Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Hackers

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 15 of 15

Full-Text Articles in Social and Behavioral Sciences

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Role Of Total Quality Management (Tqm) In Increasing Information Security Within Jordanian E-Libraries, Mohammad Niqresh, Omar Mohammad Al-Jaradat Aug 2021

Role Of Total Quality Management (Tqm) In Increasing Information Security Within Jordanian E-Libraries, Mohammad Niqresh, Omar Mohammad Al-Jaradat

Library Philosophy and Practice (e-journal)

Current study aimed at examining the role of TQM pillars (Product, Process, Organization, Leadership and Commitment) in increasing information security within Jordanian e-libraries. Quantitative approach was adopted through distributing an online questionnaire on (113) individuals working within libraries in Jordan that has an uploaded website online and present some of it services online for clients. Results of study indicated that all TQM pillars have an influence on information security in libraries, the most influential variables appeared to be commitment and process which could be highlighted in the libraries efforts to commit to security standards and secure log ins of members, …


[Review Of] Colin Milburn, Respawn: Gamers, Hackers, And Technogenic Life, Durham, Nc: Duke University Press, 2018, 301 Pp., William T. Howe Jan 2020

[Review Of] Colin Milburn, Respawn: Gamers, Hackers, And Technogenic Life, Durham, Nc: Duke University Press, 2018, 301 Pp., William T. Howe

Communication Faculty Publications

No abstract provided.


Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove Jan 2020

Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove

Walden Dissertations and Doctoral Studies

Cybercriminal activity performed widely through social engineering attacks is estimated to be one of the substantial challenges the world will face over the next 20 years. Cybercriminal activity is important to chief information security officers (CISOs) because these attacks represent the largest transfer of economic wealth in history and pose risks to the incentives for organizational innovation and investment and eventually become more profitable than the global trade of all major illegal drugs combined. Grounded in the balanced control theory, the purpose of this multiple case study was to explore strategies CISOs use to mitigate social engineering attacks within their …


Can We Learn From Hackers To Protect Victims?, Nicholas Marshall Chavez Jun 2018

Can We Learn From Hackers To Protect Victims?, Nicholas Marshall Chavez

Electronic Theses, Projects, and Dissertations

This project examines the protection methods suggested by hackers to guard against online victimization through the lens of Situation Crime Prevention. Data were collected from 85 webpages representing three categories of electronic communications: forums, blogs, and fan pages. The goal of this project was to identify which of the 25 opportunity reduction techniques the hacking community recommend most often, as well as, what level of expertise was associated with the suggested security measures. Results indicate that the technique most recommended by the hacking community was to remove targets with 27% of the total codings. From the results three themes were …


The Restrictive Deterrent Effect Of Warning Banners In A Compromised Computer System, Christian Jordan-Michael Howell Jun 2016

The Restrictive Deterrent Effect Of Warning Banners In A Compromised Computer System, Christian Jordan-Michael Howell

USF Tampa Graduate Theses and Dissertations

System trespassing, which refers to the unauthorized access of computer systems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system trespassing little attention. The current study utilizes data gathered from a Chinese computer network to examine system trespasser behavior after exposure to one of three warning messages: an altruistic message used for moral persuasion (warning 1), a legal sanction threat (warning 2), and an ambiguous threat (warning 3). More specifically, the current study examines the temporal order of various keystroke commands to determine if some keystroke commands are used as a tactical skill to avoid …


The Rise Of China's Hacking Culture: Defining Chinese Hackers, William Howlett Iv Jun 2016

The Rise Of China's Hacking Culture: Defining Chinese Hackers, William Howlett Iv

Electronic Theses, Projects, and Dissertations

China has been home to some of the most prominent hackers and hacker groups of the global community throughout the last decade. In the last ten years, countless attacks globally have been linked to the People’s Republic of China (PRC) or those operating within the PRC. This exploration attempts to investigate the story, ideology, institutions, actions, and motivations of the Chinese hackers collectively, as sub-groups, and as individuals. I will do this using sources ranging from basic news coverage, interviews with experts and industry veterans, secondary reportage, leaked documents from government and private sources, government white papers, legal codes, blogs …


Law Enforcements’ Perceptions And Preparedness To Address Child Exploitation Via Hacking, Jack W. Lightfoot Jan 2016

Law Enforcements’ Perceptions And Preparedness To Address Child Exploitation Via Hacking, Jack W. Lightfoot

Electronic Theses and Dissertations

Throughout recorded history, children have been subjected to sexual exploitation. Child predators and pedophiles often take great risk and go to extreme lengths to sexually exploit a child. With technological advancements many individuals became globalized and connected with the invention of the computer, the internet and its attributes. However, child predators quickly took note of the vulnerability of children as they begin to groom them online. The problem quickly evolved as the Deep (Dark) Web and encryption were created. This put great stress upon law enforcement entities as locating and combating these predators became exhausting tasks. It’s most often that …


