Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(hackers). Showing records 1 – 30 of 63 total matches.

[1] [2] [3]

Search Limiters

Last 2 Years | English Only

Levels

▼ Search Limiters


University of Georgia

1. Woo, Hyung-Jin. The hacker mentality : exploring the relationship between psychological variables and hacking activities.

Degree: PhD, Mass Communication, 2003, University of Georgia

 This study investigated hackers’ psychological variables and how these variables affect their hacking activities in cyberspace. 1,385 hackers from 30 different countries participated in an… (more)

Subjects/Keywords: Hackers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Woo, H. (2003). The hacker mentality : exploring the relationship between psychological variables and hacking activities. (Doctoral Dissertation). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/woo_hyung-jin_200305_phd

Chicago Manual of Style (16th Edition):

Woo, Hyung-Jin. “The hacker mentality : exploring the relationship between psychological variables and hacking activities.” 2003. Doctoral Dissertation, University of Georgia. Accessed October 17, 2019. http://purl.galileo.usg.edu/uga_etd/woo_hyung-jin_200305_phd.

MLA Handbook (7th Edition):

Woo, Hyung-Jin. “The hacker mentality : exploring the relationship between psychological variables and hacking activities.” 2003. Web. 17 Oct 2019.

Vancouver:

Woo H. The hacker mentality : exploring the relationship between psychological variables and hacking activities. [Internet] [Doctoral dissertation]. University of Georgia; 2003. [cited 2019 Oct 17]. Available from: http://purl.galileo.usg.edu/uga_etd/woo_hyung-jin_200305_phd.

Council of Science Editors:

Woo H. The hacker mentality : exploring the relationship between psychological variables and hacking activities. [Doctoral Dissertation]. University of Georgia; 2003. Available from: http://purl.galileo.usg.edu/uga_etd/woo_hyung-jin_200305_phd


McMaster University

2. Owen, Kenneth. MOTIVATION AND DEMOTIVATION OF HACKERS IN THE SELECTION OF A HACKING TASK – A CONTEXTUAL APPROACH.

Degree: PhD, 2016, McMaster University

This research explores hacker motivation, demotivation and task selection through the lenses of the Theory of Reasoned Action (TRA) and General Deterrence Theory (GDT). The… (more)

Subjects/Keywords: Hackers; security; Motivation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Owen, K. (2016). MOTIVATION AND DEMOTIVATION OF HACKERS IN THE SELECTION OF A HACKING TASK – A CONTEXTUAL APPROACH. (Doctoral Dissertation). McMaster University. Retrieved from http://hdl.handle.net/11375/19114

Chicago Manual of Style (16th Edition):

Owen, Kenneth. “MOTIVATION AND DEMOTIVATION OF HACKERS IN THE SELECTION OF A HACKING TASK – A CONTEXTUAL APPROACH.” 2016. Doctoral Dissertation, McMaster University. Accessed October 17, 2019. http://hdl.handle.net/11375/19114.

MLA Handbook (7th Edition):

Owen, Kenneth. “MOTIVATION AND DEMOTIVATION OF HACKERS IN THE SELECTION OF A HACKING TASK – A CONTEXTUAL APPROACH.” 2016. Web. 17 Oct 2019.

Vancouver:

Owen K. MOTIVATION AND DEMOTIVATION OF HACKERS IN THE SELECTION OF A HACKING TASK – A CONTEXTUAL APPROACH. [Internet] [Doctoral dissertation]. McMaster University; 2016. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/11375/19114.

Council of Science Editors:

Owen K. MOTIVATION AND DEMOTIVATION OF HACKERS IN THE SELECTION OF A HACKING TASK – A CONTEXTUAL APPROACH. [Doctoral Dissertation]. McMaster University; 2016. Available from: http://hdl.handle.net/11375/19114


Pontifícia Universidade Católica de São Paulo

3. Vera Lúcia Viveiros Sá. Hackers - mocinhos e bandidos: estudo de grupos brasileiros desfiguradores de sites.

Degree: 2005, Pontifícia Universidade Católica de São Paulo

In this work I tracked the history of hackers, the growth and the internal complexity of its culture. At the same time, the study of… (more)

Subjects/Keywords: Hackers; CIENCIAS SOCIAIS APLICADAS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sá, V. L. V. (2005). Hackers - mocinhos e bandidos: estudo de grupos brasileiros desfiguradores de sites. (Thesis). Pontifícia Universidade Católica de São Paulo. Retrieved from http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=7897

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sá, Vera Lúcia Viveiros. “Hackers - mocinhos e bandidos: estudo de grupos brasileiros desfiguradores de sites.” 2005. Thesis, Pontifícia Universidade Católica de São Paulo. Accessed October 17, 2019. http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=7897.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sá, Vera Lúcia Viveiros. “Hackers - mocinhos e bandidos: estudo de grupos brasileiros desfiguradores de sites.” 2005. Web. 17 Oct 2019.

Vancouver:

Sá VLV. Hackers - mocinhos e bandidos: estudo de grupos brasileiros desfiguradores de sites. [Internet] [Thesis]. Pontifícia Universidade Católica de São Paulo; 2005. [cited 2019 Oct 17]. Available from: http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=7897.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sá VLV. Hackers - mocinhos e bandidos: estudo de grupos brasileiros desfiguradores de sites. [Thesis]. Pontifícia Universidade Católica de São Paulo; 2005. Available from: http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=7897

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Stockholm University

4. Åkerman, Emelie. Anonymous ansikten : En undersökningar av några svenska dagstidningars konstruktioner av hackernätverket Anonymous.

