• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 27
  • 17
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 62
  • 27
  • 14
  • 12
  • 11
  • 10
  • 9
  • 9
  • 8
  • 7
  • 6
  • 6
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Poliítica e resistências protocolares: torções e reforços no diagrama da sociedade de controle / Protocol resistance: twists and strengthen in the control society diagram

Rivero, Facundo Guerra 26 May 2006 (has links)
Made available in DSpace on 2016-04-26T14:55:50Z (GMT). No. of bitstreams: 1 resistenciasprotocololares.pdf: 1911757 bytes, checksum: fb058f2802dff579fdb7fabfd81640b0 (MD5) Previous issue date: 2006-05-26 / This study investigates contemporary manifestations of resistance. The starting point for such study is the flow of information - the Internet is deemed herein as the model diagram and a fundamentally important mechanism, entwined in power relations in the control society. Resistance and control are inevitably associated and therefore operate through this mechanism. Hence, this study investigates not only contemporary control, which operates through mechanisms of social subjection and mechanistic servitude, where men are components of a machine, controlled and directed by a superior unit, found in this study to be in protocols, operated in turn by molar and molecular lines that seal the Internet s control grid, but escape lines are also contemplated, represented by hackers, who assemble as war machines and throw themselves against the State apparatus and the global war machines in search of freedom / Este trabalho investiga expressões de resistências contemporâneas. O fluxo informacional é um ponto de partida para o estudo destas resistências - a Internet é aqui pensada como modelo de diagrama e mecanismo de suma importância que atravessa as relações de poder na sociedade de controle. Resistências e controle formam par indissociável e operam através deste mecanismo, portanto. Assim, não só o controle contemporâneo é investigado neste estudo, controle que se dá através de mecanismos de servidão maquínica e sujeição social, onde homens são peças constituintes de uma máquina, sob controle e direção de uma unidade superior, aqui encontrada nos protocolos, protocolos que por sua vez são operados por linhas molares e linhas moleculares, que fecham as malhas de controle da Internet, mas também são contempladas suas linhas de fuga, representadas pelos hackers, que formam máquinas de guerra e lançam-se contra os aparelhos de Estado e as máquinas de guerra mundiais em busca de liberdade
42

Three Essays on Information Security Risk Management

Ogbanufe, Obiageli 05 1900 (has links)
Today's environment is filled with the proliferation of cyber-attacks that result in losses for organizations and individuals. Hackers often use compromised websites to distribute malware, making it difficult for individuals to detect. The impact of clicking through a link on the Internet that is malware infected can result in consequences such as private information theft and identity theft. Hackers are also known to perpetrate cyber-attacks that result in organizational security breaches that adversely affect organizations' finances, reputation, and market value. Risk management approaches for minimizing and recovering from cyber-attack losses and preventing further cyber-attacks are gaining more importance. Many studies exist that have increased our understanding of how individuals and organizations are motivated to reduce or avoid the risks of security breaches and cyber-attacks using safeguard mechanisms. The safeguards are sometimes technical in nature, such as intrusion detection software and anti-virus software. Other times, the safeguards are procedural in nature such as security policy adherence and security awareness and training. Many of these safeguards fall under the risk mitigation and risk avoidance aspects of risk management, and do not address other aspects of risk management, such as risk transfer. Researchers have argued that technological approaches to security risks are rarely sufficient for providing an overall protection of information system assets. Moreover, others argue that an overall protection must include a risk transfer strategy. Hence, there is a need to understand the risk transfer approach for managing information security risks. Further, in order to effectively address the information security puzzle, there also needs to be an understanding of the nature of the perpetrators of the problem – the hackers. Though hacker incidents proliferate the news, there are few theory based hacker studies. Even though the very nature of their actions presents a difficulty in their accessibility to research, a glimpse of how hackers perpetrate attacks can be obtained through the examination of their knowledge sharing behavior. Gaining some understanding about hackers through their knowledge sharing behavior may help researchers fine-tune future information security research. The insights could also help practitioners design more effective defensive security strategies and risk management efforts aimed at protecting information systems. Hence, this dissertation is interested in understanding the hackers that perpetrate cyber-attacks on individuals and organizations through their knowledge sharing behavior. Then, of interest also is how individuals form their URL click-through intention in the face of proliferated cyber risks. Finally, we explore how and why organizations that are faced with the risk of security breaches, commit to cyberinsurance as a risk management strategy. Thus, the fundamental research question of this dissertation is: how do individuals and organizations manage information security risks?
43

