• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 96
  • 15
  • 13
  • 10
  • 6
  • 4
  • 4
  • 3
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 176
  • 68
  • 63
  • 56
  • 52
  • 45
  • 45
  • 36
  • 35
  • 32
  • 28
  • 26
  • 25
  • 22
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

The Red Scare: The Evolution and Impact of Russian Computer Hackers

Wilmes, Justin Allen 27 April 2006 (has links)
No description available.
42

Un labo à soi : l’idéologie DIYbio de démocratie des biotechnologies et la conjonction entre facultés manuelles et autonomie

Esquivel Sada, Daphné 06 1900 (has links)
Après des décennies de luttes sociales engagées pour la démocratisation des biotechnologies, des pays des quatre coins du globe assistent à l’essor de la « Do-It-Yourself Biology » (DIYbio). Dans le prolongement des mouvements source ouverte et DIY/Maker, la DIYbio entreprend de démocratiser les biotechnologies en les livrant aux mains du public. Le principe en étant que chaque citoyen doit pouvoir s’approprier et fabriquer librement des bio-artefacts. L’objectif de la présente thèse est de comprendre ce modèle démocratique, de saisir les enjeux sociaux et culturels soulevés par l’imbrication entre autonomie individuelle et bio-innovation sur laquelle il s’appuie, ainsi que ses résonnances à l’ère néolibérale. À la croisée des études sur la science et de la théorie critique, cette étude interroge la démocratie DIYbio à partir de son idéologie, une notion entendue non pas en un sens péjoratif, mais en tant qu’une vision du monde. L’hypothèse déployée à travers les chapitres pose que la démocratie DIYbio repose sur un déplacement de l’idéal d’autonomie politique, des facultés réflexives vers les facultés manuelles de bio-expérimentation, donnant lieu à ce que je nomme, en analogie avec le concept d’espace public, le « laboratoire autonome ». L’idéologie du laboratoire autonome y est examinée en dialogue permanent avec son alter ego technoscientifique, le programme de la biologie synthétique. Cette double focale fait ressortir l’engouement commun des domaines socio-politique et scientifique, pour les facultés manuelles comme médium privilégié de leurs activités. Conceptuellement, cette thèse puise dans les assises épistémologiques de la culture hacker, alors que son corpus analytique est composé d’entretiens qualitatifs menés auprès d’acteurs du réseau DIYbio, d’observations réalisées au sein de groupes DIYbio canadiens et de données documentaires. À l’aide de l’analyse du discours, six grands piliers de la structure idéologique du laboratoire autonome y sont mis à nu: l’articulation entre les inscriptions socio-culturelles des adeptes (artistes, techies et universitaires en biotechnosciences) et leur quête d’autonomie individuelle dans le travail de laboratoire; l’idéal d’une modalité de recherche présidée par des valeurs d’auto-référentialité et d’autodétermination normative, ouvrant par là à l’instauration d’un processus de laissez-faire bio-expérimental aux dépens de médiations sociales (telles que le savoir théorique, le jugement des pairs et l’enseignement universitaire) qui assoient la pratique de la science en tant qu’entreprise collective; la capacité d’innovation comme condition à l’autonomisation bio-expérimentale; le mode d’existence technologique assigné à la matière vivante et la conception de l’éthique comme conduite individuelle responsable; la démocratisation de la propriété intellectuelle sur les entités biotiques; et enfin, une lutte socio-politique en faveur du génie génétique conjuguée à une perspective positiviste de l’opposition publique aux biotechnologies. Je suggère que les soubassements idéologiques du laboratoire autonome répondent aux impératifs d’une « démocratisation néolibérale » des biotechnologies. L’approche manuelle de la démocratie DIYbio révèle somme toute une déprise des exigences de la démocratie délibérative, dans la mesure où y est promulgué non pas l’idéal de l’éthique de la discussion, mais plutôt l’ethos hacker de la source ouverte et sa défense de la souveraineté individuelle dans l’innovation. / After decades of social struggles over the democratization of biotechnologies, societies from all corners of the globe witness the burgeoning of « Do-It-Yourself Biology » (DIYbio). In the wake of the open-source and DIY/Maker movements, DIYbio claims that every citizen should be able to freely appropriate and make bio-artefacts. Accordingly, it undertakes the democratization of biotechnologies by putting them in the hands of the public. This doctoral dissertation seeks to understand this democratic model, to grasp the social and cultural stakes of the intertwining between individual autonomy and bio-innovation on which it is grounded, as well as and its neoliberal echoes. At the crossroads between science studies and critical theory, this study delves into the DIYbio democracy through its ideological content, understood here not in a derogatory sense, but rather as a vision of the world. Each chapiter explores the hypothesis that the democratic model of DIYbio rests on a displacement of the ideal of political autonomy, its center of gravity moving from mental towards manual faculties. This gives rise to what I call the « autonomous laboratory », a notion analogous to the concept of public sphere. The ideology of the autonomous laboratory is examined in constant dialogue with its technoscientific alter ego, namely synthetic biology. This twofold perspective highlights how both the sociopolitical and the scientific domains share a common cherishing of manual faculties as the prime medium of their activities. Conceptually, this study draws on the epistemological foundations of the hacker culture. The corpus analysed consists of qualitative interviews conducted with actors of the DIYbio network, of observations within Canadian DIYbio groups, and of documentary data. Through discourse analysis, this dissertation brings to light six pillars of the ideological structure of the autonomous laboratory: the sociocultural identities of the adherents—grouped as artists, techies and biotechnoscience academics—and their quest for individual autonomy in bio-experimental work; the ideal of a research model rooted on self-referentiality and normative self-determination, which fosters a bio-experimental laissez-faire process at the expense of social mediations (such as abstract knowledge, peer judgement, academic education) that ground the practice of science as a collective activity; the reliance of bio-experimental autonomy on the innovation regime; the technological mode of existence ascribed to living entities and the view of ethics as an individual responsible act of conduct; the democratization of intellectual property over biological entities; and lastly, the combination between a sociopolitical commitment to genetic engineering and a positivist representation of the public opposition to gene technologies. I suggest that the ideological cornerstones of the autonomous laboratory meet the exigencies of a “neoliberal democratization” of biotechnologies, and that the DIYbio hands-on approach to democracy reveals, all in all, a disengagement from deliberative democracy biddings. Rather than the ideal ethics of discussion, it favors the open-source hacker ethos ingrained in the individual autonomy on innovation.
43

Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level

Tsai, Ju-han 19 July 2010 (has links)
Given that computer hacking cause huge loss among firms, it¡¦s necessary to understand how individuals engage to commit it. Most of previous research on computer hacking, discuss the reasons by motivation, deterrence theory, moral intensity and social learning theory. However, those perspectives were adopted in researches independently. Thus, there is a need for research to combine these perspectives to create a completed, empirical model to explain the hacker¡¦s intention. Based on motivation theory, moral intensity, deterrence theory, and social learning theory, an empirical study of the intention of computer hacking was conducted. Moreover, we found the key factor ignored in the past, severity level of computer hacking, which will change the way of other factors affecting the intention. Data collected from 473 individuals in Taiwan confirmed our hypotheses and tested against the research model. The results support the proposed model in predicting intention to commit computer hacking. This study demonstrated that intrinsic motivation, extrinsic motivation, moral intensity, punishment certainty, punishment severity, and social influence were key factors that resulted in intention of computer hacking. In addition, severity level of computer hacking was a strongly significant moderator in all factors to intention. Lastly, several implications of information security management and direction to reduce computer hacking rate for practices are discussed.
44

The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System

Howell, Christian Jordan-Michael 13 June 2016 (has links)
System trespassing, which refers to the unauthorized access of computer systems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system trespassing little attention. The current study utilizes data gathered from a Chinese computer network to examine system trespasser behavior after exposure to one of three warning messages: an altruistic message used for moral persuasion (warning 1), a legal sanction threat (warning 2), and an ambiguous threat (warning 3). More specifically, the current study examines the temporal order of various keystroke commands to determine if some keystroke commands are used as a tactical skill to avoid detection. The results of a series of bivariate cross-tabulations show that encountering a standard legal threat or ambiguous threat increase the early use of reconnaissance commands; however, these findings were not pronounced enough to gain statistical significance. Since the current study is the first known test of particularistic restrictive deterrence in cyberspace it informs those working in cyber security, whilst expanding the scope of the theory.
45

O futuro do corpo: tecnociência, pirataria e metamorfose

Duarte, Bárbara Nascimento 06 March 2015 (has links)
Submitted by Renata Lopes (renatasil82@gmail.com) on 2015-12-03T11:17:01Z No. of bitstreams: 1 barbaranascimentoduarte.pdf: 2112433 bytes, checksum: fce94787e42900386c7986b66a5b6644 (MD5) / Made available in DSpace on 2015-12-03T11:17:01Z (GMT). No. of bitstreams: 1 barbaranascimentoduarte.pdf: 2112433 bytes, checksum: fce94787e42900386c7986b66a5b6644 (MD5) Previous issue date: 2015-03-06 / CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / O corpo humano está agora enredado numa trama muito particular, característica de nossa era tecnocientífica: seu valor e seu destino estão submetidos aos processos racionais e às novas técnicas que são continuamente desenvolvidas nos laboratórios. A partir de uma visão algo utópica, muito além de uma simples materialidade orgânica, as fronteiras da corporalidade estão assim sendo radicalmente questionadas e transformadas. E, neste passo, os conhecimentos científicos e sua mística transbordam seus campos estritos de aplicação, para alcançar e mobilizar o desejo e a vontade de indivíduos e do público em geral. Em nosso trabalho, buscamos investigar a relação entre as experiências de laboratório e aquilo que identificamos como o panorama underground de tecnologização do corpo. Procuramos assim circunscrever certas modificações corporais extremas, definidas como body hacktivism, body hacking ou pirataria do corpo, que se fundam numa perspectiva lúdica e exploratória, realizadas por amadores com o propósito de ampliar os limites sensoriais do