitaria en Buenos Aires.” 2019. Web. 21 Sep 2020.

Vancouver:

Daza JD. Libertades enredadas: Etnografía del aprendizaje y el activismo en los informáticos que arman redes inalámbricas libres con Internet comunitaria en Buenos Aires. [Internet] [Thesis]. Universidad Nacional de San Martín (Argentina); 2019. [cited 2020 Sep 21]. Available from: https://dialnet.unirioja.es/servlet/oaites?codigo=267021.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Daza JD. Libertades enredadas: Etnografía del aprendizaje y el activismo en los informáticos que arman redes inalámbricas libres con Internet comunitaria en Buenos Aires. [Thesis]. Universidad Nacional de San Martín (Argentina); 2019. Available from: https://dialnet.unirioja.es/servlet/oaites?codigo=267021

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ballarat

30. Lobo, Desmond. Rapid identification of rootkit infections using data mining.

Degree: Doctor of Philsophy, 2010, University of Ballarat

"The main part of this thesis presents a new approach to the topic of conjugation, with applications to various optimization problems. It does so by introducing (what we call) G-coupling functions."

Doctor of Philsophy

Subjects/Keywords: Australian Digital Thesis; Computers; Access control; Computer networks (Security measures); Computer security; Operating systems (Computers); Computer viruses; Computer hackers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lobo, D. (2010). Rapid identification of rootkit infections using data mining. (Doctoral Dissertation). University of Ballarat. Retrieved from http://researchonline.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/44038 ; http://innopac.ballarat.edu.au/record=b1555816

Chicago Manual of Style (16th Edition):

Lobo, Desmond. “Rapid identification of rootkit infections using data mining.” 2010. Doctoral Dissertation, University of Ballarat. Accessed September 21, 2020. http://researchonline.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/44038 ; http://innopac.ballarat.edu.au/record=b1555816.

MLA Handbook (7th Edition):

Lobo, Desmond. “Rapid identification of rootkit infections using data mining.” 2010. Web. 21 Sep 2020.

Vancouver:

Lobo D. Rapid identification of rootkit infections using data mining. [Internet] [Doctoral dissertation]. University of Ballarat; 2010. [cited 2020 Sep 21]. Available from: http://researchonline.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/44038 ; http://innopac.ballarat.edu.au/record=b1555816.

Council of Science Editors:

Lobo D. Rapid identification of rootkit infections using data mining. [Doctoral Dissertation]. University of Ballarat; 2010. Available from: http://researchonline.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/44038 ; http://innopac.ballarat.edu.au/record=b1555816

[1] [2] [3]

.