Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Hacking human: data-archaeology and surveillance in social networks

Hacking human: data-archaeology and surveillance in social networks In this paper, we describe the techniques, methods and context for hacking humans using publicly available information found on the Internet. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM SIGOIS Bulletin Association for Computing Machinery

Hacking human: data-archaeology and surveillance in social networks

ACM SIGOIS Bulletin , Volume 25 (2) – Feb 1, 2005

Loading next page...
 
/lp/association-for-computing-machinery/hacking-human-data-archaeology-and-surveillance-in-social-networks-fziWG5wecq

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Association for Computing Machinery
Copyright
Copyright © 2005 by ACM Inc.
ISSN
0894-0819
DOI
10.1145/1067721.1067728
Publisher site
See Article on Publisher Site

Abstract

In this paper, we describe the techniques, methods and context for hacking humans using publicly available information found on the Internet.

Journal

ACM SIGOIS BulletinAssociation for Computing Machinery

Published: Feb 1, 2005

There are no references for this article.