homem. Tal reapropriação individual das tecnologias se converte, então, em inovações e em práticas inusitadas, por exemplo: implantes de microchips RFID, de magnetos, de vibradores genitais ou placas de titânio para substituir a pele, e mesmo próteses robóticas feitas com peças de Lego. A pesquisa de campo foi empreendida entre 2011 e 2013, em contato com vários praticantes selecionados na Europa, nos Estados Unidos e no Brasil. A metodologia qualitativa privilegiou a aplicação de entrevistas semiestruturadas e visitas a lojas de tatuagem/piercing, hotéis, eventos e seminários. O objetivo desta tese é, portanto, compreender qual corpo os body hackers constroem para si e projetam para os outros, explorando assim suas concepções acerca do sujeito humano. O argumento principal é de que os body hackers, por suas palavras e suas práticas, reverberam a mesma ontologia radical do individualismo moderno, ao tomar o indivíduo como a unidade social básica e a apropriação de seu próprio corpo como a relação fundamental. A simbiose do corpo com artefatos variados, que as novas tecnologias possibilitam, faculta ao indivíduo percepções exclusivas, nas quais os elementos inorgânicos se tornam não apenas mediadores da experiência pessoal, mas uma extensão ou parte articulada de si mesmo. Em suma, a tecnologia inserida no corpo além de modificá-lo, também transforma a forma de perceber, de estar e de ser-no-mundo. A pirataria do corpo, enfim, chama a atenção para uma realidade insofismável: se um dia a natureza concedeu aos seres humanos um corpo, para tê-lo, atualmente, é preciso superar o simples evento biológico e buscar incansavelmente o seu aperfeiçoamento, a quimera extraordinária de uma perfeição e de uma imortalidade vindoura. / In the present technoscientific era, the body is involved in a particular scheme: its value is directly related to its rational and technical production in scientific laboratories, where a utopian vision of corporeality has been delineated. In these, its boundaries are radically challenged and transformed, moving beyond organic materiality. Nevertheless, scientific development goes beyond its pre-set field of action, and its resulting knowledge touches society in a singular way. In our investigation, we seek to discover the relationships between laboratory experiments and what we identify as the underground scene of body technologization. Within it, we circumscribe extreme body modifications, defined as body hacktivism and body hacking, which stand for a playful and exploratory perspective, performed by scientifically-inclined amateurs whose purpose consists of amplifying a person’s sensory limits. This individual reappropriation of technologies turns out in innovations, including RFID microchip and magnetic implants, genital vibrators, engineering of titanium skin interfaces, and even robotic prostheses made with Legos. Through an empirical study undertaken from 2011 through 2013, we conducted participant observations with a number of privileged proponents of these practices in Europe, in the United States and in Brazil. Our methodology was qualitative, notably through the application of semi-directive interviews. The research focused on tattoo/piercing shops, hotels, body modification events and seminars. Our problem is to understand which body the body hackers build and design, and to view the conception of the human subject. Our principal argument is that body hackers are on record for self-production in a radical individualism that has, as a privileged analytical unit, the individual (and its growing individualization) and the self-ownership of the body as its fundamental measures. Then, the symbiosis of the individual with the environment, through new technologies, creates a distinctive perception in which an inorganic element becomes the mediator of the experience of the self and of the other. Lastly, they come together in such a way that the individual becomes a unity with it. In short, these embedded technologies not only modify the body, but also change the way of perceiving, living, and being in the world. The body hacking draws our attention to the understanding of a scientific reality: if one day nature granted man a body, to have currently, it is fundamental to overcoming this biological event, endlessly seeking its improvement, until the day that man will attain the chimera of perfection and immortality.
46

