84 resultados para hacking


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In Marxist frameworks “distributive justice” depends on extracting value through a centralized state. Many new social movements—peer to peer economy, maker activism, community agriculture, queer ecology, etc.—take the opposite approach, keeping value in its unalienated form and allowing it to freely circulate from the bottom up. Unlike Marxism, there is no general theory for bottom-up, unalienated value circulation. This paper examines the concept of “generative justice” through an historical contrast between Marx’s writings and the indigenous cultures that he drew upon. Marx erroneously concluded that while indigenous cultures had unalienated forms of production, only centralized value extraction could allow the productivity needed for a high quality of life. To the contrary, indigenous cultures now provide a robust model for the “gift economy” that underpins open source technological production, agroecology, and restorative approaches to civil rights. Expanding Marx’s concept of unalienated labor value to include unalienated ecological (nonhuman) value, as well as the domain of freedom in speech, sexual orientation, spirituality and other forms of “expressive” value, we arrive at an historically informed perspective for generative justice. 

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to pursue a hacking career but also with performance in either naïve or expert populations. Here, we test the hypotheses that two traits that are typically enhanced in autism spectrum disorders—attention to detail and systemizing—may be positively related to both the choice of pursuing a career in information security and skilled performance in a prototypical hacking task (i.e., crypto-analysis or code-breaking). A group of naïve participants and of ethical hackers completed the Autism Spectrum Quotient, including an attention to detail scale, and the Systemizing Quotient (Baron-Cohen et al., 2001, 2003). They were also tested with behavioral tasks involving code-breaking and a control task involving security X-ray image interpretation. Hackers reported significantly higher systemizing and attention to detail than non-hackers. We found a positive relation between self-reported systemizing (but not attention to detail) and code-breaking skills in both hackers and non-hackers, whereas attention to detail (but not systemizing) was related with performance in the X-ray screening task in both groups, as previously reported with naïve participants (Rusconi et al., 2015). We discuss the theoretical and translational implications of our findings.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to pursue a hacking career but also with performance in either naïve or expert populations. Here, we test the hypotheses that two traits that are typically enhanced in autism spectrum disorders—attention to detail and systemizing—may be positively related to both the choice of pursuing a career in information security and skilled performance in a prototypical hacking task (i.e., crypto-analysis or code-breaking). A group of naïve participants and of ethical hackers completed the Autism Spectrum Quotient, including an attention to detail scale, and the Systemizing Quotient (Baron-Cohen et al., 2001, 2003). They were also tested with behavioral tasks involving code-breaking and a control task involving security X-ray image interpretation. Hackers reported significantly higher systemizing and attention to detail than non-hackers. We found a positive relation between self-reported systemizing (but not attention to detail) and code-breaking skills in both hackers and non-hackers, whereas attention to detail (but not systemizing) was related with performance in the X-ray screening task in both groups, as previously reported with naïve participants (Rusconi et al., 2015). We discuss the theoretical and translational implications of our findings.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tese (doutorado)—Universidade de Brasília, Instituto de Artes, Departamento de Artes Visuais, Programa de Pós-Graduação em Arte, 2015.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

While privacy is a growing issue for our digital selves, Martin Hirst (p.27) chronicles how our identities in the physical world are at an increasing risk of privacy breaches. Recent examples are the “hacking” of the voicemail messages of public figures by British journalists, and the widespread sharing of nude photographs stolen from their “cloud” accounts of celebrities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose – The aim of the paper is to assess the hacktivist group called the Syrian Electronic Army and determine what their motivations in terms of ethical and poetical motivations.
Design/methodology/approach – This paper looks at chronological examples of Syrian Electronic Army activities and assess them using a developed hacktivist criteria to try and gain a greater understanding of the motivations of the Syrian Electronic Army. The paper uses a netnography research approach.
Findings – This paper determines that the Syrian Electronic Army is motivated to protect the Syrian Government. This protection is highlighted by the new media and social media organisations that theSyrian Electronic Army attacks online.
Research limitations/implications – This paper focuses only on one group the Syrian Electronic Army.
Practical implications – A greater understanding of the Syrian Electronic Army.
Social implications – A greater understanding of the development of hacktivism.
Originality/value – A unique study into the motivation of the Syrian Electronic Army.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An extensive investigative survey on Cloud Computing with the main focus on gaps that is slowing down Cloud adoption as well as reviewing the threat remediation challenges. Some experimentally supported thoughts on novel approaches to address some of the widely discussed cyber-attack types using machine learning techniques. The thoughts have been constructed in such a way so that Cloud customers can detect the cyber-attacks in their VM without much help from Cloud service provider

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digitale Beweismittel haben in der Rechtspraxis alltägliche Bedeutung erlangt. Allerdings sind die Methoden der forensischen Informatik bislang nur zu Teilen mit den Anforderungen des Rechts abgeglichen. Wann haben Daten eine hohe Beweiskraft? Wie darf bei der Sammlung und Auswertung vorgegangen werden? Wann besteht ein Verbot, rechtswidrig aus IT-Systemen gewonnene Beweismittel in einen Gerichtsprozess einzubringen? Dennis Heinson geht diesen Fragen nach. Er untersucht die rechtlichen Bedingungen, unter denen Beweismittel aus IT-Systemen erhoben und verwertet werden können. In verständlicher Sprache erklärt er die technischen und rechtlichen Hintergründe. Daraus entwickelt er Anforderungen für die IT-Forensik allgemein, und insbesondere im Strafprozess sowie bei betriebsinternen Ermittlungen. Sie bieten eine dogmatisch fundierte Richtschnur für die rechtssichere Erhebung und Verwertung von Daten für den Beweis vor Gericht. Die Arbeit wurde mit dem Promotionspreis der juristischen Gesellschaft zu Kassel ausgezeichnet.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Esta tesis se enfoca en “las diferentes maneras de ser ‘negro’ que atraviesan la noción de clase, género y cuerpo”’; en otras palabras, cómo se ‘entra’ y se ‘sale’ de lo negro. Su objetivo es comprender las transformaciones de los procesos de racialización en el marco del desplazamiento forzado desde el Chocó a la ciudad de Bogotá.