Query Result Set
Skip Navigation Links
   ActiveUsers:2013Hits:18215497Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
HACKING (17) answer(s).
 
SrlItem
1
ID:   171964


50 shades of hacking: How IT and cybersecurity industry actors perceive good, bad, and former hackers / Tanczer, Leonie Maria   Journal Article
Tanczer, Leonie Maria Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The hacker is the epitome of a cybersecurity threat and the embodied misuse of the Internet. However, in recent years, notions of hacking have begun to change. Blurred boundaries mark the term, best expressed in its overlap with “security researcher.” This article draws on a 3.5-year research project on the hacker community and applies an international political sociology framework to uncover routines of rationalization. Interviews with IT and cybersecurity industry experts expose accepted identities, practices, and behaviors of hackers, which allows for the construction of in-group and out-group members in the IT and cybersecurity field. Additionally, the empirical findings are used to propose a conceptual framework (the Möbius strip) to situate the moral valence of hackers on a flexible model. Thus, the article provides insight into the ontological and normative complexities that define the study of hackers, as well as the perception of IT and cybersecurity professionals.
Key Words Industry  Identity  Hacking  Cybersecurity  Hacker  Security Researcher 
        Export Export
2
ID:   047325


Cyber crimes: notorious asoects of the humans and the net / Barua, Yogesh; Dayal, Denzyl P 2001  Book
Barua, Yogesh Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, Dominant Publishers and Distributors, 2001.
Description v.4 (426p.)Hardbound
Standard Number 8178880326
        Export Export
Copies: C:3/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
044881364.168/BAR 044881MainOn ShelfGeneral 
044882364.168/BAR 044882MainOn ShelfGeneral 
044883364.168/BAR 044883MainOn ShelfGeneral 
3
ID:   153168


Cyber enigma: unraveling the terror in the cyber world / Dilipraj, E 2017  Book
Dilipraj, E Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, KW Publishers Pvt Ltd, 2017.
Description xxii, 262p.hbk
Standard Number 9789386288578
Key Words India  Cyberspace  Cyber Terrorism  Hacking  Cyber World  Dark Digital Ocean 
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
059078363.325/DIL 059078MainOn ShelfGeneral 
4
ID:   147381


Cyberwar: taking stock of security and warfare in the digital age / Eun, Yong-Soo; Abmann, Judith Sita   Journal Article
Eun, Yong-Soo Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article examines the implications of cyberwar for national security and traditional warfare. While not making traditional war obsolete, cyber-weapons can nonetheless be force-amplifiers for kinetic attacks in future wars. Not only are cyber-weapons easier to deploy, they can also be activated much more cheaply than conventional weapons. This cost–benefit ratio levels the playing field, especially to the benefit of Third World countries which lack considerable leverage in terms of exercising traditional military power. By bringing new aspects to the theater of war, cyberwar asks us to revamp our policy and study of security, war, and power. Although it does not change the very nature of warfare which remains political, instrumental, and violent, cyberwarfare will reshape the ways in which war begins or is carried out in the near future. Our analytical and theoretical understanding of the international politics of the digital age can be enriched by taking what is happening in cyberspace more seriously.
Key Words Cyber-attacks  Hacking  Cyber War  Security Studies  Cyber-Weapons 
        Export Export
5
ID:   118509


Devising passwords against hacking / Team CLAWS   Journal Article
Team CLAWS Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Key Words Hacking  Long Passwards  E - Mail 
        Export Export
6
ID:   138669


Evolution of internet, cyber crimes and countermeasures / Seth, Ashok K   Article
Seth, Ashok K Article
0 Rating(s) & 0 Review(s)
Key Words Cyber Security  Internet  Cyber Warfare  Cyber Terrorism  Hacking  Defence System 
Virus  Cyber Crimes  WWW  Cyber Espionage  Cyber Murder  Intrusion Attack 
Worm  Cyber Campaign  Bot  Cyber Sabotage 
        Export Export
7
ID:   178932


Examining Ideologically Motivated Cyberattacks Performed by Far-Left Groups / Holt, Thomas J; Stonhouse, Mattisen; Freilich, Joshua; Chermak, Steven M   Journal Article
Chermak, Steven M Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Over the last two decades, there has been a massive increase in research examining terror and extremist-related violence. Few have considered the extent to which these same groups may engage in attacks against digital infrastructure and the Internet, whether through hacking or other methods. The absence of empirical evidence calls to question the nature and dynamics of cyberattacks performed by extremists and ideologically motivated actors. This study attempted to address this gap in the literature through a qualitative investigation of 26 attacks performed by far-left groups against targets in the UK, US, and Canada from 2000 to 2015. This data was compared to physical attacks documented in the Extremist Crime Database during the same period. The findings demonstrated that there was an increase in cyberattacks during a period of decreased physical violence by far-left groups. Additionally, there was some parity in the targets of far-left groups on- and off-line, with similar motivations to cause harm to or embarrass businesses, government organizations, and individuals. The implications of this study for our understanding of terror and future research were discussed in detail.
Key Words Cyberterrorism  Hacking  Ecoterrorism  Cybercrime  Terror  Far Left 
        Export Export
8
ID:   112620


