Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Hacking

Encyclopedia of Information Science and Technology, Fourth Edition
Describes the practices and actions by which individuals and communities’ exploit (or explore) weaknesses of a system and product, which could be technological or social, to get by. It encapsulates both transgressive or 'illegal' and resourceful or 'legal' practices that individuals undertake to circumvent or respond to technological and social challenge or circumstance.
Published in Chapter:
Exploring “Hacking,” Digital Public Art, and Implication for Contemporary Governance
Amadu Wurie Khan (University of Edinburgh, UK) and Chris Speed (University of Edinburgh, UK)
Copyright: © 2018 |Pages: 15
DOI: 10.4018/978-1-5225-2255-3.ch580
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Full Text Chapter Download: US $37.50 Add to Cart
Theoretical Context of Cybercrime
To gain unauthorized access to data in a system or computer.
Full Text Chapter Download: US $37.50 Add to Cart
Disaster and Digital Libraries in Developing Countries: Issues and Challenges
This can be simply described as a process of intruding or gaining improper, unauthorized and illegal access into a computer system.
Full Text Chapter Download: US $37.50 Add to Cart
STEM Education for Girls: Perspectives of Teachers During a Makeathon
Deconstructing or taking apart items (especially technology) to rebuild other items from the parts.
Full Text Chapter Download: US $37.50 Add to Cart
ICT Security Policy: Challenges and Potential Remedies
A method involving some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software.
Full Text Chapter Download: US $37.50 Add to Cart
Hackers, Hacking, and Eavesdropping
Hacking is commonly used today to refer to unauthorized access to a computer network. Breaking into a computer system or network is simply one of many forms of hacking.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Risk Management in Banks: Cyber Risk Insurance
Gaining unauthorized access to confidential data in a system. It is an act of infiltrating into a system bypassing the system admins.
Full Text Chapter Download: US $37.50 Add to Cart
Hyperbole or Hypothetical?: Ethics for AI in the Future of Applied Pedagogy
The gaining of illegal, unlawful, or unofficially unauthorised access to data within the context of computing and technology.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Security and Anti-Social Networking
The act of remotely accessing a computer server or network without authorization.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
An intentional disruption, defacing, or even destroying an information resources normally carried out on the internet.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Crime and Challenges of Securing Nigeria's Cyber-Space Against Criminal Attacks
Is the use of a computer or other technological device or system in order to gain unauthorized access to data held by another person or organization.
Full Text Chapter Download: US $37.50 Add to Cart
Cryptocurrency: A Detailed Study
An effort to breach a private computer system or network is called hacking.
Full Text Chapter Download: US $37.50 Add to Cart
For Better or for Worse?: Ethical Implications of Generative AI
The gaining of illegal, unlawful, or unofficially unauthorised access to data in within the context of computing and technology.
Full Text Chapter Download: US $37.50 Add to Cart
Misuse of Information Technologies and Reliability of Information in New Media during Emergencies
The use of computers to gain unauthorized access to a system/network/computer, taking control of it or rendering it useless.
Full Text Chapter Download: US $37.50 Add to Cart
Online Activism to Cybercrime
Manipulation of a technological device to acquire data unlawfully within a system.
Full Text Chapter Download: US $37.50 Add to Cart
A Routine Activity Theory-Based Framework for Combating Cybercrime
Seeking and exploiting vulnerabilities in a computer system or computer network.
Full Text Chapter Download: US $37.50 Add to Cart
Psychosocial Aspects of Cybercrime Victimization in Pakistan
To gain unauthorized access to data in a system or computer.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR