-
2
-
-
69549115273
-
Cannot employees also be hackers?
-
Bainbridge D. Cannot employees also be hackers?. Computer Law and Security Report 13 5 (1997) 352-354
-
(1997)
Computer Law and Security Report
, vol.13
, Issue.5
, pp. 352-354
-
-
Bainbridge, D.1
-
3
-
-
1942537606
-
Penetration testing and social engineering - hacking the weakest link
-
Barrett N. Penetration testing and social engineering - hacking the weakest link. Information Security Technical Report 8 4 (2003) 56-64
-
(2003)
Information Security Technical Report
, vol.8
, Issue.4
, pp. 56-64
-
-
Barrett, N.1
-
5
-
-
0141816572
-
Revocable anonymous access to the internet?
-
Claessens J., Díaz C., Goemans C., Dumortier J., Preneel B., and Vandewalle J. Revocable anonymous access to the internet?. Internet Research: Electronic Networking Applications and Policy 13 4 (2003) 242-258
-
(2003)
Internet Research: Electronic Networking Applications and Policy
, vol.13
, Issue.4
, pp. 242-258
-
-
Claessens, J.1
Díaz, C.2
Goemans, C.3
Dumortier, J.4
Preneel, B.5
Vandewalle, J.6
-
7
-
-
34548223308
-
A case of mistaken identity? News accounts of hacker, consumer, and organizational responsibility for compromised digital records
-
Erickson K., and Howard P. A case of mistaken identity? News accounts of hacker, consumer, and organizational responsibility for compromised digital records. Journal of Computer-Mediated Communication 12 4 (2007) 1229-1247
-
(2007)
Journal of Computer-Mediated Communication
, vol.12
, Issue.4
, pp. 1229-1247
-
-
Erickson, K.1
Howard, P.2
-
12
-
-
85044916062
-
Chinese hacking signals age of Info Warfare
-
Inman B. Chinese hacking signals age of Info Warfare. New Perspectives Quarterly 24 4 (2007) 14-15
-
(2007)
New Perspectives Quarterly
, vol.24
, Issue.4
, pp. 14-15
-
-
Inman, B.1
-
13
-
-
84978108370
-
Site spoofing becomes more popular
-
Hancock B. Site spoofing becomes more popular. Computers and Security 19 7 (2000) 581-583
-
(2000)
Computers and Security
, vol.19
, Issue.7
, pp. 581-583
-
-
Hancock, B.1
-
14
-
-
0036088283
-
The virtual and the imaginary: The role of diasphoric new media in the construction of a national identity during the break-up of Yugoslavia
-
Kaldor-Robinson J. The virtual and the imaginary: The role of diasphoric new media in the construction of a national identity during the break-up of Yugoslavia. Oxford Development Studies 30 2 (2002) 177-187
-
(2002)
Oxford Development Studies
, vol.30
, Issue.2
, pp. 177-187
-
-
Kaldor-Robinson, J.1
-
15
-
-
0033312965
-
Hackers: Freedom fighters of the 21st century
-
Kovacich G.L. Hackers: Freedom fighters of the 21st century. Computers and Security 18 7 (1999) 573-576
-
(1999)
Computers and Security
, vol.18
, Issue.7
, pp. 573-576
-
-
Kovacich, G.L.1
-
17
-
-
69549090731
-
Software could spoof-proof domain names
-
Machlis S. Software could spoof-proof domain names. Computers and Security 16 7 (1997) 621
-
(1997)
Computers and Security
, vol.16
, Issue.7
, pp. 621
-
-
Machlis, S.1
-
18
-
-
20444499196
-
Exploring identities through the internet: Youth experiences online
-
Maczewski M. Exploring identities through the internet: Youth experiences online. Child and Youth Care Forum 31 2 (2002) 111-129
-
(2002)
Child and Youth Care Forum
, vol.31
, Issue.2
, pp. 111-129
-
-
Maczewski, M.1
-
19
-
-
0036180037
-
Cybernations: Identity, self-determination, democracy and the "internet effect" in the emerging information order
-
Mills K. Cybernations: Identity, self-determination, democracy and the "internet effect" in the emerging information order. Global Society 16 1 (2002) 69-87
-
(2002)
Global Society
, vol.16
, Issue.1
, pp. 69-87
-
-
Mills, K.1
-
23
-
-
0142167572
-
Modelling indicators and indices of landscape complexity: An approach using GIS
-
Papadimitriou F. Modelling indicators and indices of landscape complexity: An approach using GIS. Εcological Indicators 2 2 (2002) 17-25
-
(2002)
Εcological Indicators
, vol.2
, Issue.2
, pp. 17-25
-
-
Papadimitriou, F.1
-
24
-
-
69549092472
-
Emerging social cultures and movements: Cybercultures, internet-cafes, hacktivism
-
Paper presented at the, October
-
Papadimitriou, F. (2004). Emerging social cultures and movements: Cybercultures, internet-cafes, hacktivism. In Paper presented at the 7th international conference of urban history, Athens, Panteion University, October 2004.
