Computer Hackers and Hacking

2017 ◽  
pp. 67-125
Author(s):  
Thomas J. Holt ◽  
Adam M. Bossler ◽  
Kathryn C. Seigfried-Spellar
Keyword(s):  
1988 ◽  
Vol 7 (5) ◽  
pp. 526
Author(s):  
John Markoff ◽  
Andrew Pollack
Keyword(s):  

2003 ◽  
Vol 6 (2) ◽  
pp. 171-180 ◽  
Author(s):  
Alexander E. Voiskounsky ◽  
Olga V. Smyslova
Keyword(s):  

2011 ◽  
pp. 1286-1297
Author(s):  
Malcolm Shore

This chapter is about the way in which computer hackers invoke social networking paradigms to support and encourage their activities. It reviews the evolution of hacking as a form of social networking, from its roots in Bulletin Board systems to the current attacks on Second Life, and considers the motivation for hacking. Ajzen’s Theory of Planned Behavior and Beveren’s Flow Theory model are, when considered together, found to explain many of the observed characteristics of early hacker activity. The place of social networks in motivating hacking is explored, and some observations are made in relation to hacking and the Second Life environment. A number of control variables are identified which can be used to reduce the likelihood of people engaging in the hacking activity. Addressing the social network factors which motivate hacking provides an important early step in addressing cybercrime.


2009 ◽  
pp. 190-213
Author(s):  
Bernadette H. Schell ◽  
Thomas J. Holt

This chapter looks at the literature—myths and realities—surrounding the demographics, psychological predispositions, and social/behavioral patterns of computer hackers, to better understand the harms that can be caused to targeted persons and property by online breaches. The authors suggest that a number of prevailing theories regarding those in the computer underground (CU)—such as those espoused by the psychosexual theorists—may be less accurate than theories based on gender role socialization, given recent empirical studies designed to better understand those in the CU and why they engage in hacking and cracking activities. The authors conclude the chapter by maintaining that online breaches and online concerns regarding privacy, security, and trust will require much more complex solutions than currently exist, and that teams of experts in psychology, criminology, law, and information technology security need to collaborate to bring about more effective real-world solutions for the virtual world.


Author(s):  
Malcolm Shore

This chapter is about the way in which computer hackers invoke social networking paradigms to support and encourage their activities. It reviews the evolution of hacking as a form of social networking, from its roots in Bulletin Board systems to the current attacks on Second Life, and considers the motivation for hacking. Ajzen’s Theory of Planned Behavior and Beveren’s Flow Theory model are, when considered together, found to explain many of the observed characteristics of early hacker activity. The place of social networks in motivating hacking is explored, and some observations are made in relation to hacking and the Second Life environment. A number of control variables are identified which can be used to reduce the likelihood of people engaging in the hacking activity. Addressing the social network factors which motivate hacking provides an important early step in addressing cybercrime.


Author(s):  
Gary Westfahl

This chapter examines three William Gibson novels: Virtual Light, Idoru, and All Tomorrow's Parties. Virtual Light confirms Gibson's desire to break with the past and move in new directions. More specifically, Gibson wanted readers to enter and appreciate a different sort of Gibsonian world. Accordingly, Virtual Light was set in 2005, only twelve years after its publication, and its imagined new technologies were not far removed from actual technologies of the early 1990s. While computer hackers eventually play a small role in the story, there is only one fleeting glimpse of a virtual realm recalling cyberspace, and the two protagonists have almost no interactions with computers. While Gibson remained interested in futuristic science, this novel devotes more attention to speculative sociology. Idoru examines the mechanisms that promote celebrities and keep them in the public eye. It seems to repudiate Virtual Light, whereas All Tomorrow's Parties seems to repudiate Idoru.


2013 ◽  
Vol 56 (4) ◽  
pp. 64-74 ◽  
Author(s):  
Zhengchuan Xu ◽  
Qing Hu ◽  
Chenghong Zhang
Keyword(s):  

2017 ◽  
Vol 62 (4) ◽  
pp. 386-394 ◽  
Author(s):  
Ryan Francis O. Cayubit ◽  
Kevin M. Rebolledo ◽  
Romulo Gabriel A. Kintanar ◽  
Angelissa G. Pastores ◽  
Alen Josef A. Santiago ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document