Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Sociology (5)
- Communication (4)
- Law (4)
- Legal Studies (4)
- Arts and Humanities (3)
-
- Communication Technology and New Media (3)
- Computer Law (3)
- Criminology and Criminal Justice (3)
- Political Science (3)
- Politics and Social Change (3)
- Asian Studies (2)
- Computer Engineering (2)
- Computer Sciences (2)
- Electrical and Computer Engineering (2)
- Engineering (2)
- Film and Media Studies (2)
- International and Area Studies (2)
- International and Intercultural Communication (2)
- Library and Information Science (2)
- Physical Sciences and Mathematics (2)
- Political Theory (2)
- Science and Technology Studies (2)
- Administrative Law (1)
- Agency (1)
- Computer and Systems Architecture (1)
- Criminology (1)
- Data Storage Systems (1)
- Databases and Information Systems (1)
- Defense and Security Studies (1)
- Institution
- Publication Year
- Publication
-
- Athina Karatzogianni (2)
- Electronic Theses and Dissertations (2)
- Electronic Theses, Projects, and Dissertations (2)
- Communication Faculty Publications (1)
- Dickinson Law Review (2017-Present) (1)
-
- Journal of Digital Forensics, Security and Law (1)
- Legacy Theses & Dissertations (2009 - 2024) (1)
- Library Philosophy and Practice (e-journal) (1)
- Theses Digitization Project (1)
- Theses and Dissertations (1)
- USF Tampa Graduate Theses and Dissertations (1)
- Walden Dissertations and Doctoral Studies (1)
- Publication Type
Articles 1 - 15 of 15
Full-Text Articles in Social and Behavioral Sciences
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
Role Of Total Quality Management (Tqm) In Increasing Information Security Within Jordanian E-Libraries, Mohammad Niqresh, Omar Mohammad Al-Jaradat
Role Of Total Quality Management (Tqm) In Increasing Information Security Within Jordanian E-Libraries, Mohammad Niqresh, Omar Mohammad Al-Jaradat
Library Philosophy and Practice (e-journal)
Current study aimed at examining the role of TQM pillars (Product, Process, Organization, Leadership and Commitment) in increasing information security within Jordanian e-libraries. Quantitative approach was adopted through distributing an online questionnaire on (113) individuals working within libraries in Jordan that has an uploaded website online and present some of it services online for clients. Results of study indicated that all TQM pillars have an influence on information security in libraries, the most influential variables appeared to be commitment and process which could be highlighted in the libraries efforts to commit to security standards and secure log ins of members, …
[Review Of] Colin Milburn, Respawn: Gamers, Hackers, And Technogenic Life, Durham, Nc: Duke University Press, 2018, 301 Pp., William T. Howe
[Review Of] Colin Milburn, Respawn: Gamers, Hackers, And Technogenic Life, Durham, Nc: Duke University Press, 2018, 301 Pp., William T. Howe
Communication Faculty Publications
No abstract provided.
Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove
Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove
Walden Dissertations and Doctoral Studies
Cybercriminal activity performed widely through social engineering attacks is estimated to be one of the substantial challenges the world will face over the next 20 years. Cybercriminal activity is important to chief information security officers (CISOs) because these attacks represent the largest transfer of economic wealth in history and pose risks to the incentives for organizational innovation and investment and eventually become more profitable than the global trade of all major illegal drugs combined. Grounded in the balanced control theory, the purpose of this multiple case study was to explore strategies CISOs use to mitigate social engineering attacks within their …
Can We Learn From Hackers To Protect Victims?, Nicholas Marshall Chavez
Can We Learn From Hackers To Protect Victims?, Nicholas Marshall Chavez
Electronic Theses, Projects, and Dissertations
This project examines the protection methods suggested by hackers to guard against online victimization through the lens of Situation Crime Prevention. Data were collected from 85 webpages representing three categories of electronic communications: forums, blogs, and fan pages. The goal of this project was to identify which of the 25 opportunity reduction techniques the hacking community recommend most often, as well as, what level of expertise was associated with the suggested security measures. Results indicate that the technique most recommended by the hacking community was to remove targets with 27% of the total codings. From the results three themes were …
The Restrictive Deterrent Effect Of Warning Banners In A Compromised Computer System, Christian Jordan-Michael Howell
The Restrictive Deterrent Effect Of Warning Banners In A Compromised Computer System, Christian Jordan-Michael Howell
USF Tampa Graduate Theses and Dissertations
System trespassing, which refers to the unauthorized access of computer systems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system trespassing little attention. The current study utilizes data gathered from a Chinese computer network to examine system trespasser behavior after exposure to one of three warning messages: an altruistic message used for moral persuasion (warning 1), a legal sanction threat (warning 2), and an ambiguous threat (warning 3). More specifically, the current study examines the temporal order of various keystroke commands to determine if some keystroke commands are used as a tactical skill to avoid …
The Rise Of China's Hacking Culture: Defining Chinese Hackers, William Howlett Iv
The Rise Of China's Hacking Culture: Defining Chinese Hackers, William Howlett Iv
Electronic Theses, Projects, and Dissertations
China has been home to some of the most prominent hackers and hacker groups of the global community throughout the last decade. In the last ten years, countless attacks globally have been linked to the People’s Republic of China (PRC) or those operating within the PRC. This exploration attempts to investigate the story, ideology, institutions, actions, and motivations of the Chinese hackers collectively, as sub-groups, and as individuals. I will do this using sources ranging from basic news coverage, interviews with experts and industry veterans, secondary reportage, leaked documents from government and private sources, government white papers, legal codes, blogs …
Law Enforcements’ Perceptions And Preparedness To Address Child Exploitation Via Hacking, Jack W. Lightfoot
