Search

Tapping into the underground

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000nab a2200000 i 4500</leader>
    <controlfield tag="001">MAP20071507505</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20220912145301.0</controlfield>
    <controlfield tag="007">hzruuu---uuuu</controlfield>
    <controlfield tag="008">051226e20050621usa||||    | |00010|eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">82</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20080109103</subfield>
      <subfield code="a">Mollick, Ethan</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Tapping into the underground</subfield>
      <subfield code="c">Ethan Mollick</subfield>
    </datafield>
    <datafield tag="520" ind1="8" ind2=" ">
      <subfield code="a">Companies typically have antagonistic relationships with hackers, and others, who alter their products, but is there a way to work with such underground innovators? Many companies are planning systems to colaborate with those groups, following steps like exploitation, reaction, incorporation, boredom as a new strategy to protect their products</subfield>
    </datafield>
    <datafield tag="650" ind1="0" ind2="1">
      <subfield code="0">MAPA20080546991</subfield>
      <subfield code="a">Empresas</subfield>
    </datafield>
    <datafield tag="650" ind1="1" ind2="1">
      <subfield code="0">MAPA20080544119</subfield>
      <subfield code="a">Hackers</subfield>
    </datafield>
    <datafield tag="650" ind1="0" ind2="1">
      <subfield code="0">MAPA20080608460</subfield>
      <subfield code="a">Seguridad de productos</subfield>
    </datafield>
    <datafield tag="650" ind1="0" ind2="1">
      <subfield code="0">MAPA20080554866</subfield>
      <subfield code="a">Innovación</subfield>
    </datafield>
    <datafield tag="650" ind1="1" ind2="1">
      <subfield code="0">MAPA20080586546</subfield>
      <subfield code="a">Nuevas tecnologías</subfield>
    </datafield>
    <datafield tag="740" ind1="0" ind2=" ">
      <subfield code="a">Sloan management review</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20077000185</subfield>
      <subfield code="t">Sloan management review</subfield>
      <subfield code="d">Boulder</subfield>
      <subfield code="g">Vol. 46, nº 4, Summer 2005 ; p. 21-24</subfield>
    </datafield>
  </record>
</collection>