Fora do Eixo, dentro do mundo : política, mercado e vida cotidiana em um movimento brasileiro de produção cultural

Irisarri, Victoria January 2015 (has links)
As formas de produção cultural contemporâneas no Brasil – como em outras partes do mundo –, junto com a consolidação das tecnologias digitais de informação e comunicação, articularam formas sociais emergentes que colocam em tensão as divisões e abrem novas interrogações sobre as fronteiras entre produção cultural, política e mercado. Esta tese é uma etnografia sobre novas formas de produção cultural. Explora algumas das práticas do movimento artístico-cultural Fora do Eixo, movimento surgido na última década que se caracteriza por sua organização através de coletivos articulados em rede e pelo uso de tecnologias digitais para o trabalho. Por meio de uma análise dos sentidos que o Fora do Eixo associa às práticas de circular e contar, bem como de suas estratégias de hackeamento e das formas de ressignificar a vida íntima, esta tese procura dar conta da importância de redefinir as abordagens analíticas para este tipo de movimento. Em última instância, este estudo tem como objetivo re-enquadrar a análise institucional da produção cultural, e os movimentos sociais e culturais, transcendendo as simplificações analíticas para entender os modos de mediação entre cultura, política e mercado que esses movimentos produzem em seus próprios termos. / Forms of contemporary cultural production in Brazil – as elsewhere in the world –, along with the consolidation of digital technologies of information and communication, have articulated emerging social forms that put strain and open new questions on the boundaries between cultural production, the political and the market. This thesis is an ethnography of novel forms of cultural production. In particular, it explores some of the practices of the artistic and cultural movement Fora do Eixo, that emerged in the last decade, which is characterized by its organization in an articulated collective network and the use of digital technologies for work. Through the analysis of some of the meanings that Fora do Eixo gives to certain actions such as circulating and counting, as well as their hacking strategies and their ways to redefine intimate life, this thesis seeks to give account of the importance of redefining the analytical approaches for this type of movements. Ultimately, this study aims at re-framing the institutional analysis of cultural production, and social and cultural movements, by transcending the analytical simplifications to understand the modes of mediation among culture, politics and the market that these movements produce in their own terms.
44

The Rise of China's Hacking Culture: Defining Chinese Hackers

Howlett, William, IV 01 June 2016 (has links)
China has been home to some of the most prominent hackers and hacker groups of the global community throughout the last decade. In the last ten years, countless attacks globally have been linked to the People’s Republic of China (PRC) or those operating within the PRC. This exploration attempts to investigate the story, ideology, institutions, actions, and motivations of the Chinese hackers collectively, as sub-groups, and as individuals. I will do this using sources ranging from basic news coverage, interviews with experts and industry veterans, secondary reportage, leaked documents from government and private sources, government white papers, legal codes, blogs and microblogs, a wide array of materials from the darker corners of the online world, and many other materials. The work will begin to sketch for the reader some of the general and specific aspects of the shadowy world of cybercrime and hacker culture in China in recent years. One of the most prevalent beliefs is that the Chinese government is in fact the one responsible, whether directly or by sponsor, for cyber-attacks on foreign systems. My careful analysis has revealed is not always the case, or at least more complex than simply labeling the group as a state actor. At the root of these attacks is a social movement of "hacktivists," a patriotic sub-culture of Chinese hackers. It is incorrect to allege that all attacks are performed by state-sponsored individuals or groups, because there are many individuals and groups that are motivated by other factors.
45

