Suggested Topics within your search.
Suggested Topics within your search.
-
1
-
2
-
3
-
4
Hacking Social Science for the Age of Datafication
Published 2019-08-01“…I argue that the renegotiation of theories and research methods that must be made in order for them to be more relevant and useful, can be fruitfully understood through the metaphor of hacking social science: developing creative ways of exploiting existing tools in alternative and unexpected ways to solve problems …”
Get full text
Article -
5
-
6
-
7
-
8
THE USE OF HACKING TECHNIQUES FOR THE PURPOSE OF CRIMINAL PROCEDURE
Published 2023-06-01“…In this paper the author is considering the possibilities, advantages and risks of using hacking techniques for the purposes of criminal proceedings. …”
Get full text
Article -
9
Democratic Oversight of Government Hacking by Intelligence Agencies
Published 2025-06-01Subjects: Get full text
Article -
10
Hacking in the University: Contesting the Valorisation of Academic Labour
Published 2013-11-01Subjects: “…hacking…”
Get full text
Article -
11
The Need for Specific Penalties for Hacking in Criminal Law
Published 2014-01-01“…In spite of the fact that hacking is a widely used term, it is still not legally established. …”
Get full text
Article -
12
-
13
Car Hacking: Accessing and Exploiting the CAN Bus Protocol
Published 2019-06-01“…However, up to this point there has been a steep learning curve involved in applying cybersecurity research to car hacking. The purpose of this paper is to present a clear, step-by-step process for creating a car-hacking research workstation and to give faculty, students, and researchers the ability to implement car hacking in their own courses and lab environments. …”
Get full text
Article -
14
-
15
Testing Asymmetric Encryption in a Sustainable Hacking Lab
Published 2024-07-01Get full text
Article -
16
Workshop: Hacking Societies, Habits and Rituals, Berkeley 2019
Published 2020-05-01“…We introduce the workshop “Hacking Societies, Habits and Rituals” to show some important contributions on the topic and aim at stimulating further discussion.…”
Get full text
Article -
17
-
18
In the dispositif / out of CTRL : netwars ou le hacking transmédia
Published 2017-05-01Subjects: Get full text
Article -
19
Voice Hacking: Using Smartphones to Spread Ransomware to Traditional PCs
Published 2018-07-01“…This paper presents a voice hacking proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. …”
Get full text
Article -
20
Pathways to Criminal Hacking: Connecting Lived Experiences with Theoretical Explanations
Published 2024-12-01Subjects: Get full text
Article