Hacking human: data-archaeology and surveillance in social networks
Hacking human: data-archaeology and surveillance in social networks
Nolan, Jason; Levesque, Michelle
2005-02-01 00:00:00
In this paper, we describe the techniques, methods and context for hacking humans using publicly available information found on the Internet.
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pngACM SIGOIS BulletinAssociation for Computing Machineryhttp://www.deepdyve.com/lp/association-for-computing-machinery/hacking-human-data-archaeology-and-surveillance-in-social-networks-fziWG5wecq
Hacking human: data-archaeology and surveillance in social networks
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.