Degree: Media Studies, 2012, Stockholm University

  This study examines how a couple of Swedish daily newspapers construct the hacker network Anonymous, with an aim to discuss its possible effects. The… (more)

Subjects/Keywords: Hackers; Anonymous; DDoS; Civil olydnad

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Åkerman, E. (2012). Anonymous ansikten : En undersökningar av några svenska dagstidningars konstruktioner av hackernätverket Anonymous. (Thesis). Stockholm University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-97113

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Åkerman, Emelie. “Anonymous ansikten : En undersökningar av några svenska dagstidningars konstruktioner av hackernätverket Anonymous.” 2012. Thesis, Stockholm University. Accessed October 17, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-97113.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Åkerman, Emelie. “Anonymous ansikten : En undersökningar av några svenska dagstidningars konstruktioner av hackernätverket Anonymous.” 2012. Web. 17 Oct 2019.

Vancouver:

Åkerman E. Anonymous ansikten : En undersökningar av några svenska dagstidningars konstruktioner av hackernätverket Anonymous. [Internet] [Thesis]. Stockholm University; 2012. [cited 2019 Oct 17]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-97113.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Åkerman E. Anonymous ansikten : En undersökningar av några svenska dagstidningars konstruktioner av hackernätverket Anonymous. [Thesis]. Stockholm University; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-97113

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Bowling Green State University

5. Emerson, William J. , III. Mechanics and The Essence of Technology.

Degree: PhD, American Culture Studies, 2014, Bowling Green State University

 The mechanic is a worker of contested meaning in American popular culture. The cultural significance of mechanics reflects technological trends throughout American industrial history. Mechanics… (more)

Subjects/Keywords: American Studies; Mechanics; Technology; Luddites; Hackers; Survivalism

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Emerson, William J. , I. (2014). Mechanics and The Essence of Technology. (Doctoral Dissertation). Bowling Green State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1395930126

Chicago Manual of Style (16th Edition):

Emerson, William J. , III. “Mechanics and The Essence of Technology.” 2014. Doctoral Dissertation, Bowling Green State University. Accessed October 17, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1395930126.

MLA Handbook (7th Edition):

Emerson, William J. , III. “Mechanics and The Essence of Technology.” 2014. Web. 17 Oct 2019.

Vancouver:

Emerson, William J. I. Mechanics and The Essence of Technology. [Internet] [Doctoral dissertation]. Bowling Green State University; 2014. [cited 2019 Oct 17]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1395930126.

Council of Science Editors:

Emerson, William J. I. Mechanics and The Essence of Technology. [Doctoral Dissertation]. Bowling Green State University; 2014. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1395930126


Michigan State University

6. Loper, D., Kall. The criminology of computer hackers : a qualitative and quantitative analysis.

Degree: PhD, College of Social Science, 2000, Michigan State University

Subjects/Keywords: Hackers; Computer crimes

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Loper, D., K. (2000). The criminology of computer hackers : a qualitative and quantitative analysis. (Doctoral Dissertation). Michigan State University. Retrieved from http://etd.lib.msu.edu/islandora/object/etd:28359

Chicago Manual of Style (16th Edition):

Loper, D., Kall. “The criminology of computer hackers : a qualitative and quantitative analysis.” 2000. Doctoral Dissertation, Michigan State University. Accessed October 17, 2019. http://etd.lib.msu.edu/islandora/object/etd:28359.

MLA Handbook (7th Edition):

Loper, D., Kall. “The criminology of computer hackers : a qualitative and quantitative analysis.” 2000. Web. 17 Oct 2019.

Vancouver:

Loper, D. K. The criminology of computer hackers : a qualitative and quantitative analysis. [Internet] [Doctoral dissertation]. Michigan State University; 2000. [cited 2019 Oct 17]. Available from: http://etd.lib.msu.edu/islandora/object/etd:28359.

Council of Science Editors:

Loper, D. K. The criminology of computer hackers : a qualitative and quantitative analysis. [Doctoral Dissertation]. Michigan State University; 2000. Available from: http://etd.lib.msu.edu/islandora/object/etd:28359

7. Almeida, Fernanda Albuquerque de. Machinima: entre a narrativa e a experimentação.

Degree: Mestrado, Estética e História da Arte, 2014, University of São Paulo

Desde os primeiros filmes realizados em jogos digitais nos anos 1990, a noção de machinima vem sendo associada às convenções do cinema clássico. Com isso,… (more)

Subjects/Keywords: Arte contemporânea; Arte digital; Cinema experimental; Computer games; Contemporary art; Digital art; Experimental cinema; Hackers; Hackers; Jogos de computador; Machinima; Machinima

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Almeida, F. A. d. (2014). Machinima: entre a narrativa e a experimentação. (Masters Thesis). University of São Paulo. Retrieved from http://www.teses.usp.br/teses/disponiveis/93/93131/tde-24042015-164451/ ;

Chicago Manual of Style (16th Edition):

Almeida, Fernanda Albuquerque de. “Machinima: entre a narrativa e a experimentação.” 2014. Masters Thesis, University of São Paulo. Accessed October 17, 2019. http://www.teses.usp.br/teses/disponiveis/93/93131/tde-24042015-164451/ ;.

MLA Handbook (7th Edition):

Almeida, Fernanda Albuquerque de. “Machinima: entre a narrativa e a experimentação.” 2014. Web. 17 Oct 2019.

Vancouver:

Almeida FAd. Machinima: entre a narrativa e a experimentação. [Internet] [Masters thesis]. University of São Paulo; 2014. [cited 2019 Oct 17]. Available from: http://www.teses.usp.br/teses/disponiveis/93/93131/tde-24042015-164451/ ;.

Council of Science Editors:

Almeida FAd. Machinima: entre a narrativa e a experimentação. [Masters Thesis]. University of São Paulo; 2014. Available from: http://www.teses.usp.br/teses/disponiveis/93/93131/tde-24042015-164451/ ;


University of South Florida

8. Howell, Christian Jordan-Michael. The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System.

Degree: 2016, University of South Florida

 System trespassing, which refers to the unauthorized access of computer systems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system… (more)

Subjects/Keywords: Cybercrime; Particularistic restrictive deterrence; Hacking; Hackers; Cybercrime; Particularistic restrictive deterrence; Hacking; Hackers; System trespassers; Criminology and Criminal Justice

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Howell, C. J. (2016). The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System. (Thesis). University of South Florida. Retrieved from https://scholarcommons.usf.edu/etd/6259

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Howell, Christian Jordan-Michael. “The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System.” 2016. Thesis, University of South Florida. Accessed October 17, 2019. https://scholarcommons.usf.edu/etd/6259.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Howell, Christian Jordan-Michael. “The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System.” 2016. Web. 17 Oct 2019.