„Das perfekte Opfer“ – eine Analyse sicherheitsbezogener Einstellungen und Verhaltensweisen im Internet in Abhängigkeit der Nutzerpersönlichkeit

Staar, Henning, Wilms, Rafael, Hinrichs, Judith 30 April 2019 (has links)
Jüngere theoretische Beiträge und empirische Studien zur Informations- und Datensicherheit widmen sich diesem Themenbereich des Social Engineering verstärkt interdisziplinär und rücken dabei neben täterbezogenen Analysen (z.B. Watson, Holz & Mueller, 2008) vor allem gruppen- bzw. kulturbezogenen Aspekte (Flores, Holm, Nohlberg & Ekstedt, 2014; Tembe et al., 2014) als auch individuelle Charakteristika wie Persönlichkeitsmerkmale der (potentiellen) Opfer in den Fokus (z.B. Uebelacker & Quiel, 2014; Pattinson, Jerram, Parsons, McCormac & Butavicius, 2012;Vishwanath, Herath, Chen, Wang & Raghav Rao, 2011). Trotz der gegenwärtigen intensiven Beschäftigung mit dem Thema fehlen jedoch weiterhin eindeutige bedingungs- und personenbezogene Handlungsimplikationen zum Umgang mit den genannten Formen des Datendiebstahls (Gupta, Tewari, Jain & Agrawal, 2017). Ein möglicher Grund mag in der vergleichsweise häufigen Reduktion individueller Charakteristika auf die zentralen Persönlichkeitsmerkmale („Big 5“; Rammstedt, Kemper, Klein, Beierlein & Kovalena, 2012) liegen. Zugrundeliegende Motive oder Werte von Personen werden hingegen bislang unzureichend betrachtet (Fazio, Blascovich & Driscoll, 1992). Darüber hinaus beziehen bislang nur wenige Studien sowohl umfassende psychologische Befragungsinventare zu sicherheitsbezogenen Einstellungen, Verhaltensweisen und individuellen Personenmerkmalen als auch die Beurteilung von E-Mails oder Websites hinsichtlich der Vertrauenswürdigkeit und Handlungsbereitschaft in ihre Analysen ein. Der vorliegende Beitrag verfolgt mit einem entsprechenden Studiendesign das Ziel, diese Lücke weiter zu schließen und Erkenntnisse zu personenbezogenen Einflüssen auf die Informations- und Datensicherheit zu generieren. [Aus der Einleitung.]
47

