Search Results

There are 15320 results for: content related to: A Case of Mistaken Identity? News Accounts of Hacker, Consumer, and Organizational Responsibility for Compromised Digital Records

  1. How things Work and Fail

    The Death of the Internet

    Markus Jakobsson, Jeff Hodges, Andy Steingruebl, Juan Caballero, Adam Barth, Dawn Song, Garth Bruen, Dimitar Nikolov, Filippo Menczer, Elie Bursztein, Ariel Rabkin, Rick Wash, Emilee Rader, Christopher Soghoian, Sid Stamm, Pages: 57–168, 2012

    Published Online : 9 JUL 2012, DOI: 10.1002/9781118312551.ch4

  2. Hacking

    The Dark Side of Software Engineering: Evil on Computing Projects

    Johann Rost, Robert L. Glass, Pages: 113–156, 2010

    Published Online : 22 DEC 2010, DOI: 10.1002/9780470909959.ch3

  3. A sociology of hackers

    The Sociological Review

    Volume 46, Issue 4, November 1998, Pages: 757–780, Tim Jordan and Paul Taylor

    Version of Record online : 28 JUN 2008, DOI: 10.1111/1467-954X.00139

  4. Hackers as Tricksters of the Digital Age: Creativity in Hacker Culture

    The Journal of Popular Culture

    Volume 45, Issue 1, February 2012, Pages: 133–152, Svetlana Nikitina

    Version of Record online : 22 FEB 2012, DOI: 10.1111/j.1540-5931.2011.00915.x

  5. What To Do When you Get Hacked

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 293–322, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch9

  6. Special Territories

    Cyberwar and Information Warfare

    Daniel Ventre, Pages: 367–394, 2013

    Published Online : 21 FEB 2013, DOI: 10.1002/9781118603482.ch7

  7. Does it only depend on the point of view? Perspective-related differences in justice evaluations of negative incidents in personal relationships

    European Journal of Social Psychology

    Volume 28, Issue 6, November/December 1998, Pages: 931–962, Gerold Mikula, Ursula Athenstaedt, Sabine Heschgl and Arno Heimgartner

    Version of Record online : 4 DEC 1998, DOI: 10.1002/(SICI)1099-0992(1998110)28:6<931::AID-EJSP904>3.0.CO;2-5

  8. Iterative Discourse and the Formation of New Subcultures

    Anthropology of Consciousness

    Volume 8, Issue 4, December 1997, Pages: 133–143, Steve Mizrach

    Version of Record online : 8 JAN 2008, DOI: 10.1525/ac.1997.8.4.133

  9. Computer Hacking: Just Another Case of Juvenile Delinquency?

    The Howard Journal of Criminal Justice

    Volume 44, Issue 4, September 2005, Pages: 387–399, Majid Yar

    Version of Record online : 4 AUG 2005, DOI: 10.1111/j.1468-2311.2005.00383.x

  10. You have full text access to this OnlineOpen article
    Cooperation and end-to-end in the Internet

    International Journal of Communication Systems

    Volume 30, Issue 12, August 2017, Raimo Kantola, Hammad Kabir and Patrick Loiseau

    Version of Record online : 1 FEB 2017, DOI: 10.1002/dac.3268

  11. CODE IS SPEECH: Legal Tinkering, Expertise, and Protest among Free and Open Source Software Developers

    Cultural Anthropology

    Volume 24, Issue 3, August 2009, Pages: 420–454, GABRIELLA COLEMAN

    Version of Record online : 8 JUL 2009, DOI: 10.1111/j.1548-1360.2009.01036.x

  12. A classification of computer security incidents based on reported attack data

    Journal of Investigative Psychology and Offender Profiling

    Volume 2, Issue 2, June 2005, Pages: 105–120, Maria Kjaerland

    Version of Record online : 5 JUN 2005, DOI: 10.1002/jip.31

  13. India

    Information Warfare

    Daniel Ventre, Pages: 109–132, 2013

    Published Online : 21 JAN 2013, DOI: 10.1002/9781118381533.ch3

  14. Identifying Aggressors and Acts of Aggression

    Information Warfare

    Daniel Ventre, Pages: 209–277, 2013

    Published Online : 21 JAN 2013, DOI: 10.1002/9781118381533.ch7

  15. Cyberconflict

    Cyberwar and Information Warfare

    Daniel Ventre, Pages: 113–244, 2013

    Published Online : 21 FEB 2013, DOI: 10.1002/9781118603482.ch4

  16. Hacker Code of Ethics

    Hacking the Hacker: Learn from the Experts Who Take Down Hackers

    Roger A. Grimes, Pages: 271–274, 2017

    Published Online : 20 APR 2017, DOI: 10.1002/9781119396260.ch50

  17. Internet Security Standards

    Standard Article

    Van Nostrand's Scientific Encyclopedia

    Published Online : 15 JAN 2007, DOI: 10.1002/0471743984.vse8997

  18. WikiLeaks, Anarchism and Technologies of Dissent

    Antipode

    Volume 45, Issue 2, March 2013, Pages: 294–314, Giorel Curran and Morgan Gibson

    Version of Record online : 22 MAY 2012, DOI: 10.1111/j.1467-8330.2012.01009.x

  19. NETWORK SECURITY: VULNERABILITIES AND DISCLOSURE POLICY

    The Journal of Industrial Economics

    Volume 58, Issue 4, December 2010, Pages: 868–894, JAY PIL CHOI, CHAIM FERSHTMAN and NEIL GANDAL

    Version of Record online : 24 DEC 2010, DOI: 10.1111/j.1467-6451.2010.00435.x

  20. THE PROCESS OF CRIMINALIZATION: THE CASE OF COMPUTER CRIME LAWS

    Criminology

    Volume 26, Issue 1, February 1988, Pages: 101–126, RICHARD C. HOLLINGER and LONN LANZA-KADUCE

    Version of Record online : 7 MAR 2006, DOI: 10.1111/j.1745-9125.1988.tb00834.x