The Defense Against the latest Cyber Espionage both insider and outsider attacks

Nsambu, Emmanuel, Aziz, Danish January 2012 (has links)
This study was carried out with the intention of examining the defensive mechanism employed against the latest cyber espionage methods including both insider and outsider attacks. The main focus of this study was on web servers as the targets of the cyber attacks. Information in connection to the study was obtained from researchers’ online articles. A survey was also conducted at MidSweden University in order to obtain information about the latest cyber attacks on web servers and about the existing defensive mechanism against such attacks. The existing defensive mechanism was surveyed and a simple design was created to assist in the investigation of the efficiency of the system. Some simple implementations of the existing defensive mechanism were made in order to provide some practical results that were used for the study. The existing defensive mechanism was surveyed and improved upon where possible. The improved defensive mechanism was designed and implemented and its results were compared with the results from the existing defensive mechanism. Due to the fact that the majority of the attackers use defensive mechanisms’ vulnerability in order to find their way into devices such as web servers, it was felt that, even with the most sophisticated improved defensive mechanism in place, it would not be entirely correct to claim that it is possible to fully protect web servers against such attacks.
46

Strafbarkeit des unberechtigten Zugangs zu Computerdaten und -systemen /

Krutisch, Dorothee. January 2004 (has links) (PDF)
Univ., Diss.--Saarbrücken, 2003. / Literaturverz. S. 241 - 255.
47

Fora do Eixo, dentro do mundo : política, mercado e vida cotidiana em um movimento brasileiro de produção cultural

Irisarri, Victoria January 2015 (has links)
As formas de produção cultural contemporâneas no Brasil – como em outras partes do mundo –, junto com a consolidação das tecnologias digitais de informação e comunicação, articularam formas sociais emergentes que colocam em tensão as divisões e abrem novas interrogações sobre as fronteiras entre produção cultural, política e mercado. Esta tese é uma etnografia sobre novas formas de produção cultural. Explora algumas das práticas do movimento artístico-cultural Fora do Eixo, movimento surgido na última década que se caracteriza por sua organização através de coletivos articulados em rede e pelo uso de tecnologias digitais para o trabalho. Por meio de uma análise dos sentidos que o Fora do Eixo associa às práticas de circular e contar, bem como de suas estratégias de hackeamento e das formas de ressignificar a vida íntima, esta tese procura dar conta da importância de redefinir as abordagens analíticas para este tipo de movimento. Em última instância, este estudo tem como objetivo re-enquadrar a análise institucional da produção cultural, e os movimentos sociais e culturais, transcendendo as simplificações analíticas para entender os modos de mediação entre cultura, política e mercado que esses movimentos produzem em seus próprios termos. / Forms of contemporary cultural production in Brazil – as elsewhere in the world –, along with the consolidation of digital technologies of information and communication, have articulated emerging social forms that put strain and open new questions on the boundaries between cultural production, the political and the market. This thesis is an ethnography of novel forms of cultural production. In particular, it explores some of the practices of the artistic and cultural movement Fora do Eixo, that emerged in the last decade, which is characterized by its organization in an articulated collective network and the use of digital technologies for work. Through the analysis of some of the meanings that Fora do Eixo gives to certain actions such as circulating and counting, as well as their hacking strategies and their ways to redefine intimate life, this thesis seeks to give account of the importance of redefining the analytical approaches for this type of movements. Ultimately, this study aims at re-framing the institutional analysis of cultural production, and social and cultural movements, by transcending the analytical simplifications to understand the modes of mediation among culture, politics and the market that these movements produce in their own terms.
48

Pirâmide da pedagogia hacker =[vivências do (in) possível]