Exploring the intersections of technology, crime, and terror / Holt, Thomas J   Journal Article
Holt, Thomas J Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract The Internet and computer-mediated communications (CMCs) have drastically changed the way that individuals communicate and share information across the globe. Over the last two decades, financial institutions, private industry, and governments have come to rely on technology in order to access sensitive data and manage critical infrastructure, such as electrical power grids. As a consequence, the threat posed by cybercriminals has increased dramatically and afforded significant opportunities for terrorist groups and extremist organizations to further their objectives. The complex and intersecting nature of both crime and terror make it difficult to clearly separate these issues, particularly in virtual environments, due to the anonymous nature of CMCs and challenges to actor attribution. Thus, this study examines the various definitions for physical and cyberterror and the ways that these activities intersect with cybercrime. In addition, the ways that terrorists and extremist groups use the Internet and CMCs to recruit individuals, spread misinformation, and gather intelligence on various targets are discussed. Finally, the uses of computer hacking tools and malware are explored as a way to better understand the relationship between cybercrime and terror.
Key Words Hacking  Cybercrime  Cyberterror  Hacktivism  Malware 
        Export Export
9
ID:   125362


Faceless crime: criminal groups turn to cyber technology / Pritchard, Robert   Journal Article
Pritchard, Robert Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract As awareness of the need for online privacy grows, technology is increasingly becoming available to help internet users maintain anonymity, Robert Pritchard investigates illegal activities facilitated by such technology and the inherent problems in tacking it.
        Export Export
10
ID:   150407


Fear this man: David Vincenzetti built a spyware empire. Is the Italian mogul a code breaker or an arms dealer? / Kushner, David   Journal Article
Kushner, David Journal Article
0 Rating(s) & 0 Review(s)
Key Words Human Rights  Hacking  Political Reform  Hackers  Security Industry  Google 
Spyware  Security Researcher 
        Export Export
11
ID:   154579


Game of thrones: China uses cyber espionage as a surefire way to defeat the US and maintain its sovereignty / Ghoshal, Debalina   Journal Article
Ghoshal, Debalina Journal Article
0 Rating(s) & 0 Review(s)
Key Words Information Warfare  Sovereignty  United States  China  Missile Defence System  Hacking 
Cyberwarfare  THAAD 
        Export Export
12
ID:   087440


Glass fortress: Zimbabwe's cyber guerrilla warfare / Mavhunga, Clapperton   Journal Article
Mavhunga, Clapperton Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Summary/Abstract Zimbabwe offers an example of the way ordinary citizens in Africa are using information technologies to express and demand genuine individual freedoms.
Key Words Africa  Zimbabwe  Cyber Warfare  Hacking  Gurrilla Warfare 
        Export Export
13
ID:   152698


Moving target / Amoakohene, Kwame   Journal Article
Amoakohene, Kwame Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
14
ID:   170937


Preventing man-made disasters provoked by the adversary in the course of fighting / Durnev, R A; Kryaukov, K Yu; Deduchenko. F M   Journal Article
Durnev, R A Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This paper argues that in the course of combat actions the adversary is liable to provoke man-made disasters at industrial enterprises and power facilities, which cause fatalities among civilians and serious damage to the economy. It reviews the signs of similar disaster emergence and proposes a set of measures for preventing the latter.
        Export Export
15
ID:   152405


Securing the anthropocene? international policy experiments in digital hacktivism: a case study of Jakarta / Chandler, David   Journal Article
Chandler, David Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article analyses security discourses that are beginning to self-consciously take on board the shift towards the Anthropocene. It first sets out the developing episteme of the Anthropocene, highlighting the limits of instrumentalist cause-and-effect approaches to security, which are increasingly becoming displaced by discursive framings of securing as a process generated through new forms of mediation and agency and capable of grasping interrelations in a fluid context. This approach is the methodology of hacking: creatively composing and repurposing already existing forms of agency. It elaborates on hacking as a set of experimental practices and imaginaries of securing the Anthropocene, using as a case study the field of digital policy activism with a focus on community empowerment through social-technical assemblages being developed and applied in ‘the City of the Anthropocene’: Jakarta, Indonesia. The article concludes that policy interventions today cannot readily be grasped in modernist frameworks of ‘problem solving’ but should be seen more in terms of evolving and adaptive ‘life hacks’.
Key Words Security  Hacking  Jakarta  Anthropocene  Digital Activism 
        Export Export
16
ID:   100964


Social networking: boon or bane for the armed forces / Sharma, Suyash   Journal Article
Sharma, Suyash Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
Summary/Abstract The social networking sites can be exploited by the cyber operators by infiltration and influencing the opinion where feasible. Cyber espionage has already became the cornerstone of some nations, where international cyber security agencies have reasons to believe, of state complicity in major hacking, denial of service attacks in the last couple of years. Since social networks become easy prey to such agencies, there is a need to increase awareness of defence personal about their vulnerabilities.
        Export Export
17
ID:   131545


Superheroes in Hong Kong's political resistance: icons, images, and opposition / Garrett, Dan   Journal Article
Garrett, Dan Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract In June 2013, explosive claims and illicit revelations of domestic and global American intelligence surveillance operations, hacking, and collaboration with US Internet and information technology behemoths rocked the world. Simultaneously, the mysterious emergence in the Hong Kong Special Administrative Region (HKSAR) of runaway American intelligence contractor Edward J. Snowden at the heart of the intrigue shoved the small enclave to the fore of global geopolitics. Claiming to rely on Hong Kong's respect for the rule of law and tradition of dissent to shield him against American retaliation and extradition, the dubious protagonist's statements ingratiated himself to local political groups who petitioned Hong Kong and central Chinese governments not to send him back to the United States. During "Defend Snowden" demonstrations at the US consulate in Hong Kong involving hundreds of supporters, placards bearing the image of US President Barack Obama parodied, mocked, and ridiculed the leader of the free world using iconic adaptations of Captain America, George Orwell's "Big Brother," and Shepard Fairey's Obama "Hope" visuals. Instead of an icon of "American freedom and ideology" (Serwer 2008) and an "idealized American nation" (Dittmer 2005, 627) Captain America, American president Barack Obama, and the United States of America were symbolically transformed into a signified Orwellian caped crusader threatening the world.
        Export Export