Vancouver:

Howell CJ. The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System. [Internet] [Thesis]. University of South Florida; 2016. [cited 2019 Oct 17]. Available from: https://scholarcommons.usf.edu/etd/6259.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Howell CJ. The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System. [Thesis]. University of South Florida; 2016. Available from: https://scholarcommons.usf.edu/etd/6259

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

9. Treguer, Félix. Pouvoir et résistance dans l’espace public : une contre-histoire d’Internet (XVe -XXIe siècle) : Power and Resistance in the Public Sphere : a Counter-History of the Internet (15th-21st century).

Degree: Docteur es, Etudes politiques, 2017, Paris, EHESS

Prenant pour point de départ les controverses contemporaines sur la liberté d’expression et la vie privée à l’ère numérique, cette thèse propose de revisiter l’histoire… (more)

Subjects/Keywords: Activisme numérique; Censure; Hackers; Internet; Liberté d’expression; Surveillance; Technocritique; Digital Activism; Censorship; Hackers; Internet; Freedom of expression; Surveillance; Technocriticism

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Treguer, F. (2017). Pouvoir et résistance dans l’espace public : une contre-histoire d’Internet (XVe -XXIe siècle) : Power and Resistance in the Public Sphere : a Counter-History of the Internet (15th-21st century). (Doctoral Dissertation). Paris, EHESS. Retrieved from http://www.theses.fr/2017EHES0117

Chicago Manual of Style (16th Edition):

Treguer, Félix. “Pouvoir et résistance dans l’espace public : une contre-histoire d’Internet (XVe -XXIe siècle) : Power and Resistance in the Public Sphere : a Counter-History of the Internet (15th-21st century).” 2017. Doctoral Dissertation, Paris, EHESS. Accessed October 17, 2019. http://www.theses.fr/2017EHES0117.

MLA Handbook (7th Edition):

Treguer, Félix. “Pouvoir et résistance dans l’espace public : une contre-histoire d’Internet (XVe -XXIe siècle) : Power and Resistance in the Public Sphere : a Counter-History of the Internet (15th-21st century).” 2017. Web. 17 Oct 2019.

Vancouver:

Treguer F. Pouvoir et résistance dans l’espace public : une contre-histoire d’Internet (XVe -XXIe siècle) : Power and Resistance in the Public Sphere : a Counter-History of the Internet (15th-21st century). [Internet] [Doctoral dissertation]. Paris, EHESS; 2017. [cited 2019 Oct 17]. Available from: http://www.theses.fr/2017EHES0117.

Council of Science Editors:

Treguer F. Pouvoir et résistance dans l’espace public : une contre-histoire d’Internet (XVe -XXIe siècle) : Power and Resistance in the Public Sphere : a Counter-History of the Internet (15th-21st century). [Doctoral Dissertation]. Paris, EHESS; 2017. Available from: http://www.theses.fr/2017EHES0117

10. Santos, Ana Felícia Canilho. O cibercrime: desafios e respostas do direito.

Degree: 2016, RCAAP

 O Cibercrime não pode ser considerado um “novo” tipo de crime que é capaz de transpor várias jurisdições e leis, já que existem outros exemplos… (more)

Subjects/Keywords: Cibercrime; Convenção Cibercrime; criminalidade informática; cooperação internacional; Hackers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Santos, A. F. C. (2016). O cibercrime: desafios e respostas do direito. (Thesis). RCAAP. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ual.pt:11144/2640

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Santos, Ana Felícia Canilho. “O cibercrime: desafios e respostas do direito.” 2016. Thesis, RCAAP. Accessed October 17, 2019. http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ual.pt:11144/2640.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Santos, Ana Felícia Canilho. “O cibercrime: desafios e respostas do direito.” 2016. Web. 17 Oct 2019.

Vancouver:

Santos AFC. O cibercrime: desafios e respostas do direito. [Internet] [Thesis]. RCAAP; 2016. [cited 2019 Oct 17]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ual.pt:11144/2640.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Santos AFC. O cibercrime: desafios e respostas do direito. [Thesis]. RCAAP; 2016. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ual.pt:11144/2640

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

11. Ramos, José João Afonso. Sistema automático para realização de testes de penetração.

Degree: 2013, Instituto Politécnico de Beja

Dissertaação de mestrado em Engenharia de Segurança Informática. Instituto Politécnico de Beja. Escola Superior de Tecnologia e Gestão, 2013.

As Tecnologias de Informação são um… (more)

Subjects/Keywords: Hackers; Vulnerabilidade; Segurança informática; Testes de penetração; Ética; Legislação

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ramos, J. J. A. (2013). Sistema automático para realização de testes de penetração. (Thesis). Instituto Politécnico de Beja. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio:123456789/720

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ramos, José João Afonso. “Sistema automático para realização de testes de penetração.” 2013. Thesis, Instituto Politécnico de Beja. Accessed October 17, 2019. http://www.rcaap.pt/detail.jsp?id=oai:repositorio:123456789/720.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ramos, José João Afonso. “Sistema automático para realização de testes de penetração.” 2013. Web. 17 Oct 2019.

