Piracy hurts [computer hacking and piracy]

Author(s):  
L. Withall
Keyword(s):  
2020 ◽  
pp. 001112872098189
Author(s):  
Thomas J. Holt ◽  
Kevin F. Steinmetz

Criminological inquiry consistently identifies a gender difference in offending rates, which are also evident among certain forms of cybercrime. The gender difference in cybercrime offending is particularly large within computer hacking, though few have specifically addressed this issue through applications of criminological theory. The current study attempted to account for the gender disparity in hacking through a test of power-control theory, which considers the role of class and family structure. This analysis also incorporated an extension of power-control theory through the influence of low self-control. Using data from the Second International Self-Report of Delinquency study (ISRD-2), logistic regression analyses were estimated, producing partial support for both theories to account for hacking. Implications for theory and research were explored in detail.


2021 ◽  
pp. 104398622110016
Author(s):  
Adam M. Bossler

The threat of formal sanctions is the criminal justice system’s primary tool to discourage online and offline deviant behavior. Yet, scholars have expressed strong concerns about the effectiveness of formal sanctions to deter cybercrime. Even more surprising is the sparsity of deterrence research in the cybercrime literature. This study examined the effects of perceived formal and informal sanctions on digital piracy, computer hacking, and online harassment in a large American college sample. Perceived formal sanctions was negatively correlated with software piracy, media piracy, password cracking, accessing accounts, sending mean messages privately online, and posting mean messages. Higher levels of perceived formal sanctions did not significantly predict any form of cybercrime, however, when controlling for informal sanctions and deviant peer associations. The implications of the findings for our ability to deter deviant behavior in cyberspace are explored.


2009 ◽  
pp. 239-247
Author(s):  
Kevin Curran ◽  
Peter Breslin ◽  
Kevin McLaughlin ◽  
Gary Tracey
Keyword(s):  

Adaptation ◽  
2020 ◽  
Author(s):  
Reto Winckler

Abstract This essay proposes that computer hacking can provide us with an appropriate framework through which to rethink the basic workings of adaptation in general and Shakespeare adaptation in particular in the twenty-first century. Building on the work of Thomas Leitch and Sarah Cardwell in adaptation studies and Christopher Kelty in the anthropology of the hacker movement, the essay positions itself as an alternative to Douglas Lanier’s model of the Shakespeare rhizome. The central argument is that understanding Shakespeare’s works as source code, and adaptations of them as hacks of that source code, as well as sources of future hacks, makes it possible to account for and work with the difficult but crucial notions of the source and of fidelity, while resolving many of the theoretical, practical, and political problems which motivated scholars to avoid or try to overcome those notions in the past.


Author(s):  
Ian J. Lloyd

This chapter examines the provisions of the Council of Europe’s Convention on Cybercrime to determine the major headings under which computer-related conduct might be prosecuted and to analyse the effectiveness of UK legislation in the field. The focus is on offences against the confidentiality, integrity, and availability of computer data and systems, which essentially refers to computer hacking and to attempts to impair the operation of computer systems through interception of communications, the promulgation of viruses, or the launching of denial of service attacks.


Author(s):  
Kenneth B. McAlpine

This chapter charts the birth and growth of the demoscene, an online community of digital artists and musicians who create and share real-time procedural artworks. Part of the digital underground, the ethos was, and remains, one of pushing systems to their limits and so became a natural home for chiptune. The chapter begins by exploring the roots of the demoscene in the computer hacking scene of 1970s California, a community who believed strongly that computer software should be free. As software protection systems were introduced to prevent unauthorized copying, highly skilled ‘crackers’ removed them, highlighting their achievements with elaborate audiovisual digital graffiti. Over time, competition to create the most extravagant artwork and music became an end in itself, creating the demoscene. Today, this vibrant community thrives and has become bigger and slicker than ever, although, as some interviewees suggest, in so doing it may have lost some of its countercultural charm.


2002 ◽  
Vol 10 (1) ◽  
pp. 5-11
Author(s):  
Martin Botha ◽  
Rossouw von Solms

A survey recently completed by the Computer Security Institute (CSI) and the Federal Bureau of Investigation (FBI) revealed that corporations, banks, and governments all face a growing threat from computer crime, and in particular computer hacking. Computer hacking activities caused well over US$100 million in losses last year in the USA and the trend toward professional computer crime, such as computer hacking, is on the rise. Different methods are currently used to control the computer crime problem, for example, by controling access to and from a network by implementing a firewall. As the survey highlighted, most of these methods are insufficient. New means and ways which will minimise and control the hacking problem must therefore continuously be researched and defined. Proposes a method, using trend analysis, that could be utilized to minimise and control the hacking problem in an organisation.


Sign in / Sign up

Export Citation Format

Share Document