scroll to top

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "COMPUTER hacking"

1 - 10 of 17,710 results for
 "COMPUTER hacking"
Results per page:

Hacking: field notes for adaptive urban planning in uncertain times.

Publication Type: Academic Journal

Source(s): Planning Practice & Research. Dec2022, Vol. 37 Issue 6, p721-738. 18p.

Abstract: Planning systems rely on an element of certainty and can sometimes be ill-equipped to creatively adapt to increasingly complex system trajectories. We analyse how designers and planners deal creatively with a statutory planning system that is increasin...

The effects of hacking events on bitcoin.

Publication Type: Academic Journal

Source(s): Journal of Public Affairs (14723891). Dec2022 Supplement 1, Vol. 22, p1-5. 5p.

Abstract: We examine the short‐term and long‐term effects of hacking events on bitcoin return. Additionally, we attempt to find out if investors can benefit from these events by adopting and modifying the models proposed by Baur et al. (2018) [Journal of Interna...

Resurrecting the evil genius: examining the relationship between unethical behavior and perceived competence.

Publication Type: Academic Journal

Source(s): Journal of Managerial Psychology. 2022, Vol. 37 Issue 6, p591-603. 13p.

Abstract: Purpose: Using the stereotype content model (SCM) as a framework, the authors examine how the negative relationship between peoples' unethical behavior and perceptions of their competence only holds when the unethical act is simple. Design/methodology/...

Compactifications of Moduli of Points and Lines in the Projective Plane.

Publication Type: Academic Journal

Source(s): IMRN: International Mathematics Research Notices. Nov2022, Vol. 2022 Issue 21, p17000-17078. 79p.

Abstract: Projective duality identifies the moduli spaces |$\textbf{B}_n$| and |$\textbf{X}(3,n)$| parametrizing linearly general configurations of |$n$| points in |$\mathbb{P}^2$| and |$n$| lines in the dual |$\mathbb{P}^2$|⁠ , respectively. The space |$\textbf...

HOW TO... Stop your printer being hacked.

Publication Type: Periodical

Source(s): Computer Act!ve. 12/7/2022, Issue 646, p35-37. 3p. 7 Color Photographs.


Abstract: On a Plusnet Hub One modem, click Advanced Settings and enter the admin password shown on the sticker on the back of the router itself. Type the address into your browser and, if prompted for a password, check the back of the router, where the administ...

Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker.

Publication Type: Academic Journal

Source(s): Decision Analysis. Jun2022, Vol. 19 Issue 2, p99-122. 24p.

Abstract: Information resources have been shared to promote the business operations of firms. However, the connection of business information sharing interfaces between firms has increased the attack surface and created opportunities for the hacker. We examine t...

Hacking Gender Stereotypes: Girls’ Participation in Coding Clubs.

Publication Type: Academic Journal

Source(s): AEA Papers & Proceedings. May2022, Vol. 112, p583-587. 5p.

Abstract: The article offers information about hacking gender stereotypes, along with mentions the girls' participation in coding clubs. It mentions that employment opportunities and wage growth have been rising more rapidly among occupations that require high l...

Tunable control of internet of things information hacking by application of the induced chiral atomic medium.

Publication Type: Academic Journal

Source(s): Soft Computing - A Fusion of Foundations, Methodologies & Applications. Oct2022, Vol. 26 Issue 20, p10643-10650. 8p.

Abstract: The increasing demands of new technologies in the domain of Internet of Things (IoT) change the way of data transmission medium from air to light and is called quantum communication. For secure quantum communication among IoT devices, in the present ar...

How Serious Are You About Cybersecurity?

Publication Type: Periodical

Source(s): Production Machining. May2022, Vol. 22 Issue 5, p28-31. 4p.


Abstract: The article discusses the issue of cybersecurity. It mentions that manufacturing has experienced more ransomware attacks than the U.S. government, education, technology and health care sectors. It reveals cybersecurity risk assessment which helps an or...

State hacking at the edge of code, capitalism and culture.

Publication Type: Academic Journal

Source(s): Information, Communication & Society. Feb 2022, Vol. 25 Issue 2, p242-257. 16p.

Abstract: Hacking is a set of practices with code that provides the state an opportunity to defend and expand itself onto the internet. Bringing together science and technology studies and sociology scholarship on boundary objects and boundary work, we develop a...