Vancouver:

Ramos JJA. Sistema automático para realização de testes de penetração. [Internet] [Thesis]. Instituto Politécnico de Beja; 2013. [cited 2019 Oct 17]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio:123456789/720.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ramos JJA. Sistema automático para realização de testes de penetração. [Thesis]. Instituto Politécnico de Beja; 2013. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio:123456789/720

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


California State University – San Bernardino

12. Chavez, Nicholas Marshall. CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?.

Degree: MAin Criminal Justice, Criminal Justice, 2018, California State University – San Bernardino

  This project examines the protection methods suggested by hackers to guard against online victimization through the lens of Situation Crime Prevention. Data were collected… (more)

Subjects/Keywords: Situational Crime Prevention; Hackers; Cyber-theft; Criminology and Criminal Justice

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chavez, N. M. (2018). CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?. (Thesis). California State University – San Bernardino. Retrieved from http://scholarworks.lib.csusb.edu/etd/690

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chavez, Nicholas Marshall. “CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?.” 2018. Thesis, California State University – San Bernardino. Accessed October 17, 2019. http://scholarworks.lib.csusb.edu/etd/690.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chavez, Nicholas Marshall. “CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?.” 2018. Web. 17 Oct 2019.

Vancouver:

Chavez NM. CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?. [Internet] [Thesis]. California State University – San Bernardino; 2018. [cited 2019 Oct 17]. Available from: http://scholarworks.lib.csusb.edu/etd/690.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chavez NM. CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?. [Thesis]. California State University – San Bernardino; 2018. Available from: http://scholarworks.lib.csusb.edu/etd/690

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

13. Humbert, Jean-Philippe. Les mondes de la cyberdélinquance et images sociales du pirate informatique : The cyberdelinquency's worlds and the social images of the computer pirate.

Degree: Docteur es, Sciences de l'information et de la communication, 2007, Metz

La cyberdélinquance constitue un phénomène indissociable du monde numérique, depuis les premiers hackers recherchant la compréhension des mécanismes innovants de communication, jusqu'aux pirates informatiques majoritairement… (more)

Subjects/Keywords: Cyberdélinquance; Représentation sociale; Hackers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Humbert, J. (2007). Les mondes de la cyberdélinquance et images sociales du pirate informatique : The cyberdelinquency's worlds and the social images of the computer pirate. (Doctoral Dissertation). Metz. Retrieved from http://www.theses.fr/2007METZ003L

Chicago Manual of Style (16th Edition):

Humbert, Jean-Philippe. “Les mondes de la cyberdélinquance et images sociales du pirate informatique : The cyberdelinquency's worlds and the social images of the computer pirate.” 2007. Doctoral Dissertation, Metz. Accessed October 17, 2019. http://www.theses.fr/2007METZ003L.

MLA Handbook (7th Edition):

Humbert, Jean-Philippe. “Les mondes de la cyberdélinquance et images sociales du pirate informatique : The cyberdelinquency's worlds and the social images of the computer pirate.” 2007. Web. 17 Oct 2019.

Vancouver:

Humbert J. Les mondes de la cyberdélinquance et images sociales du pirate informatique : The cyberdelinquency's worlds and the social images of the computer pirate. [Internet] [Doctoral dissertation]. Metz; 2007. [cited 2019 Oct 17]. Available from: http://www.theses.fr/2007METZ003L.

Council of Science Editors:

Humbert J. Les mondes de la cyberdélinquance et images sociales du pirate informatique : The cyberdelinquency's worlds and the social images of the computer pirate. [Doctoral Dissertation]. Metz; 2007. Available from: http://www.theses.fr/2007METZ003L


Wayne State University

14. Sarat-st peter, Hilary Anne. Wired & dangerous: hacks, hair extensions and other twists on traditional technical communication.

Degree: PhD, English, 2012, Wayne State University

  Ever since its inception as a "humanistic" research discipline (Miller, 1979; Dombrowski, 1994), technical communication has striven to balance workplace exigencies with attention to… (more)

Subjects/Keywords: Extra-Institutional, Hackers, Professional Communication, Rhetoric, Technical Communication; Arts and Humanities

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sarat-st peter, H. A. (2012). Wired & dangerous: hacks, hair extensions and other twists on traditional technical communication. (Doctoral Dissertation). Wayne State University. Retrieved from https://digitalcommons.wayne.edu/oa_dissertations/556

Chicago Manual of Style (16th Edition):

Sarat-st peter, Hilary Anne. “Wired & dangerous: hacks, hair extensions and other twists on traditional technical communication.” 2012. Doctoral Dissertation, Wayne State University. Accessed October 17, 2019. https://digitalcommons.wayne.edu/oa_dissertations/556.

MLA Handbook (7th Edition):

Sarat-st peter, Hilary Anne. “Wired & dangerous: hacks, hair extensions and other twists on traditional technical communication.” 2012. Web. 17 Oct 2019.

Vancouver:

Sarat-st peter HA. Wired & dangerous: hacks, hair extensions and other twists on traditional technical communication. [Internet] [Doctoral dissertation]. Wayne State University; 2012. [cited 2019 Oct 17]. Available from: https://digitalcommons.wayne.edu/oa_dissertations/556.

Council of Science Editors:

Sarat-st peter HA. Wired & dangerous: hacks, hair extensions and other twists on traditional technical communication. [Doctoral Dissertation]. Wayne State University; 2012. Available from: https://digitalcommons.wayne.edu/oa_dissertations/556


Universidad de Chile

15. Cristi A., Loreto. Hackers: la identidad de un pirata postmoderno .

Degree: 1999, Universidad de Chile

 Nuestra época se ha visto marcada por un ascendente proceso de globalización en el área de las comunicaciones. La rápida ampliación de las posibilidades de… (more)

Subjects/Keywords: Hackers; Redes de computadores

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cristi A., L. (1999). Hackers: la identidad de un pirata postmoderno . (Thesis). Universidad de Chile. Retrieved from http://repositorio.uchile.cl/handle/2250/136343

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cristi A., Loreto. “Hackers: la identidad de un pirata postmoderno .” 1999. Thesis, Universidad de Chile. Accessed October 17, 2019. http://repositorio.uchile.cl/handle/2250/136343.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cristi A., Loreto. “Hackers: la identidad de un pirata postmoderno .” 1999. Web. 17 Oct 2019.

