Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
30
result(s) for
"Hacking Economic aspects."
Sort by:
A hacker's mind : how the powerful bend society's rules, and how to bend them back
by
Schneier, Bruce, 1963- author
in
Hacking Social aspects.
,
Hacking Political aspects.
,
Hacking Economic aspects.
2023
It's not just computers--hacking is everywhere. Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker's mindset can change how you think about your life and the world.
“Hacking marketing”: how do firms develop marketers' expertise and practices in a digital era?
2023
PurposeDigital technologies, digitalised consumers and the torrent of customer data have been transforming marketing practice. In discussing such trends, existing research has either focussed on the skills marketers need or broad-based approaches such as agile methods but has given less consideration to just how such skills or approaches might be developed and used in marketers' day-to-day activities and in the organisation of marketing in the firm. This is what the authors address in this paper.Design/methodology/approachThis paper adopts an in-depth case study approach to examine an exemplary digital enterprise in transformation of their digital marketing. The insights were gathered from 25 interviews, netnography and document analysis of the case organisation in addition to 10 interviews with independent experts.FindingsDrawing on practice-oriented approach, the authors show how organisations respond to the emerging trends of digital consumers and big data by taking a ‘hacking marketing’ approach and developing novel marketing expertise at disciplinary boundaries. The authors put forward three sets of practices that enable and shape the hacking marketing approach. These include spanning the expertise boundary, making value measurable and experimenting through which their adaptive, iterative and multidisciplinary work occurs. This explains how managing digital consumers and big data is not within the realm of information technology (IT) functions but marketing and how marketing professionals are changing their practice and moving their disciplinary boundaries.Practical implicationsThis study offers practical contributions for firms in terms of identifying new work practices and expertise that marketing specialists need in managing digital platforms, digitalised consumers and big data. This study’s results show that enterprises need to design and implement strong training programmes to prepare their marketing workforce in adopting experimentations of agile approach and data-driven decision making. In addition, Marketing education should be changed so that programmes consider a review of their courses and include the novel marketing models and approaches into their curriculum.Originality/valueThis study contributes to the nascent discussions by unpacking how enterprises can develop new marketing expertise and practices beyond skillsets and how such practices form new hacking marketing approach which addresses the problem of the inability of the conventional marketing approach to show its value within the firm.
Journal Article
Can Cryptocurrency Be a Payment Method in a Developing Economy?: The Case of Bitcoin in South Africa
2023
This study sought to understand the factors driving the consumer adoption of a cryptocurrency, in particular Bitcoin, as an electronic payment (e-payment) system for electronic commerce (e-commerce) transactions within a developing economy such as South Africa. The advent of e-commerce has led to increased online transactions facilitated by e-payment systems, which can fall prey to opportunistic hackers. Cryptocurrencies have been pegged as a solution to this security issue. However, little is currently known around consumer propensity to use a cryptocurrency as an e-payment option, particularly within a developing economy. The investigated factors that could influence user adoption were based on literature and tested on a South African representative sample of 814 respondents. Of the factors identified from literature, the study found that “perceived usefulness and perceived ease of use,” “self-efficacy,” “awareness,” “trust,” and “security” have the most significant influence on South African consumers adopting a cryptocurrency as an e-payment system.
Journal Article
Perceptions and Analysis of Digital Risks
by
Liquete, Vincent
,
Capelle, Camille
in
Computer security
,
COMPUTERS
,
Digital media-Social aspects
2021,2022
The concept of digital risk, which has become ubiquitous in the media, sustains a number of myths and beliefs about the digital world. This book explores the opposite view of these ideologies by focusing on digital risks as perceived by actors in their respective contexts.
Perceptions and Analysis of Digital Risks identifies the different types of risks that concern actors and actually impact their daily lives, within education or various socio-professional environments. It provides an analysis of the strategies used by the latter to deal with these risks as they conduct their activities; thus making it possible to characterize the digital cultures and, more broadly, the informational cultures at work.
This book offers many avenues for action in terms of educating the younger generations, training teachers and leaders, and mediating risks.
Low-fidelity policy design, within-design feedback, and the Universal Credit case
2024
Policy design approaches currently pay insufficient attention to feedback that occurs during the design process. Addressing this endogenous policy design feedback gap is pressing as policymakers can adopt ‘low-fidelity’ design approaches featuring compressed and iterative feedback-rich design cycles. We argue that within-design feedback can be oriented to the components of policy designs (instruments and objectives) and serve to reinforce or undermine them during the design process. We develop four types of low-fidelity design contingent upon the quality of feedback available to designers and their ability to integrate it into policy design processes: confident iteration and stress testing, advocacy and hacking, tinkering and shots in the dark, or coping. We illustrate the utility of the approach and variation in the types, use, and impacts of within-design feedback and low-fidelity policy design through an examination of the UK’s Universal Credit policy.
