Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to pursue a hacking career but also with performance in either naïve or expert populations. Here, we test the hypotheses that two traits that are typically enhanced in autism spectrum disorders—attention to detail and systemizing—may be positively related to both the choice of pursuing a career in information security and skilled performance in a prototypical hacking task (i.e., crypto-analysis or code-breaking). A group of naïve participants and of ethical hackers completed the Autism Spectru...
The study is an examination of hacking, placing the act in the context of theories of technological...
The current study combined the hacker taxonomies presented by Loper (2000), Parker (1998), Rege-Patw...
A survey of IT professionals suggested that despite technological advancement and organizational pro...
Currently, very limited research is available to help researchers and firms understand the behavior ...
Hackers pose a continuous and unrelenting threat to organizations. Industry and academic researchers...
This paper investigates the psychological traits of individuals’ attraction to engaging in hacking b...
Underground hacking has evolved from its early countercultural roots to become a complex and varied ...
International law enforcement agencies have reported an apparent preponderance of autistic individua...
We investigated the role automated behavior plays in contributing to security breaches. Using diffe...
Information security has for long time been a field of study in computer science, software engineeri...
Information security has for long time been a field of study in computer science, software engineeri...
In this work, we aim to better understand outsider perspectives of the hacker community through a se...
Hacking is an ethically and legally ambiguous area, often associated with cybercrime and cyberattack...
The damage caused by illegal hacking has become one of the serious problems facing society. Based on...
Recently, it seems as if hacking-related stories can be found in the news every day. To study, and h...
The study is an examination of hacking, placing the act in the context of theories of technological...
The current study combined the hacker taxonomies presented by Loper (2000), Parker (1998), Rege-Patw...
A survey of IT professionals suggested that despite technological advancement and organizational pro...
Currently, very limited research is available to help researchers and firms understand the behavior ...
Hackers pose a continuous and unrelenting threat to organizations. Industry and academic researchers...
This paper investigates the psychological traits of individuals’ attraction to engaging in hacking b...
Underground hacking has evolved from its early countercultural roots to become a complex and varied ...
International law enforcement agencies have reported an apparent preponderance of autistic individua...
We investigated the role automated behavior plays in contributing to security breaches. Using diffe...
Information security has for long time been a field of study in computer science, software engineeri...
Information security has for long time been a field of study in computer science, software engineeri...
In this work, we aim to better understand outsider perspectives of the hacker community through a se...
Hacking is an ethically and legally ambiguous area, often associated with cybercrime and cyberattack...
The damage caused by illegal hacking has become one of the serious problems facing society. Based on...
Recently, it seems as if hacking-related stories can be found in the news every day. To study, and h...
The study is an examination of hacking, placing the act in the context of theories of technological...
The current study combined the hacker taxonomies presented by Loper (2000), Parker (1998), Rege-Patw...
A survey of IT professionals suggested that despite technological advancement and organizational pro...