Vancouver:

Cristi A. L. Hackers: la identidad de un pirata postmoderno . [Internet] [Thesis]. Universidad de Chile; 1999. [cited 2019 Oct 17]. Available from: http://repositorio.uchile.cl/handle/2250/136343.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cristi A. L. Hackers: la identidad de un pirata postmoderno . [Thesis]. Universidad de Chile; 1999. Available from: http://repositorio.uchile.cl/handle/2250/136343

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Texas State University – San Marcos

16. Jennings, Kevin W. Who are Computer Criminals?.

Degree: PhD, Criminal Justice, 2014, Texas State University – San Marcos

 Computer criminals are compared to non-computer criminals in a 2004 sample of state and Federal prison inmates. Offenders are compared on their age, race, gender,… (more)

Subjects/Keywords: Computer crime; Hackers; Computer crimes; Criminal behavior, Prediction of

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jennings, K. W. (2014). Who are Computer Criminals?. (Doctoral Dissertation). Texas State University – San Marcos. Retrieved from https://digital.library.txstate.edu/handle/10877/5258

Chicago Manual of Style (16th Edition):

Jennings, Kevin W. “Who are Computer Criminals?.” 2014. Doctoral Dissertation, Texas State University – San Marcos. Accessed October 17, 2019. https://digital.library.txstate.edu/handle/10877/5258.

MLA Handbook (7th Edition):

Jennings, Kevin W. “Who are Computer Criminals?.” 2014. Web. 17 Oct 2019.

Vancouver:

Jennings KW. Who are Computer Criminals?. [Internet] [Doctoral dissertation]. Texas State University – San Marcos; 2014. [cited 2019 Oct 17]. Available from: https://digital.library.txstate.edu/handle/10877/5258.

Council of Science Editors:

Jennings KW. Who are Computer Criminals?. [Doctoral Dissertation]. Texas State University – San Marcos; 2014. Available from: https://digital.library.txstate.edu/handle/10877/5258

17. Dalwadi, Chintan. Network and data security.

Degree: MS, 2006, University of Alabama – Birmingham

With a growing number of users getting connected to the Internet and given their growing reliance on computers, it has become increasingly important to protect… (more)

Subjects/Keywords: Computer networks  – Security measures <; br>; Cyberterrorism <; br>; Computer hackers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dalwadi, C. (2006). Network and data security. (Masters Thesis). University of Alabama – Birmingham. Retrieved from http://contentdm.mhsl.uab.edu/u?/etd,24

Chicago Manual of Style (16th Edition):

Dalwadi, Chintan. “Network and data security.” 2006. Masters Thesis, University of Alabama – Birmingham. Accessed October 17, 2019. http://contentdm.mhsl.uab.edu/u?/etd,24.

MLA Handbook (7th Edition):

Dalwadi, Chintan. “Network and data security.” 2006. Web. 17 Oct 2019.

Vancouver:

Dalwadi C. Network and data security. [Internet] [Masters thesis]. University of Alabama – Birmingham; 2006. [cited 2019 Oct 17]. Available from: http://contentdm.mhsl.uab.edu/u?/etd,24.

Council of Science Editors:

Dalwadi C. Network and data security. [Masters Thesis]. University of Alabama – Birmingham; 2006. Available from: http://contentdm.mhsl.uab.edu/u?/etd,24


University of Kansas

18. Garcia, Hernan Manuel. La globalización desfigurada o la postglobalización imaginada: La estética cyberpunk (post)mexicana.

Degree: PhD, Spanish & Portuguese, 2011, University of Kansas

 In my dissertation I propose an analysis of technology from a literary and cultural studies perspective. This allows me to establish a theoretical framework through… (more)

Subjects/Keywords: Latin American literature; Latin American studies; Cyberpunk; Hackers; Mexican literature; Mexico; Science fiction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Garcia, H. M. (2011). La globalización desfigurada o la postglobalización imaginada: La estética cyberpunk (post)mexicana. (Doctoral Dissertation). University of Kansas. Retrieved from http://hdl.handle.net/1808/8073

Chicago Manual of Style (16th Edition):

Garcia, Hernan Manuel. “La globalización desfigurada o la postglobalización imaginada: La estética cyberpunk (post)mexicana.” 2011. Doctoral Dissertation, University of Kansas. Accessed October 17, 2019. http://hdl.handle.net/1808/8073.

MLA Handbook (7th Edition):

Garcia, Hernan Manuel. “La globalización desfigurada o la postglobalización imaginada: La estética cyberpunk (post)mexicana.” 2011. Web. 17 Oct 2019.

Vancouver:

Garcia HM. La globalización desfigurada o la postglobalización imaginada: La estética cyberpunk (post)mexicana. [Internet] [Doctoral dissertation]. University of Kansas; 2011. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/1808/8073.

Council of Science Editors:

Garcia HM. La globalización desfigurada o la postglobalización imaginada: La estética cyberpunk (post)mexicana. [Doctoral Dissertation]. University of Kansas; 2011. Available from: http://hdl.handle.net/1808/8073


Universidade do Rio Grande do Sul

19. Burtet, Cecilia Gerhardt. Os saberes desenvolvidos nas práticas em um hackerspace de Porto Alegre.

Degree: 2014, Universidade do Rio Grande do Sul

Na tentativa de compreender como os saberes são desenvolvidos nas práticas de um grupo em um hackerspace, este estudo parte da perspectiva da aprendizagem baseada… (more)

Subjects/Keywords: Aprendizado baseado na experiência; Practices based learning perspective; Hackers; Actor-network theory; Saber-Fazer; Hackerspace

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Burtet, C. G. (2014). Os saberes desenvolvidos nas práticas em um hackerspace de Porto Alegre. (Thesis). Universidade do Rio Grande do Sul. Retrieved from http://hdl.handle.net/10183/109016

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Burtet, Cecilia Gerhardt. “Os saberes desenvolvidos nas práticas em um hackerspace de Porto Alegre.” 2014. Thesis, Universidade do Rio Grande do Sul. Accessed October 17, 2019. http://hdl.handle.net/10183/109016.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Burtet, Cecilia Gerhardt. “Os saberes desenvolvidos nas práticas em um hackerspace de Porto Alegre.” 2014. Web. 17 Oct 2019.

