Chine - Les « hackers rouges » attaquent
In: Jeune Afrique, Heft 2619, S. 63-64
936 Ergebnisse
Sortierung:
In: Jeune Afrique, Heft 2619, S. 63-64
In: Infosecurity, Band 5, Heft 7, S. 10
ISSN: 1754-4548
Blog: Reason.com
Episode 466 of the Cyberlaw Podcast
In: Reason: free minds and free markets, Band 47, Heft 1
ISSN: 0048-6906
In: Philosophy & technology, Band 29, Heft 1, S. 5-19
ISSN: 2210-5441
In: Infosecurity, Band 4, Heft 3, S. 22-25
ISSN: 1754-4548
In: The world today, Band 58, Heft 11, S. 10-11
ISSN: 0043-9134
In: Jane's Intelligence review: the magazine of IHS Jane's Military and Security Assessments Intelligence centre, Band 11, Heft 1, S. 50-54
ISSN: 1350-6226
World Affairs Online
In: Volkswirtschaftliche Diskussionsbeiträge 2013, 3
In this paper a network model is developed in which three players sequentially choose their strategies. In the first stage, a profitmaximizing network firm chooses the price and thus the size of the network. In the second stage the consumers decide whether to join in the network or not. In the last stage a hacker has the opportunity to hack the network and cause damage to the consumer. The success of hacking is based on the protection of the customers. Whereas in the first part of the paper this is given exogenously it is endogenized later on. In an extension, the utility of the hacker as well as the consumers includes psychological costs, thus allowing some further insights. Finally, policy implications are given implying better international cooperation of the law enforcement authorities.
In: Almanac of sea power, Band 57, Heft 9
ISSN: 0736-3559, 0199-1337
In: Universität der Bundeswehr München/Bundeswehr University Munich Working Paper No. 3
SSRN
Working paper
In: Sciences humaines: SH, Band 229, Heft 9, S. 19-19
In: Dissent: a journal devoted to radical ideas and the values of socialism and democracy, Band 49, Heft 4, S. 50-57
ISSN: 0012-3846
Examines changes in media/public perceptions of computer hackers from creative innovators to criminals, in context of increasing corporate control of the Internet; argues for positive recognition of hacker ideologies of free access and "hacktivist" protests against political oppression; since the 1950s; US.
In: Contemporary world issues : science, technology, and medicine
In: Contemporary World Issues Ser.
In: Infosecurity, Band 6, Heft 7, S. 7
ISSN: 1754-4548