Deciphering the Hacker Underground

Author(s):  
Michael Bachmann

The increasing dependence of modern societies, industries, and individuals on information technology and computer networks renders them ever more vulnerable to attacks on critical IT infrastructures. While the societal threat posed by malicious hackers and other types of cyber criminals has been growing significantly in the last decade, mainstream criminology has only recently begun to realize the significance of this threat. Cyber criminology is slowly emerging as a subfield of criminological study and has yet to overcome many of the problems other areas of criminological research have already mastered. Aside from substantial methodological and theoretical problems, cyber criminology currently also suffers from the scarcity of available data. As a result, scientific answers to crucial questions remain. Questions like: Who exactly are these network attackers? Why do they engage in malicious hacking activities? This chapter begins to fill this gap in the literature by examining survey data about malicious hackers, their involvement in hacking, their motivations to hack, and their hacking careers. The data for this study was collected during a large hacking convention in Washington, D.C, in February 2008. The study findings suggest that a significant motivational shift takes place over the trajectory of hackers’ careers, and that the creation of more effective countermeasures requires adjustments to our current understanding of who hackers are and why they hack.

Cyber Crime ◽  
2013 ◽  
pp. 175-194
Author(s):  
Michael Bachmann

The increasing dependence of modern societies, industries, and individuals on information technology and computer networks renders them ever more vulnerable to attacks on critical IT infrastructures. While the societal threat posed by malicious hackers and other types of cyber criminals has been growing significantly in the last decade, mainstream criminology has only recently begun to realize the significance of this threat. Cyber criminology is slowly emerging as a subfield of criminological study and has yet to overcome many of the problems other areas of criminological research have already mastered. Aside from substantial methodological and theoretical problems, cyber criminology currently also suffers from the scarcity of available data. As a result, scientific answers to crucial questions remain. Questions like: Who exactly are these network attackers? Why do they engage in malicious hacking activities? This chapter begins to fill this gap in the literature by examining survey data about malicious hackers, their involvement in hacking, their motivations to hack, and their hacking careers. The data for this study was collected during a large hacking convention in Washington, D.C, in February 2008. The study findings suggest that a significant motivational shift takes place over the trajectory of hackers’ careers, and that the creation of more effective countermeasures requires adjustments to our current understanding of who hackers are and why they hack.


2020 ◽  
pp. 53-60
Author(s):  
Mohammed I. Alghamdi ◽  

Our economy, infrastructure and societies rely to a large extent on information technology and computer networks solutions. Increasing dependency on information technologies has also multiplied the potential hazards of cyber-attacks. The prime goal of this study is to critically examine how the sufficient knowledge of cyber security threats plays a vital role in detection of any intrusion in simple networks and preventing the attacks. The study has evaluated various literatures and peer reviewed articles to examine the findings obtained by consolidating the outcomes of different studies and present the final findings into a simplified solution.


Author(s):  
Ж. Л. Козіна ◽  
О. Пугунец

In the article the basic directions of modern information technology to provide visibility through the creation and application not only static, but also dynamic circuits. We describe the use of modern means of computer printing technology to create visual aids, and - the method of creation of animated charts.


2021 ◽  
Vol 12 (2) ◽  
pp. 458-462
Author(s):  
Boris Georgiev ◽  

This report is dedicated to the creation and implementation of a curriculum based on the STEM methodology. The subject #AlgoRhythm combines three areas (natural sciences, music and information technology) in order to increase creativity, motivation to learn and encourage the imagination of students.


Author(s):  
Sajad Rezaei ◽  
Maryam Emmi

The Internet and Apps related technologies are considered as information “super highway” since they are able to connect people, computers, and data to one another. Because of them, a new communication medium has risen, which provides an access to the large flow of information across various broad extensions. As a consequence, there has been a need for understanding the behaviors of online consumers, since Information Technology and its usage have had a massive impact on shopping behaviors as well as the rate of market success. This chapter's aim will be to sanitize the current understanding of Apps/online consumer behavior to shape Apps marketing strategies and implementations.


Author(s):  
James J. Hoffman ◽  
Eric Walden ◽  
Mark L. Hoelscher

The current chapter explores the role that one factor, social capital, may have on the success of IT outsourcing. It extends current understanding of outsourcing success and failure by examining the effect of social capital on outsourcing success. The chapter proposes that social capital has potential impact on information technology (IT) outsourcing success. Specifically, it is theorized that social capital has an inverted “U” shape relationship with outsourcing success.


Zootaxa ◽  
2010 ◽  
Vol 2489 (1) ◽  
pp. 47 ◽  
Author(s):  
DAVID B. NORMAN

This short review discusses current understanding of the history, anatomy and taxonomy of the lower Wealden Groupaged (Valanginian ~141–137Ma) iguanodontian dinosaurs from southern England. English Wealden iguanodontian taxonomy has been the subject of comment and scrutiny since the latter half of the 19 th century. As proposed over two decades ago, iguanodontians recovered from quarries across this geographic region can be subdivided into anatomically and chronologically distinct assemblages. A review of the lower Wealden Group (Valanginian) assemblage (formerly understood to comprise the relatively poorly known and understood taxa Iguanodon dawsoni, Iguanodon fittoni and Iguanodon hollingtoniensis) establishes the presence of two diagnosable taxa: Barilium dawsoni (Lydekker, 1888) comb. nov. and Hypselospinus fittoni (Lydekker, 1889) comb. nov. The upper Wealden Group (Hauterivian–Lower Aptian) assemblage comprises Iguanodon bernissartensis and Mantellisaurus atherfieldensis. Recent suggestions concerning the creation of additional new Wealden Group taxa reflect systemic misunderstandings of the actual skeletal material. A detailed taxonomic review of all Wealden Group iguanodontians is in preparation.


Author(s):  
Maskur .

The development of popular culture, particularly, in the development of information technology such as as television, mobile phones, and the Internet, have an impact on the creation of a new reality called hyper-reality. Media, in this case, is able to reconstruct a new reality through the sophisticated technology. The construction of this medium also penetrates the religious area. This can be seen in the figure of Abdullah Gymnastiar (Aa Gym). Through the medium of information, Aa Gym is not only seen as a religious teacher who offers a depth of spirituality but also as a celebrity through the image formed. This paper aims to identify and describe the phenomenon of celebrity cleric/ ustadz Abdullah Gymnastiar in popular culture, using hyper-semiotics approach of Yasraf Amir Piliang. This paper attempts to explain the new reality of diversity of Abdullah Gymnastiar. Through the hyper-semiotics approach, religious hyper-reality form can be described scientifically.


Sign in / Sign up

Export Citation Format

Share Document