Vancouver:

Burtet CG. Os saberes desenvolvidos nas práticas em um hackerspace de Porto Alegre. [Internet] [Thesis]. Universidade do Rio Grande do Sul; 2014. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10183/109016.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Burtet CG. Os saberes desenvolvidos nas práticas em um hackerspace de Porto Alegre. [Thesis]. Universidade do Rio Grande do Sul; 2014. Available from: http://hdl.handle.net/10183/109016

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Gothenburg / Göteborgs Universitet

20. Söderberg, Johan. Free software to open hardware: Critical theory on the frontiers of hacking.

Degree: 2011, University of Gothenburg / Göteborgs Universitet

 Starting from the experiences of hackers developing free software and open hardware, this thesis addresses some key and recurrent themes in the field of Science… (more)

Subjects/Keywords: hackers; constructivism; innovation; free software; critical theory; immanent critique; technology; lay expertise; open hardware

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Söderberg, J. (2011). Free software to open hardware: Critical theory on the frontiers of hacking. (Thesis). University of Gothenburg / Göteborgs Universitet. Retrieved from http://hdl.handle.net/2077/24450

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Söderberg, Johan. “Free software to open hardware: Critical theory on the frontiers of hacking.” 2011. Thesis, University of Gothenburg / Göteborgs Universitet. Accessed October 17, 2019. http://hdl.handle.net/2077/24450.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Söderberg, Johan. “Free software to open hardware: Critical theory on the frontiers of hacking.” 2011. Web. 17 Oct 2019.

Vancouver:

Söderberg J. Free software to open hardware: Critical theory on the frontiers of hacking. [Internet] [Thesis]. University of Gothenburg / Göteborgs Universitet; 2011. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/2077/24450.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Söderberg J. Free software to open hardware: Critical theory on the frontiers of hacking. [Thesis]. University of Gothenburg / Göteborgs Universitet; 2011. Available from: http://hdl.handle.net/2077/24450

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

21. Smith, Evan. Masked Immortality: The Thematic Tactic of The Real and Anonymous .

Degree: 2013, California State University – San Marcos

 In this thesis, Mr. Smith explores the structure and implications of the collective Anonymous. By drawing from anthropology, cultural studies, film studies, psychoanalysis, literary theory,… (more)

Subjects/Keywords: anonymous; cultural studies; hackers; mask; Guy Fawkes; V for Vendetta; OWS; Wikileaks; anarchy; movements; anonymity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Smith, E. (2013). Masked Immortality: The Thematic Tactic of The Real and Anonymous . (Thesis). California State University – San Marcos. Retrieved from http://hdl.handle.net/10211.8/339

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Smith, Evan. “Masked Immortality: The Thematic Tactic of The Real and Anonymous .” 2013. Thesis, California State University – San Marcos. Accessed October 17, 2019. http://hdl.handle.net/10211.8/339.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Smith, Evan. “Masked Immortality: The Thematic Tactic of The Real and Anonymous .” 2013. Web. 17 Oct 2019.

Vancouver:

Smith E. Masked Immortality: The Thematic Tactic of The Real and Anonymous . [Internet] [Thesis]. California State University – San Marcos; 2013. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10211.8/339.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Smith E. Masked Immortality: The Thematic Tactic of The Real and Anonymous . [Thesis]. California State University – San Marcos; 2013. Available from: http://hdl.handle.net/10211.8/339

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Victoria

22. Almulhem, Ahmad. Detection and analysis of connection chains in network forensics.

Degree: Dept. of Electrical and Computer Engineering, 2010, University of Victoria

 Network forensics is a young member of the bigger family of digital forensics discipline. In particular, it refers to digital forensics in networked environments. It… (more)

Subjects/Keywords: Network forensics; Packets; Events; Hackers; UVic Subject Index::Sciences and Engineering::Applied Sciences::Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Almulhem, A. (2010). Detection and analysis of connection chains in network forensics. (Thesis). University of Victoria. Retrieved from http://hdl.handle.net/1828/2474

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Almulhem, Ahmad. “Detection and analysis of connection chains in network forensics.” 2010. Thesis, University of Victoria. Accessed October 17, 2019. http://hdl.handle.net/1828/2474.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Almulhem, Ahmad. “Detection and analysis of connection chains in network forensics.” 2010. Web. 17 Oct 2019.

Vancouver:

Almulhem A. Detection and analysis of connection chains in network forensics. [Internet] [Thesis]. University of Victoria; 2010. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/1828/2474.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Almulhem A. Detection and analysis of connection chains in network forensics. [Thesis]. University of Victoria; 2010. Available from: http://hdl.handle.net/1828/2474

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

23. Sanchez, G.A. We Are Biohackers: Exploring the Collective Identity of the DIYbio Movement:.

Degree: 2014, Delft University of Technology

 Social movements are important sociological phenomena because they are the key agents that provide societies with new ideas and ideals to change people's behavior or… (more)

Subjects/Keywords: social movement; collective identity; DIYbio; biohackers; hackers; commons-based peer-production; open-source

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sanchez, G. A. (2014). We Are Biohackers: Exploring the Collective Identity of the DIYbio Movement:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:2996be4c-8614-4014-8d3a-6b8ff63c8ee6

Chicago Manual of Style (16th Edition):

Sanchez, G A. “We Are Biohackers: Exploring the Collective Identity of the DIYbio Movement:.” 2014. Masters Thesis, Delft University of Technology. Accessed October 17, 2019. http://resolver.tudelft.nl/uuid:2996be4c-8614-4014-8d3a-6b8ff63c8ee6.