Penetrationstestning av IoT-produkter : Etisk hackning av en smart kamera / Penetration testing of IoT devices : The ethical hacking of a smart camera

Skoog, Samuel, Malki, George January 2021 (has links)
The IoT-market is set to continue growing in the foreseeable future. The market contains a plethora of devices that are able to send and receive data from the internet. Smart security cameras have become increasingly popular in the average household. It is therefore important to question the security of smart cameras. This thesis aims to answer this question by choosing one of the more popular cameras on the market and investigating the security of it by using a couple of penetration tests that felt appropriate. The thesis aims to analyse, evaluate and test a list of threats against the camera. The firmware of the camera will be a common denominator across every threat that was analysed. The results of the penetration testing were that two vulnerabilities were found. A sensitive data leak was found and a procedure to install a backdoor was made. The conclusion was therefore that the camera was lacking in security. / IoT-marknaden beräknas fortsätta växa under de kommande åren. Marknaden innehåller en uppsjö av enheter som är anslutna till-, skickar och tar emot data från internet. Smartkameror har blivit vanligare i det vanliga hushållet. Därför är det viktigt att ifrågasätta huruvida dessa är säkra eller inte. Denna avhandling syftar till att besvara denna fråga genom att granska en av de mest populära kamerorna på marknaden. Avhandlingen syftar till att analysera, utvärdera och testa en lista över hot mot kameran. Kamerans firmware kommer att vara en gemensam nämnare för alla hot som analyseras. Resultatet av penetrationstesterna var att två sårbarheter hittades. Ett känsligt dataläckage hittades och en procedur för att installera en bakdörr skapades. Slutsatsen blev därför att kameran hade bristande säkerhet.
48

How Secure are Drones? : A security analysis of a drone system

Hamza, Pebo, Qassim, Ahmmad January 2021 (has links)
Drones are a crucial part of our future society. They are a part of the recent autonomous revolution that has been initiated by AI. Drone adoption in the commercial sector is ever-growing. If we are to make these devices a part of our critical infrastructure, then we should ensure that they are secure from malicious actors who seek to exploit them. By performing a thorough investigation of the security of a specific popular drone model, the DJI Mini 2, we have established a general security analysis of its system and identified probable threats. Our research has mapped out and analyzed the internal workings of the drone to understand how the system works and to identify what security precautions DJI have taken as they developed this drone. Our research and analysis of the DJI Mini 2 did not reveal any major vulnerabilities. This research focused on examining and trying to intercept the wireless communication between the ground control and drone, which is an in-house transmission technology named Ocusync. The analysis revealed that Ocusync is a robust technology that is difficult for attackers to listen to and to tamper with. / Drönare är en nödvändig del av vårt framtida samhälle. De är en del av den nya automatiseringrevolutionen som har initierats av AI. Användandet av drönare inom den kommersiella sektorn växer ständigt. Om vi ska göra dessa enheter till en del av vår kritiska infrastruktur, då behöver vi säkerställa att de är säkra från illvilliga aktörer som söker att utnyttja dem. Genom en grundlig undersökning av säkerheten av en specifik populär drönarmodell, nämligen DJI Mini 2, har vi etablerat en generell säkerhetsanalys om dess system och identifierat möjliga hot. Vår forskning har kartlagt och analyserat det interna processerna av drönaren för att förstå hur systemet funkar och för att identifiera vilka säkerhetsåtgärder som DJI har tagit under utvecklingen av denna drönare. Vår forskning och analys av DJI Mini 2 avslöjade inga större sårbarheter. Denna forskning fokuserade på att undersöka och försöka fånga upp den trådlösa kommunikationen mellan markkontroll och drönare, vilket är en intern överföringsteknologi som heter Ocusync. Analysen avslöjade att Ocusync är en robust teknologi som är svår för angripare att lyssna på och manipulera.
49

