Search for dissertations about: "hackers"

Showing result 1 - 5 of 8 swedish dissertations containing the word hackers.

  1. 1. Free software to open hardware: Critical theory on the frontiers of hacking

    Author : Johan Söderberg; Göteborgs universitet; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; hackers; constructivism; innovation; free software; critical theory; immanent critique; technology; lay expertise; open hardware;

    Abstract : Starting from the experiences of hackers developing free software and open hardware, this thesis addresses some key and recurrent themes in the field of Science and Technology Studies (STS). It poses the question: how are technologies conceptualised, constructed and used in ways that render some aspects of them transparent, while leaving others opaque? This question is complicated by the fact that what is visible and transparent to some will remain opaque to others, depending on the level of technical expertise commanded. READ MORE

  2. 2. Code begets community : On social and technical aspects of managing a virtual community

    Author : Daniel Pargman; Linköpings universitet; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; Mud; community; virtual community; virtual environments; adventure muds game; hobby; hackers; open source; software engineering; Virtuell verklighet; MUD; INTERDISCIPLINARY RESEARCH AREAS; TVÄRVETENSKAPLIGA FORSKNINGSOMRÅDEN;

    Abstract : What is reality beyond the hype of virtual communities on the Internet? This Ph. D. thesis is based on three and a half years of studies in a Swedish-speaking adventure mud - a text-based virtual reality system. The focus is not primarily on the players, but on the administrators and on the work to make this virtual community work. READ MORE

  3. 3. Techniques for Improving Intrusion Detection

    Author : Magnus Almgren; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; IDS cooperation; IDS response; application-integrated IDS; computer security; intrusion detection; alert reasoning;

    Abstract : Intrusion detection systems (IDSs) have become a vital part of operational computer security. They are the last line of defense against malicious hackers and help to detect ongoing attacks and mitigate their damage. READ MORE

  4. 4. Shaping information security behaviors related to social engineering attacks

    Author : Waldo Rocha Flores; Mathias Ekstedt; Stewart Kowalski; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Information security; Behavioral information security; Social engineering; Phishing; Measuring information security behaviors; Information security governance; Experiments; National culture; Mixed method research design; Quantitative methods; Industrial Information and Control Systems; Industriella informations- och styrsystem;

    Abstract : Today, few companies would manage to continuously stay competitive without the proper utilization of information technology (IT). This has increased companies’ dependency of IT and created new threats that need to be addressed to mitigate risks to daily business operations. READ MORE

  5. 5. Efficient Security Protocols for Constrained Devices

    Author : Martin Gunnarsson; Institutionen för reglerteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES;

    Abstract : During the last decades, more and more devices have been connected to the Internet.Today, there are more devices connected to the Internet than humans.An increasingly more common type of devices are cyber-physical devices.A device that interacts with its environment is called a cyber-physical device. READ MORE