MLA Handbook (7th Edition):

Sanchez, G A. “We Are Biohackers: Exploring the Collective Identity of the DIYbio Movement:.” 2014. Web. 17 Oct 2019.

Vancouver:

Sanchez GA. We Are Biohackers: Exploring the Collective Identity of the DIYbio Movement:. [Internet] [Masters thesis]. Delft University of Technology; 2014. [cited 2019 Oct 17]. Available from: http://resolver.tudelft.nl/uuid:2996be4c-8614-4014-8d3a-6b8ff63c8ee6.

Council of Science Editors:

Sanchez GA. We Are Biohackers: Exploring the Collective Identity of the DIYbio Movement:. [Masters Thesis]. Delft University of Technology; 2014. Available from: http://resolver.tudelft.nl/uuid:2996be4c-8614-4014-8d3a-6b8ff63c8ee6


Rhodes University

24. Buys, Stephanus. Log analysis aided by latent semantic mapping.

Degree: Faculty of Science, Computer Science, 2013, Rhodes University

In an age of zero-day exploits and increased on-line attacks on computing infrastructure, operational security practitioners are becoming increasingly aware of the value of the… (more)

Subjects/Keywords: Latent semantic indexing; Data mining; Computer networks  – Security measures; Computer hackers; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Buys, S. (2013). Log analysis aided by latent semantic mapping. (Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/d1002963

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Buys, Stephanus. “Log analysis aided by latent semantic mapping.” 2013. Thesis, Rhodes University. Accessed October 17, 2019. http://hdl.handle.net/10962/d1002963.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Buys, Stephanus. “Log analysis aided by latent semantic mapping.” 2013. Web. 17 Oct 2019.

Vancouver:

Buys S. Log analysis aided by latent semantic mapping. [Internet] [Thesis]. Rhodes University; 2013. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10962/d1002963.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Buys S. Log analysis aided by latent semantic mapping. [Thesis]. Rhodes University; 2013. Available from: http://hdl.handle.net/10962/d1002963

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

25. Palma, Daniel Ângelo. Desenvolvimento de cenários de internetworking virtualizados para ensino de segurança em redes de comunicação.

Degree: 2017, RCAAP

 Este documento relata o desenvolvimento de cenários de ensino virtualizados no âmbito da segurança em redes de comunicação. Cenários esses que funcionam em ambiente virtualizado… (more)

Subjects/Keywords: Ethical hacking; Cenários de ensino; Hackers; Vulnerabilidades conhecidas; Exploits; Máquinas virtuais; Redes de comunicação

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Palma, D. . (2017). Desenvolvimento de cenários de internetworking virtualizados para ensino de segurança em redes de comunicação. (Thesis). RCAAP. Retrieved from https://www.rcaap.pt/detail.jsp?id=oai:repositorio.ipbeja.pt:20.500.12207/4711

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Palma, Daniel Ângelo. “Desenvolvimento de cenários de internetworking virtualizados para ensino de segurança em redes de comunicação.” 2017. Thesis, RCAAP. Accessed October 17, 2019. https://www.rcaap.pt/detail.jsp?id=oai:repositorio.ipbeja.pt:20.500.12207/4711.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Palma, Daniel Ângelo. “Desenvolvimento de cenários de internetworking virtualizados para ensino de segurança em redes de comunicação.” 2017. Web. 17 Oct 2019.

Vancouver:

Palma D. Desenvolvimento de cenários de internetworking virtualizados para ensino de segurança em redes de comunicação. [Internet] [Thesis]. RCAAP; 2017. [cited 2019 Oct 17]. Available from: https://www.rcaap.pt/detail.jsp?id=oai:repositorio.ipbeja.pt:20.500.12207/4711.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Palma D. Desenvolvimento de cenários de internetworking virtualizados para ensino de segurança em redes de comunicação. [Thesis]. RCAAP; 2017. Available from: https://www.rcaap.pt/detail.jsp?id=oai:repositorio.ipbeja.pt:20.500.12207/4711

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

26. Roos, Christiaan J. Governance responses to hacking in the banking sector of South Africa : an exploratory study.

Degree: 2013, University of Johannesburg

D.Comm. (Auditing)

Organisations today are critically dependent on IT to enable business operations and ensure competitiveness in a growing international marketplace. At the same time,… (more)

Subjects/Keywords: Computer security - Auditing; Computer hackers; Banks and banking - Security measures - South Africa; Risk management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Roos, C. J. (2013). Governance responses to hacking in the banking sector of South Africa : an exploratory study. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/8642

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Roos, Christiaan J. “Governance responses to hacking in the banking sector of South Africa : an exploratory study.” 2013. Thesis, University of Johannesburg. Accessed October 17, 2019. http://hdl.handle.net/10210/8642.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Roos, Christiaan J. “Governance responses to hacking in the banking sector of South Africa : an exploratory study.” 2013. Web. 17 Oct 2019.

Vancouver:

Roos CJ. Governance responses to hacking in the banking sector of South Africa : an exploratory study. [Internet] [Thesis]. University of Johannesburg; 2013. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10210/8642.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Roos CJ. Governance responses to hacking in the banking sector of South Africa : an exploratory study. [Thesis]. University of Johannesburg; 2013. Available from: http://hdl.handle.net/10210/8642

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Texas

27. Ogbanufe, Obiageli. Three Essays on Information Security Risk Management.

Degree: 2018, University of North Texas

 Today's environment is filled with the proliferation of cyber-attacks that result in losses for organizations and individuals. Hackers often use compromised websites to distribute malware,… (more)

Subjects/Keywords: hackers; security risk management; malware; cyberinsurance; risk transfer; knowledge sharing; social network analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ogbanufe, O. (2018). Three Essays on Information Security Risk Management. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc1157576/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ogbanufe, Obiageli. “Three Essays on Information Security Risk Management.” 2018. Thesis, University of North Texas. Accessed October 17, 2019. https://digital.library.unt.edu/ark:/67531/metadc1157576/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ogbanufe, Obiageli. “Three Essays on Information Security Risk Management.” 2018. Web. 17 Oct 2019.