The ADS-B protocol and its'weaknesses : Exploring potential attack vectors

Sjödin, Andreas, Gruneau, Marcus January 2020 (has links)
ADS-B är ett protokoll som används över hela världen för att piloter och flygledning ska få en bättre bild över trafiksituationen i luften.Tidigare studier har uppmärksammat att säkerheten kring protokollet är bristfällig eftersom det saknas kryptering. Det huvudsakliga sårbarheten som finns i protokollet beror på att autentisering saknas. Protokollet är alltså byggt på ett blint förtroende mellan sändare och mottagare.Vårt arbete är inspirerat av tidigare forskning som gjorts inom området som bland annat visar att det går att skapa s.k. “spökflygplan” genom att sända falsk data över protokollet. Syftet bakom denna rapport var att utföra ett penetrationstest på en populär ADS-B produkt riktad mot piloter. Våra tester bygger på OSSTMM3, en vetenskaplig metod för att testa säkerhet.Våra tester visar att mottagaren som testade, inte helt oväntat, följer protokollet utan att validera data. Vi lyckades precis som tidigare forskare injicera statiska spökflygplan men också manipulera rörelsen av ett spökflygplan på ett sätt som strider mot fysikens rörelselagar. Våra tester visar att tjänsten som levereras av mottagaren kan störas ut genom att utföra liknande attacker. / The ADS-B protocol is currently in use all around the world. The purpose behind the protocol is to give pilots and traffic control a better picture of the situation in the air. Previous research shows that there exists a vulnerability in the protocol since it lacks authentication. The protocol is solely built upon trust between sender and receiver.Our work is inspired by previous studies made in the area, where it has been demonstrated that one can inject fake aircraft by sending fake ADS-B data using the protocol. The purpose behind this report was to perform a penetration test according to the OSSTMM3, a manual on how to perform scientific penetration tests.We wanted to test a real product (ADS-B receiver) made for pilots and measure if we could manipulate the environment presented to the pilot.Our testing shows that the receiver blindly trusts the protocol without any data validation. We managed to inject fake static aircraft just like previous researchers have done, but also move them around in the environment in a way that breaks the laws of physics and flood the device with fake data, effectively denying the service provided.Since we managed to deny the service, which is to give the user a correct picture of the nearby air traffic, we feel like our tests were successful.
50

Le transhumanisme et la quête d'immortalité : analyse philosophique et éthique / The transhumanism and the quest for immortality : philosophical and ethical analysis

Bour, Salomé 19 December 2018 (has links)
La thèse présente une analyse du transhumanisme et de ses enjeux, en partant de l’examen de sa philosophie, l’extropianisme, ainsi que de son projet. La mission transhumaniste est d’élever la condition humaine en offrant à l’espèce humaine le pouvoir de vivre indéfiniment grâce aux progrès des technosciences, mais aussi de s’améliorer cognitivement pour devenir plus intelligente et plus heureuse. L’objectif de la thèse est de mettre au jour les fondements philosophiques qui constituent le socle de la rhétorique transhumaniste afin de comprendre son efficience et pour analyser les enjeux éthiques qui en découlent concernant notre rapport à la mort, à l'existence et au temps. Il s’agira également de revenir sur la façon dont les fondateurs du transhumanisme se sont positionnés au sujet de ces enjeux pour insister sur l’importance d’une connaissance approfondie des principes et des valeurs du transhumanisme et de sa complexité pour proposer une critique de son projet. / The thesis presents an analysis of transhumanism and its issues, starting from an examination of its philosophy, extropianism, and its project. The transhumanist mission is to elevate the human condition by giving the human species the power to live indefinitely thanks to the progress of technoscience, but also to improve cognitively to become smarter and happier. The aim of the thesis is to uncover the philosophical foundations of transhumanist rhetoric to understand its efficiency and to analyse the ethical issues that arise from it in relation to our relationship with death, existence and time. It will also be necessary to consider the way the founders of transhumanism have positioned themselves on these issues to insist on the importance of a thorough knowledge of the principles and values of transhumanism and its complexity to propose a critique of its project.

Page generated in 0.4504 seconds