Journal Article
Hacked
2016
Inside the life of a hacker and cybercrime culture.
Public discourse, from pop culture to political rhetoric, portrays hackers as deceptive, digital villains. But what do we actually know about them?
InHacked, Kevin F. Steinmetz explores what it means to be a hacker and the nuances of hacker culture. Through extensive interviews with hackers, observations of hacker communities, and analyses of hacker cultural products, Steinmetz demystifies the figure of the hacker and situates the practice of hacking within the larger political and economic structures of capitalism, crime, and control.This captivating book challenges many of the common narratives of hackers, suggesting that not all forms of hacking are criminal and, contrary to popular opinion, the broader hacker community actually plays a vital role in our information economy.Hackedthus explores how governments, corporations, and other institutions attempt to manage hacker culture through the creation of ideologies and laws that protect powerful economic interests. Not content to simply critique the situation, Steinmetz ends his work by providing actionable policy recommendations that aim to redirect the focus from the individual to corporations, governments, and broader social issues.A compelling study,Hackedhelps us understand not just the figure of the hacker, but also digital crime and social control in our high-tech society.
If It's Smart, It's Vulnerable
Reimagine the future of the internet All our devices and gadgets-from our refrigerators to our home security systems, vacuum cleaners, and stereos-are going online, just like our computers did. But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? In If It's Smart, It's Vulnerable, veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best-and worst-things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing. In this book, the author explores the transformative potential of the future of the internet, as well as those things that threaten its continued existence: government surveillance, censorship, organized crime, and more. Readers will also find: Insightful discussions of how law enforcement and intelligence agencies operate on the internet Fulsome treatments of how money became data and the impact of the widespread use of mobile supercomputing technology Explorations of how the internet has changed the world, for better and for worse Engaging stories from Mikko's 30-year career in infosecPerfect for anyone seeking a thought-provoking presentation of some of the most pressing issues in cybersecurity and technology, If It's Smart, It's Vulnerable will also earn a place in the libraries of anyone interested in the future of the internet.
Understanding bitcoin : cryptography, engineering and economics
2015,2014
Discover Bitcoin, the cryptocurrency that has the finance world buzzing
Bitcoin is arguably one of the biggest developments in finance since the advent of fiat currency. With Understanding Bitcoin, expert author Pedro Franco provides finance professionals with a complete technical guide and resource to the cryptography, engineering and economic development of Bitcoin and other cryptocurrencies. This comprehensive, yet accessible work fully explores the supporting economic realities and technological advances of Bitcoin, and presents positive and negative arguments from various economic schools regarding its continued viability.
This authoritative text provides a step-by-step description of how Bitcoin works, starting with public key cryptography and moving on to explain transaction processing, the blockchain and mining technologies. This vital resource reviews Bitcoin from the broader perspective of digital currencies and explores historical attempts at cryptographic currencies. Bitcoin is, after all, not just a digital currency; it's a modern approach to the secure transfer of value using cryptography. This book is a detailed guide to what it is, how it works, and how it just may jumpstart a change in the way digital value changes hands.
* Understand how Bitcoin works, and the technology behind it
* Delve into the economics of Bitcoin, and its impact on the financial industry
* Discover alt-coins and other available cryptocurrencies
* Explore the ideas behind Bitcoin 2.0 technologies
* Learn transaction protocols, micropayment channels, atomic cross-chain trading, and more
Bitcoin challenges the basic assumption under which the current financial system rests: that currencies are issued by central governments, and their supply is managed by central banks. To fully understand this revolutionary technology, Understanding Bitcoin is a uniquely complete, reader-friendly guide.
Markets for Cybercrime Tools and Stolen Data
by
Ablon, Lillian
,
Golay, Andrea A
,
Libicki, Martin C
in
Black market
,
Computer crimes
,
Computer crimes-Economic aspects
2014
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence.
Technological Turf Wars
2009,2008
InTechnological Turf Wars, Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, technology and society. Illustrating how computer security is as concerned with social relationships as it is with technology, Johnston provides an illuminating ethnography that considers corporate culture and the workplace environment of the antivirus industry.
Using a qualitative, interdisciplinary approach, which combines organizational and security studies with critical and social analysis of science and technology, Johnston questions the motivations, contradictions and negotiations of antivirus professionals. She examines the tensions between the service ethics and profit motives-does the industry release viruses to generate demand for antivirus software?-and considers the dynamics within companies by looking at facets such as gender bias and power politics.Technological Turf Warsis an informed, enlightened and entertaining view of how the production of computer security technology is fraught with social issues.