Vancouver:

Ogbanufe O. Three Essays on Information Security Risk Management. [Internet] [Thesis]. University of North Texas; 2018. [cited 2019 Oct 17]. Available from: https://digital.library.unt.edu/ark:/67531/metadc1157576/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ogbanufe O. Three Essays on Information Security Risk Management. [Thesis]. University of North Texas; 2018. Available from: https://digital.library.unt.edu/ark:/67531/metadc1157576/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Texas State University – San Marcos

28. Held, Warren V. Hacktivism: An Analysis of the Motive to Disseminate Confidential Information.

Degree: MS, Criminal Justice, 2012, Texas State University – San Marcos

 Research conducted within this thesis will focus on the following groups which have in recent times gained a substantial amount of fame and attention for… (more)

Subjects/Keywords: Hacktivism; Anonymous; LulzSec; Antisec; Hacktivism; Computer hackers; Computer crimes; Information warfare; Cyberterrorism; Internet – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Held, W. V. (2012). Hacktivism: An Analysis of the Motive to Disseminate Confidential Information. (Masters Thesis). Texas State University – San Marcos. Retrieved from https://digital.library.txstate.edu/handle/10877/4381

Chicago Manual of Style (16th Edition):

Held, Warren V. “Hacktivism: An Analysis of the Motive to Disseminate Confidential Information.” 2012. Masters Thesis, Texas State University – San Marcos. Accessed October 17, 2019. https://digital.library.txstate.edu/handle/10877/4381.

MLA Handbook (7th Edition):

Held, Warren V. “Hacktivism: An Analysis of the Motive to Disseminate Confidential Information.” 2012. Web. 17 Oct 2019.

Vancouver:

Held WV. Hacktivism: An Analysis of the Motive to Disseminate Confidential Information. [Internet] [Masters thesis]. Texas State University – San Marcos; 2012. [cited 2019 Oct 17]. Available from: https://digital.library.txstate.edu/handle/10877/4381.

Council of Science Editors:

Held WV. Hacktivism: An Analysis of the Motive to Disseminate Confidential Information. [Masters Thesis]. Texas State University – San Marcos; 2012. Available from: https://digital.library.txstate.edu/handle/10877/4381


University of Ballarat

29. Lobo, Desmond. Rapid identification of rootkit infections using data mining.

Degree: Doctor of Philsophy, 2010, University of Ballarat

"The main part of this thesis presents a new approach to the topic of conjugation, with applications to various optimization problems. It does so by introducing (what we call) G-coupling functions."

Doctor of Philsophy

Subjects/Keywords: Australian Digital Thesis; Computers; Access control; Computer networks (Security measures); Computer security; Operating systems (Computers); Computer viruses; Computer hackers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lobo, D. (2010). Rapid identification of rootkit infections using data mining. (Doctoral Dissertation). University of Ballarat. Retrieved from http://researchonline.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/44038 ; http://innopac.ballarat.edu.au/record=b1555816

Chicago Manual of Style (16th Edition):

Lobo, Desmond. “Rapid identification of rootkit infections using data mining.” 2010. Doctoral Dissertation, University of Ballarat. Accessed October 17, 2019. http://researchonline.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/44038 ; http://innopac.ballarat.edu.au/record=b1555816.

MLA Handbook (7th Edition):

Lobo, Desmond. “Rapid identification of rootkit infections using data mining.” 2010. Web. 17 Oct 2019.

Vancouver:

Lobo D. Rapid identification of rootkit infections using data mining. [Internet] [Doctoral dissertation]. University of Ballarat; 2010. [cited 2019 Oct 17]. Available from: http://researchonline.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/44038 ; http://innopac.ballarat.edu.au/record=b1555816.

Council of Science Editors:

Lobo D. Rapid identification of rootkit infections using data mining. [Doctoral Dissertation]. University of Ballarat; 2010. Available from: http://researchonline.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/44038 ; http://innopac.ballarat.edu.au/record=b1555816


Youngstown State University

30. Watkins, Trevor U. Is Microsoft a Threat to National Security? Policy, Products, Penetrations, and Honeypots.

Degree: Master of Computing and Information Systems, Department of Computer Science and Information Systems, 2009, Youngstown State University

 Is Microsoft a threat to national security? This thesis evaluates Microsoft's policies, business model, and products to determine whether Microsoft is a threat to national… (more)

Subjects/Keywords: Computer Science; Information Systems; Systems Design; Honeypots; penetration testing; national security; network security; Microsoft threat to national security; hackers; Microsoft Windows

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Watkins, T. U. (2009). Is Microsoft a Threat to National Security? Policy, Products, Penetrations, and Honeypots. (Masters Thesis). Youngstown State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ysu1244659206

Chicago Manual of Style (16th Edition):

Watkins, Trevor U. “Is Microsoft a Threat to National Security? Policy, Products, Penetrations, and Honeypots.” 2009. Masters Thesis, Youngstown State University. Accessed October 17, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1244659206.

MLA Handbook (7th Edition):

Watkins, Trevor U. “Is Microsoft a Threat to National Security? Policy, Products, Penetrations, and Honeypots.” 2009. Web. 17 Oct 2019.

Vancouver:

Watkins TU. Is Microsoft a Threat to National Security? Policy, Products, Penetrations, and Honeypots. [Internet] [Masters thesis]. Youngstown State University; 2009. [cited 2019 Oct 17]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ysu1244659206.

Council of Science Editors:

Watkins TU. Is Microsoft a Threat to National Security? Policy, Products, Penetrations, and Honeypots. [Masters Thesis]. Youngstown State University; 2009. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ysu1244659206

[1] [2] [3]

.