Future directions for behavioral information security research
Information Security (InfoSec) research is far reaching and includes many approaches to
deal with protecting and mitigating threats to the information assets and technical resources …
deal with protecting and mitigating threats to the information assets and technical resources …
Open source software and the “private-collective” innovation model: Issues for organization science
Currently, two models of innovation are prevalent in organization science. The “private
investment” model assumes returns to the innovator result from private goods and efficient …
investment” model assumes returns to the innovator result from private goods and efficient …
Cybercrime and society
M Yar, KF Steinmetz - 2023 - torrossa.com
The previous chapters explored cybercriminal activities associated with computer intrusion
and manipulation, which are generally labelled as hacking. This chapter critically explores …
and manipulation, which are generally labelled as hacking. This chapter critically explores …
Wired shut, copyright and the shape of digital culture
T Gillespie - Journal of Information, Communication and Ethics in …, 2009 - emerald.com
Copyright is essentially a simple concept, and yet people's reactions to it are complex.
Everyone seems to have a different take on it. At one extreme, we have the maximalist, who …
Everyone seems to have a different take on it. At one extreme, we have the maximalist, who …
Choice and chance: A conceptual model of paths to information security compromise
S Ransbotham, S Mitra - Information Systems Research, 2009 - pubsonline.informs.org
No longer the exclusive domain of technology experts, information security is now a
management issue. Through a grounded approach using interviews, observations, and …
management issue. Through a grounded approach using interviews, observations, and …
[图书][B] Cyber security and the politics of time
T Stevens - 2016 - books.google.com
"'Cyber security'is a recent addition to the global security agenda, concerned with protecting
states and citizens from the misuse of computer networks for war, terrorism, economic …
states and citizens from the misuse of computer networks for war, terrorism, economic …
Hackers and the contested ontology of cyberspace
H Nissenbaum - New media & society, 2004 - journals.sagepub.com
This article analyzes the transformation in our conception of hacking over the past few
decades to the current point where hackers are conceived as miscreants, vandals, criminals …
decades to the current point where hackers are conceived as miscreants, vandals, criminals …
Craft (y) ness: An ethnographic study of hacking
KF Steinmetz - British Journal of Criminology, 2015 - academic.oup.com
The idea of the 'hacker'is a contested concept both inside and outside the hacker
community, including academia. Addressing such contestation the current study uses …
community, including academia. Addressing such contestation the current study uses …
[图书][B] Hacked: A radical approach to hacker culture and crime
KF Steinmetz - 2016 - books.google.com
Inside the life of a hacker and cybercrime culture. Public discourse, from pop culture to
political rhetoric, portrays hackers as deceptive, digital villains. But what do we actually know …
political rhetoric, portrays hackers as deceptive, digital villains. But what do we actually know …
[图书][B] Resisting intellectual property
DJ Halbert - 2006 - taylorfrancis.com
Over the past decade, the scope of copyright and patent law has grown significantly,
strengthening property rights, even when such rights seem to infringe upon other, more …
strengthening property rights, even when such rights seem to infringe upon other, more …