When Is Hacking Ethical?, Sharif Rezazadehsaber Jan 2015

When Is Hacking Ethical?, Sharif Rezazadehsaber

Legacy Theses & Dissertations (2009 - 2024)

This thesis examines situations in which computer hacking might be considered ethical. It addresses fundamental questions regarding the motivation and consequences of ethical hacking. The paper is organized into three sections. The first section discusses the history of hackers, classifies them according to their motivational background. The second part of the paper comprehensively describes the features of the ethical or “white hat” hacker group, and explores the positive and negative behaviors of ethical hackers in relation to their ethical principles. In the final section of the paper, I discuss hacktivist groups, their unique ideologies, and the risks they face, including …


The Internet, Anonymous, And Our Public Identities Recreating Democracy, Leslie Anne Hutchinson Jan 2013

The Internet, Anonymous, And Our Public Identities Recreating Democracy, Leslie Anne Hutchinson

Theses Digitization Project

This study discusses the pursuit of understanding how the discursive construction of the internet affects individuals, identities, and democracy. it also discusses the internet within theoretical positions on its history, the public sphere, and revolutionary politics. Western governments have created legislation regulating the internet for democratic purposes, and this study examines how different and often contrasting views of democracy have shaped the way those of us connected to the internet can speak about it. The Anonymous identity, articulates one such contrast. Anonymous constructs an alternative, Internet identity-one stemming from the identity of the hacker. Policies targeted at stopping hackers and …


Introduction: New Media And The Reconfiguration Of Power In Global Politics, Athina Karatzogianni Dr Dec 2008

Introduction: New Media And The Reconfiguration Of Power In Global Politics, Athina Karatzogianni Dr

Athina Karatzogianni

Whatever the developments and transformations in the sphere of global politics, the new media technologies and the political opportunities they present are unsettling the world system, the are rendering it chaotic and they are having a deeper systemic effect than the more powerful actors care to admit. It remains to be seen whether information age ideologies, new modes of capitalism, conflict, activism, terrorism and war in cyberspace will ever transfer to the ‘real world’ reversing the opposite trend, and causing everyday effects on a bigger scale than we are witnessing today. Even so, we are undoubtedly living in interesting times …


Operationalizing Offensive Social Engineering For The Air Force, Bryan E. Skarda Mar 2008

Operationalizing Offensive Social Engineering For The Air Force, Bryan E. Skarda

Theses and Dissertations

Social engineering is the art and science of persuading individuals to bypass in place security mechanisms causing the unintended release of information. It is a low tech solution to a high tech problem and is as much an art as a science. As is true of many such solutions, social engineering is both ill-defined yet extremely effective. Its low cost, high payoff nature makes it an extremely attractive alternative to adversaries that do not have access to all the resources of a nation state. However, with full backing, the weapon can become that much more effective. Social engineering is something …


What Makes Them Click? Applying The Rational Choice Perspective To The Hacking Underground, Michael Bachmann Jan 2008

What Makes Them Click? Applying The Rational Choice Perspective To The Hacking Underground, Michael Bachmann

Electronic Theses and Dissertations

The increasing dependence of modern societies, industries, and individuals on information technology and computer networks renders them ever more vulnerable to attacks on critical IT infrastructures. While the societal threat posed by hackers and other types of cyber-criminals has been growing significantly in the last decade, main-stream criminology has only recently begun to realize the significance of this threat. Cyber-criminology is slowly emerging as a subfield of criminological study and has yet to overcome many of the problems other areas of criminological research have already mastered. Aside from substantial methodological and theoretical problems, cyber-criminology currently also suffers from the scarcity …


Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam Jan 2007

Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam

Journal of Digital Forensics, Security and Law

Rapid development of information technology (IT) has brought with it many new applications such as e-commerce and global business. The past few years have seen activities in the legislative arena covering issues such as digital signatures, the international recognition of electronic documents and privacy and data protection. Both the developed and developing countries have exhibited keenness to embrace the IT environment. Securing this electronic environment from intrusion, however, continues to be problematic. A particular favorite form of computer crime would be ‘hacking’. As more computer systems move on to on-line processing and improved telecommunications, computer hackers are now a real …


The Politics Of Cyberconflict, Athina Karatzogianni Dr Dec 2005

The Politics Of Cyberconflict, Athina Karatzogianni Dr

Athina Karatzogianni

The thrust of this analysis is to disclose the extent to which the internet has affected politics and political conflict in particular (cyberconflict) and provide a theoretical framework for explaining this phenomenon. The aim of the book is to first theoretically and then empirically locate and introduce the new issues confronting global politics today, due to the impact of new communication technologies.