A Profile of the Demographics, Psychological Predispositions, and Social/Behavioral Patterns of Computer Hacker Insiders and Outsiders
暂无分享,去创建一个
[1] Rajesh Kumar Tiwari,et al. Microsoft Excel File: A Steganographic Carrier File , 2011, Int. J. Digit. Crime Forensics.
[2] Svein Yngvar Willassen. A Model Based Approach to Timestamp Evidence Interpretation , 2009, Int. J. Digit. Crime Forensics.
[3] William Aspray,et al. A Critical Review of the Research on Women's Participation in Postsecondary Computing Education , 2008 .
[4] T. Holt. subcultural evolution? examining the influence of on- and off-line experiences on deviant subcultures , 2007 .
[5] Bernadette H. Schell,et al. Webster's New World Hacker Dictionary (Webster's New World) , 2006 .
[6] Scott Flinn,et al. User Perceptions of Privacy and Security on the Web , 2005, PST.
[7] Rolf Haenni,et al. Credential Networks: a General Model for Distributed Trust and Authenticity Management , 2005, PST.
[8] Eric Rescorla,et al. Is finding security holes a good idea? , 2005, IEEE Security & Privacy.
[9] Ioannis Lambadaris,et al. Current Trends and Advances in Information Assurance Metrics , 2004, Conference on Privacy, Security and Trust.
[10] Ali Grami,et al. Future Trends in Mobile Commerce: Service Offerings, Technological Advances and Security Challenges , 2004, PST.
[11] Steven Furnell,et al. Cybercrime: Vandalizing the Information Society , 2003, ICWE.
[12] Douglas Thomas. Hacker Culture , 2002 .
[13] Bernadette H. Schell,et al. The Hacking of America: Who's Doing It, Why, and How , 2002 .
[14] M. Fitzgerald,et al. Diagnosis and differential diagnosis of Asperger syndrome , 2001 .
[15] D. Wall. Cybercrimes and the Internet , 2001 .
[16] S. Brenner. Is There Such a Thing as 'Virtual Crime'? , 2001 .
[17] B. Schell,et al. Stalking, Harassment, and Murder in the Workplace: Guidelines for Protection and Prevention , 2000 .
[18] T. Jordan,et al. A Sociology of Hackers , 1998 .
[19] B. Schell. A Self-Diagnostic Approach to Understanding Organizational and Personal Stressors: The C-O-P-E Model for Stress Reduction , 1997 .
[20] K. Young,et al. Psychology of Computer Use: XL. Addictive Use of the Internet: A Case That Breaks the Stereotype , 1996, Psychological reports.
[21] J. Wajcman. Feminism Confronts Technology , 1991 .
[22] Gordon R Meyer,et al. The Social Organization of the Computer Underground , 1989 .
[23] Steven Levy,et al. Hackers: Heroes of the Computer Revolution , 1984 .
[24] International Journal of Digital Crime and Forensics , 2022 .