Menezes, Karina Moreira 01 February 2018 (has links)
Submitted by Karina Moreira Menezes (kaikamenezes@gmail.com) on 2018-08-23T18:04:29Z No. of bitstreams: 1 Kamenezes_P2H_EntregaPublica_Repositorio.pdf: 3636178 bytes, checksum: 81e197b6d5183b8028c2d340f16e8cb3 (MD5) / Rejected by Ana Miria Moreira (anamiriamoreira@hotmail.com), reason: Prezada Karina,gentileza retificar a ficha catalográfica, que deve ser exclusivamente elaborada pela bibliotecária responsável da Biblioteca Anísio Teixeira da Faculdade de Educação, por favor entrar em contato. (71) 3283-7255/7256; e-mail: biedu@ufba.br on 2018-08-24T17:24:03Z (GMT) / Submitted by Karina Moreira Menezes (kaikamenezes@gmail.com) on 2018-08-30T15:17:21Z No. of bitstreams: 1 Kamenezes_P2H_Entrega_RepositorioUFBA.pdf: 3548555 bytes, checksum: 0ad2a8b4948bd6bee64a5d4f18fe0ebf (MD5) / Approved for entry into archive by Ana Miria Moreira (anamiriamoreira@hotmail.com) on 2018-08-30T17:42:57Z (GMT) No. of bitstreams: 1 Kamenezes_P2H_Entrega_RepositorioUFBA.pdf: 3548555 bytes, checksum: 0ad2a8b4948bd6bee64a5d4f18fe0ebf (MD5) / Made available in DSpace on 2018-08-30T17:42:57Z (GMT). No. of bitstreams: 1 Kamenezes_P2H_Entrega_RepositorioUFBA.pdf: 3548555 bytes, checksum: 0ad2a8b4948bd6bee64a5d4f18fe0ebf (MD5) / Capes / Um espaço hacker (hackerspace) é um local físico no qual convergem pessoas interessadas em tecnologias numa perspectiva hackerista, ou seja, como potencialmente criadoras de novas realidades tendo a abertura e o compartilhamento como princípios. Ao primeiro contato, um hackerspace pode parecer um lugar no qual tudo acontece ao mesmo tempo ou então nada acontece, e apesar da atmosfera informal e caótica, os integrantes afirmam aprender muito nesses espaços, o que nos levou a colocar em foco os processos educativos que neles acontecem. Com o objetivo de analisar o fenômeno educativo em hackerspaces brasileiros para sistematizar elementos da pedagogia desses espaços, empreendeu-se uma investigação cuja a vivência no campo de pesquisa teve seu início antes de uma sistematização teórica mais profunda. Diante disso, assumindo-se a metodologia como criação dialógica com o objeto de estudo, respaldamo-nos na Teoria Fundamentada e na Pesquisa Participante, tendo como foco os processos educativos de hackerspaces brasileiros. Integrantes de vinte e dois espaços hackers contribuíram diretamente para a pesquisa através de 1) entrevistas semi-estruturadas por e-mail e/ou presenciais, 2) conversas informais e 3) um questionário online, fornecendo os construtos indicadores de que o ponto de sustentação da educação em hackerspaces é a necessidade de manutenção de sua própria existência como espaço físico, portanto, a vida NO hackerspace tal como a vida DO hackerspace são a força motriz dos seus processos educativos. Daí, emerge a tese de que a pedagogia hacker em hackerspaces é uma pedagogia de engajamento multifacetado, com quatro faces específicas e inter-relacionais: uma técnica, uma afetiva, uma ideária e uma política. Destaca-se que engajamento é tomado como decisão sobre si e ao mesmo tempo, ação sobre o outro e os quatro tipos de engajamento podem ser representados como faces pirâmide tridimensional, um tetraedro, na qual a pedagogia hacker em hackerspaces se estrutura no exercício de tornar possíveis vivências coerentes dentro de suas próprias contradições. / Abstract A hackerspace is a physical place in which converge people interested in technology in a hackertist perspective, in other words, as potentially creating new realities taking the openness and sharing as principles, upon first contact, a hackerspace can seem like a place where everything happens at the same time or then nothing happens, and despite the informal and chaotic atmosphere, members say learn a lot in these spaces, which led us to put into focus the educational processes that occur therein. With the objective of analyzing the educational phenomenon in Brazilian hackerspaces to systematize elements of pedagogy of these spaces, in addition, assuming the methodology as dialogic creation with the object of study, support methodologically in Grounded Theory and Research Participant, taking as its focus the educational processes of hackerspaces Brazilians. Members of twenty-two hacker spaces have contributed to the research through 1) semi-structured interviews by e-mail and/or courses, 2) informal conversations and 3) a questionnaire online, providing the constructs indicators that the point of sustaining the education in hackerspaces is the need to maintain their own existence as a physical space, therefore, life IN THE hackerspace as the life OF THE hackerspace are the driving force of its educational processes. Therefore, there emerges the thesis that the pedagogy hacker in hackerspaces is a pedagogy of engagement multifaceted, with four faces specific and inter-relational: a technique, an affective, a devise and a policy. It is noteworthy that, engagement is taken as a decision about themselves and at the same time, action about the other and the four faces are types of engagements that form a 3-dimensional pyramid in which the pedagogy hacker in hackerspaces is structured in the exercise of making possible the experiences that are consistent within their own contradictions.
49