-
(2004)
7th international conference of urban history, Athens, Panteion University
-
-
Papadimitriou, F.1
-
25
-
-
63049126093
-
-
Papadimitriou, F. (2006). A Geography of Notopia: Hackers et al., hacktivism, urban cybergoups/cybercultures and digital social movements. City 10(3), 317-326.
-
Papadimitriou, F. (2006). A Geography of Notopia: Hackers et al., hacktivism, urban cybergoups/cybercultures and digital social movements. City 10(3), 317-326.
-
-
-
-
28
-
-
44249083758
-
The self in cyberspace: Identity formation in postmodern societies and Jung's Self as an objective psyche
-
Roesler Ch. The self in cyberspace: Identity formation in postmodern societies and Jung's Self as an objective psyche. Journal of Analytical Psychology 53 3 (2008) 421-436
-
(2008)
Journal of Analytical Psychology
, vol.53
, Issue.3
, pp. 421-436
-
-
Roesler, Ch.1
-
29
-
-
0036036094
-
Issues in cybersecurity; understanding the potential risks associated with hackers/crackers
-
Smith A.D., and Rupp W.T. Issues in cybersecurity; understanding the potential risks associated with hackers/crackers. Information Management & Computer Security 10 4 (2002) 178-183
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.4
, pp. 178-183
-
-
Smith, A.D.1
Rupp, W.T.2
-
30
-
-
69549104836
-
Russian hacker enters fraud plea in citicorp case
-
Starkman D. Russian hacker enters fraud plea in citicorp case. Computers and Security 17 2 (1998) 154
-
(1998)
Computers and Security
, vol.17
, Issue.2
, pp. 154
-
-
Starkman, D.1
-
31
-
-
0011560238
-
IP spoofing and session hijacking
-
Thomsen D. IP spoofing and session hijacking. Network Security 3 (1995) 6-11
-
(1995)
Network Security
, vol.3
, pp. 6-11
-
-
Thomsen, D.1
-
33
-
-
0036899311
-
Your money or your website?
-
Wales E. Your money or your website?. Computer Fraud & Security 12 (2002) 7-8
-
(2002)
Computer Fraud & Security
, vol.12
, pp. 7-8
-
-
Wales, E.1
-
34
-
-
27944488188
-
-
Harvard College, Cambridge, Mass
-
Wark M. A hacker manifesto (2004), Harvard College, Cambridge, Mass
-
(2004)
A hacker manifesto
-
-
Wark, M.1
-
35
-
-
0031327513
-
Hyperbole over cyberspace: Self-presentation and social boundaries in internet home pages and discourse
-
Wynn E., and Katz J.E. Hyperbole over cyberspace: Self-presentation and social boundaries in internet home pages and discourse. The Information Society 13 4 (1997) 297-327
-
(1997)
The Information Society
, vol.13
, Issue.4
, pp. 297-327
-
-
Wynn, E.1
Katz, J.E.2
-
36
-
-
85045160218
-
Computer hacking: Just another case of juvenile delinquency?
-
Yar M. Computer hacking: Just another case of juvenile delinquency?. Howard Journal of Criminal Justice 44 4 (2005) 387-399
-
(2005)
Howard Journal of Criminal Justice
, vol.44
, Issue.4
, pp. 387-399
-
-
Yar, M.1
|