Law Enforcements’ Perceptions And Preparedness To Address Child Exploitation Via Hacking, Jack W. Lightfoot
Electronic Theses and Dissertations
Throughout recorded history, children have been subjected to sexual exploitation. Child predators and pedophiles often take great risk and go to extreme lengths to sexually exploit a child. With technological advancements many individuals became globalized and connected with the invention of the computer, the internet and its attributes. However, child predators quickly took note of the vulnerability of children as they begin to groom them online. The problem quickly evolved as the Deep (Dark) Web and encryption were created. This put great stress upon law enforcement entities as locating and combating these predators became exhausting tasks. It’s most often that …
When Is Hacking Ethical?, Sharif Rezazadehsaber
When Is Hacking Ethical?, Sharif Rezazadehsaber
Legacy Theses & Dissertations (2009 - 2024)
This thesis examines situations in which computer hacking might be considered ethical. It addresses fundamental questions regarding the motivation and consequences of ethical hacking. The paper is organized into three sections. The first section discusses the history of hackers, classifies them according to their motivational background. The second part of the paper comprehensively describes the features of the ethical or “white hat” hacker group, and explores the positive and negative behaviors of ethical hackers in relation to their ethical principles. In the final section of the paper, I discuss hacktivist groups, their unique ideologies, and the risks they face, including …
The Internet, Anonymous, And Our Public Identities Recreating Democracy, Leslie Anne Hutchinson
The Internet, Anonymous, And Our Public Identities Recreating Democracy, Leslie Anne Hutchinson
Theses Digitization Project
This study discusses the pursuit of understanding how the discursive construction of the internet affects individuals, identities, and democracy. it also discusses the internet within theoretical positions on its history, the public sphere, and revolutionary politics. Western governments have created legislation regulating the internet for democratic purposes, and this study examines how different and often contrasting views of democracy have shaped the way those of us connected to the internet can speak about it. The Anonymous identity, articulates one such contrast. Anonymous constructs an alternative, Internet identity-one stemming from the identity of the hacker. Policies targeted at stopping hackers and …
Introduction: New Media And The Reconfiguration Of Power In Global Politics, Athina Karatzogianni Dr
Introduction: New Media And The Reconfiguration Of Power In Global Politics, Athina Karatzogianni Dr
Athina Karatzogianni
Whatever the developments and transformations in the sphere of global politics, the new media technologies and the political opportunities they present are unsettling the world system, the are rendering it chaotic and they are having a deeper systemic effect than the more powerful actors care to admit. It remains to be seen whether information age ideologies, new modes of capitalism, conflict, activism, terrorism and war in cyberspace will ever transfer to the ‘real world’ reversing the opposite trend, and causing everyday effects on a bigger scale than we are witnessing today. Even so, we are undoubtedly living in interesting times …
Operationalizing Offensive Social Engineering For The Air Force, Bryan E. Skarda
Operationalizing Offensive Social Engineering For The Air Force, Bryan E. Skarda
Theses and Dissertations
Social engineering is the art and science of persuading individuals to bypass in place security mechanisms causing the unintended release of information. It is a low tech solution to a high tech problem and is as much an art as a science. As is true of many such solutions, social engineering is both ill-defined yet extremely effective. Its low cost, high payoff nature makes it an extremely attractive alternative to adversaries that do not have access to all the resources of a nation state. However, with full backing, the weapon can become that much more effective. Social engineering is something …
What Makes Them Click? Applying The Rational Choice Perspective To The Hacking Underground, Michael Bachmann
What Makes Them Click? Applying The Rational Choice Perspective To The Hacking Underground, Michael Bachmann
Electronic Theses and Dissertations
The increasing dependence of modern societies, industries, and individuals on information technology and computer networks renders them ever more vulnerable to attacks on critical IT infrastructures. While the societal threat posed by hackers and other types of cyber-criminals has been growing significantly in the last decade, main-stream criminology has only recently begun to realize the significance of this threat. Cyber-criminology is slowly emerging as a subfield of criminological study and has yet to overcome many of the problems other areas of criminological research have already mastered. Aside from substantial methodological and theoretical problems, cyber-criminology currently also suffers from the scarcity …
Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam
Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam
Journal of Digital Forensics, Security and Law
Rapid development of information technology (IT) has brought with it many new applications such as e-commerce and global business. The past few years have seen activities in the legislative arena covering issues such as digital signatures, the international recognition of electronic documents and privacy and data protection. Both the developed and developing countries have exhibited keenness to embrace the IT environment. Securing this electronic environment from intrusion, however, continues to be problematic. A particular favorite form of computer crime would be ‘hacking’. As more computer systems move on to on-line processing and improved telecommunications, computer hackers are now a real …
The Politics Of Cyberconflict, Athina Karatzogianni Dr
The Politics Of Cyberconflict, Athina Karatzogianni Dr
Athina Karatzogianni
The thrust of this analysis is to disclose the extent to which the internet has affected politics and political conflict in particular (cyberconflict) and provide a theoretical framework for explaining this phenomenon. The aim of the book is to first theoretically and then empirically locate and introduce the new issues confronting global politics today, due to the impact of new communication technologies.