Fora do Eixo, dentro do mundo : política, mercado e vida cotidiana em um movimento brasileiro de produção cultural

Irisarri, Victoria January 2015 (has links)
As formas de produção cultural contemporâneas no Brasil – como em outras partes do mundo –, junto com a consolidação das tecnologias digitais de informação e comunicação, articularam formas sociais emergentes que colocam em tensão as divisões e abrem novas interrogações sobre as fronteiras entre produção cultural, política e mercado. Esta tese é uma etnografia sobre novas formas de produção cultural. Explora algumas das práticas do movimento artístico-cultural Fora do Eixo, movimento surgido na última década que se caracteriza por sua organização através de coletivos articulados em rede e pelo uso de tecnologias digitais para o trabalho. Por meio de uma análise dos sentidos que o Fora do Eixo associa às práticas de circular e contar, bem como de suas estratégias de hackeamento e das formas de ressignificar a vida íntima, esta tese procura dar conta da importância de redefinir as abordagens analíticas para este tipo de movimento. Em última instância, este estudo tem como objetivo re-enquadrar a análise institucional da produção cultural, e os movimentos sociais e culturais, transcendendo as simplificações analíticas para entender os modos de mediação entre cultura, política e mercado que esses movimentos produzem em seus próprios termos. / Forms of contemporary cultural production in Brazil – as elsewhere in the world –, along with the consolidation of digital technologies of information and communication, have articulated emerging social forms that put strain and open new questions on the boundaries between cultural production, the political and the market. This thesis is an ethnography of novel forms of cultural production. In particular, it explores some of the practices of the artistic and cultural movement Fora do Eixo, that emerged in the last decade, which is characterized by its organization in an articulated collective network and the use of digital technologies for work. Through the analysis of some of the meanings that Fora do Eixo gives to certain actions such as circulating and counting, as well as their hacking strategies and their ways to redefine intimate life, this thesis seeks to give account of the importance of redefining the analytical approaches for this type of movements. Ultimately, this study aims at re-framing the institutional analysis of cultural production, and social and cultural movements, by transcending the analytical simplifications to understand the modes of mediation among culture, politics and the market that these movements produce in their own terms.
50

Säkerhetshot och lösningar för privatpersoner med bredband / Security threats and solutions for people with broadband

Bilan, Carolina, Hedberg, Carl January 2001 (has links)
As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats.

Page generated in 0.4353 seconds