Sökning: "hackers"
Visar resultat 1 - 5 av 9 avhandlingar innehållade ordet hackers.
1. Free software to open hardware: Critical theory on the frontiers of hacking
Sammanfattning : Starting from the experiences of hackers developing free software and open hardware, this thesis addresses some key and recurrent themes in the field of Science and Technology Studies (STS). It poses the question: how are technologies conceptualised, constructed and used in ways that render some aspects of them transparent, while leaving others opaque? This question is complicated by the fact that what is visible and transparent to some will remain opaque to others, depending on the level of technical expertise commanded. LÄS MER
2. Pojkarna vid datorn : Unga entusiaster i datateknikens värld
Sammanfattning : The aim of this study is to describe and to search for an understanding of Swedish computer captivated youth. This group is generally known as "hackers", often connoting queer loners and/or persons indulging in illegal activities. This picture is shown not to be a good representation of the Swedish countetpart. LÄS MER
3. Code begets community : On social and technical aspects of managing a virtual community
Sammanfattning : What is reality beyond the hype of virtual communities on the Internet? This Ph. D. thesis is based on three and a half years of studies in a Swedish-speaking adventure mud - a text-based virtual reality system. The focus is not primarily on the players, but on the administrators and on the work to make this virtual community work. LÄS MER
4. Techniques for Improving Intrusion Detection
Sammanfattning : Intrusion detection systems (IDSs) have become a vital part of operational computer security. They are the last line of defense against malicious hackers and help to detect ongoing attacks and mitigate their damage. LÄS MER
5. Shaping information security behaviors related to social engineering attacks
Sammanfattning : Today, few companies would manage to continuously stay competitive without the proper utilization of information technology (IT). This has increased companies’ dependency of IT and created new threats that need to be addressed to mitigate risks to daily business operations. LÄS MER