Results 11 to 20 of about 188,146 (296)

Generative Street Addresses from Satellite Imagery

open access: yesISPRS International Journal of Geo-Information, 2018
We describe our automatic generative algorithm to create street addresses from satellite images by learning and labeling roads, regions, and address cells. Currently, 75% of the world’s roads lack adequate street addressing systems.
İlke Demir   +7 more
doaj   +1 more source

¿Qué es ser hacker?

open access: yesQuestion, 2022
Este artículo está basado en el primer capítulo de mi tesina de grado La cultura hacker como filosofía de vida en la era del capitalismo cibernético. Una aproximación al caso en Mendoza. Aquí buscamos responder a la pregunta: ¿qué es ser hacker?
Nelson Scariot Esquivel
doaj   +1 more source

Ağ Toplumunda “Ağ” Dışı Kalan Hackerların Muhalefet Biçimi: Hacker Etiği ve Özgür Yazılım

open access: yesSkad, 2020
Bu makale ile hackerlara geniş perspektiften bakıldığı takdirde etik değerleri üzerinden karşı kültürü temsil edip etmediği, muhalefet biçimi yönüyle direniş kimliğinin olup olmadığını açıklamaktır.
Nurullah Sandilaç
doaj   +1 more source

Collaboration or separation maximizing the partnership between a “Gray hat” hacker and an organization in a two-stage cybersecurity game

open access: yesInternational Journal of Information Management Data Insights, 2022
Vulnerability disclosure is a key topic in cybersecurity. It is a practice ensuring that organizations address and fix vulnerabilities before bad actors can find and exploit them. This study focuses on the “disclose or exploit” dilemma. It presents a two-
Daniel Cohen, Amir Elalouf, Raz Zeev
doaj   +1 more source

¿Qué es la cultura hacker?

open access: yesQuestion, 2022
¿Qué motiva el comportamiento de Anonymous y Hacktivistas? ¿Por qué Edward Snowden denunció los planes de vigilancia masiva de la Agencia Central de Inteligencia (CIA) y de la Agencia de Seguridad Nacional (NSA) de los Estados Unidos?
Nelson Scariot Esquivel
doaj   +1 more source

An Ethical Study of Teaching Malware Writing, Hacking Skills and System Infiltration [PDF]

open access: yesPizhūhish/hā-yi Falsafī- Kalāmī, 2018
Nowadays, the number of courses teaching hacking skills is increasing and has encountered a very warm reception. In some countries, teaching hacking and writing malware has been considered as part of course credits for students of the fields of computer ...
Zaynab Ᾱlebūyeh   +1 more
doaj   +1 more source

El estigma Hacker, entre lo bueno y lo malo

open access: yesInventum Ingeniería, Tecnología e Investigación, 2011
El presente artículo pretende aclarar el hecho que un grupo reducido de personas que ejercen una actividad, profesión u oficio, y el mismo decide actuar de forma reprochable o contraria a la ley, esto no puede ser pretexto para estigmatizar la profesión ...
Federico Iván Gacharná Gacharná
doaj   +1 more source

Performance, política y activismo digital: las intervenciones del "Colectivo Dominio Público"

open access: yesTelondefondo : Revista de Teoría y Crítica Teatral, 2017
Desde fines de 2015 en adelante, con la asunción del nuevo gobierno encabezado por el presidente Mauricio Macri, viene teniendo lugar un retorno de las políticas neoliberales en la Argentina. Esta coyuntura ha potenciado el trabajo de diversos colectivos
Maximiliano Ignacio de la Puente
doaj   +1 more source

Hackerlık Kavramı, Modeller ve Medyada Hackerlığın Sunumu

open access: yesOnline Academic Journal of Information Technology, 2020
Bu çalışmada hackerlık kavramının tarihsel süreç içinde yaşadığı değişimlerden bahsedilerek kavramın alanyazında ele alınış biçimlerinin bir modellemesi yapılmaya çalışılmıştır. Alanyazında temel olarak iki modelin yer aldığı saptanmıştır.
Serhat Çoban
doaj   +1 more source

Brainjacking. Aspekty karnoprawne

open access: yesActa Iuris Stetinensis, 2021
With the development of technology, the appearance of new threats for the security of society and individuals may be observed. Brainjacking, understood as unauthorised access to brain implants, may become one of them.
Agata Ziobroń
doaj   +1 more source

Home - About - Disclaimer - Privacy