These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
104 related articles for article (PubMed ID: 29082830)
1. Hackers against technology: Critique and recuperation in technological cycles. Maxigas Soc Stud Sci; 2017 Dec; 47(6):841-860. PubMed ID: 29082830 [TBL] [Abstract][Full Text] [Related]
2. Flow-based model of computer hackers' motivation. Voiskounsky AE; Smyslova OV Cyberpsychol Behav; 2003 Apr; 6(2):171-80. PubMed ID: 12804029 [TBL] [Abstract][Full Text] [Related]
3. It takes a pirate to know one: ethical hackers for healthcare cybersecurity. Lorenzini G; Shaw DM; Elger BS BMC Med Ethics; 2022 Dec; 23(1):131. PubMed ID: 36494715 [TBL] [Abstract][Full Text] [Related]
4. Think Like a Hacker. Khera M J Diabetes Sci Technol; 2017 Mar; 11(2):207-212. PubMed ID: 27920270 [TBL] [Abstract][Full Text] [Related]
5. Distributing responsibility in the debate on sustainable biofuels. Landeweerd L; Osseweijer P; Kinderlerer J Sci Eng Ethics; 2009 Dec; 15(4):531-43. PubMed ID: 19618295 [TBL] [Abstract][Full Text] [Related]
6. [Technological development: a weak link in vaccine innovation in Brazil]. Homma A; Martins RM; Jessouroum E; Oliva O Hist Cienc Saude Manguinhos; 2003; 10(Suppl 2):671-96. PubMed ID: 14964314 [TBL] [Abstract][Full Text] [Related]
7. [The Internet and self treatment: how to put them together?]. Castiel LD; Vasconcellos-Silva PR Hist Cienc Saude Manguinhos; 2002; 9(2):291-314. PubMed ID: 12420710 [TBL] [Abstract][Full Text] [Related]
8. Ancient science in a digital age. Lehoux D Isis; 2013 Mar; 104(1):111-8. PubMed ID: 23789512 [TBL] [Abstract][Full Text] [Related]
9. Social Media, Open Science, and Data Science Are Inextricably Linked. Voytek B Neuron; 2017 Dec; 96(6):1219-1222. PubMed ID: 29224728 [TBL] [Abstract][Full Text] [Related]
10. The charge of technology. Edgerton D Nature; 2008 Oct; 455(7216):1030-1. PubMed ID: 18948929 [TBL] [Abstract][Full Text] [Related]
11. Empowered citizen 'health hackers' who are not waiting. Omer T BMC Med; 2016 Aug; 14(1):118. PubMed ID: 27530970 [TBL] [Abstract][Full Text] [Related]
12. It may be fast but is it safe? Ways to protect your DSL system from hackers. Bergeron BP Postgrad Med; 2000 Jul; 108(1):31-2. PubMed ID: 10914118 [No Abstract] [Full Text] [Related]
13. The race to save the Internet from quantum hackers. Castelvecchi D Nature; 2022 Feb; 602(7896):198-201. PubMed ID: 35136223 [No Abstract] [Full Text] [Related]
14. Nuclear fission technology in Spain: History and social concerns. Aliende Urtasun A; Luquin A; Garrido JJ Public Underst Sci; 2017 Apr; 26(3):307-324. PubMed ID: 27436112 [TBL] [Abstract][Full Text] [Related]
15. Capitalism, money and banking: a critique of recent historical sociology. Ingham G Br J Sociol; 1999 Mar; 50(1):76-96. PubMed ID: 15266675 [TBL] [Abstract][Full Text] [Related]
16. The politics of Piketty: what political science can learn from, and contribute to, the debate on Capital in the twenty-first century. Hopkin J Br J Sociol; 2014 Dec; 65(4):678-95. PubMed ID: 25516346 [TBL] [Abstract][Full Text] [Related]
17. Academic Information Security Researchers: Hackers or Specialists? Dadkhah M; Lagzian M; Borchardt G Sci Eng Ethics; 2018 Apr; 24(2):785-790. PubMed ID: 28397172 [TBL] [Abstract][Full Text] [Related]
18. The Greatest Missions Never Flown: Anticipatory Discourse and the "Projectory" in Technological Communities. Messeri L; Vertesi J Technol Cult; 2015 Jan; 56(1):54-85. PubMed ID: 26334697 [TBL] [Abstract][Full Text] [Related]
19. An SOS on Cybersecurity To protect patient data, hospitals beef up risk management programs. Hello, chief security officers and 'white hat hackers'. Taylor M Hosp Health Netw; 2015 Feb; 89(2):36-38. PubMed ID: 30277345 [No Abstract] [Full Text] [Related]