Hacking is an ethically and legally ambiguous area, often associated with cybercrime and cyberattacks. This investigation examines the human side of hacking and the merits of understanding this community. This includes group processes regarding: the identification and adoption of a social identity within hacking, and the variations this may cause in behaviour; trust within in the social identity group; the impact of breaches of trust within the community. It is believed that this research could lead to constructive developments for cybersecurity practices and individuals involved with hacking communities by identifying significant or influencing elements of the social identity and group process within these communities. For cybersecurity, t...
This dissertation examines both the subculture and social organization practices of computer hackers...
There are various challenges with online data collection, from participant recruitment to ensuring t...
© 1998 Fiona BavintonThis research explores hacking sub-culture, and tests a theory that this sub-cu...
There remains a lack of understanding on the social factors that influence the behaviours and belief...
There are various challenges with online data collection, from participant recruitment to ensuring ...
There remains a lack of understanding as to what determines the path which a young person takes when...
The study is an examination of hacking, placing the act in the context of theories of technological...
Illicit computer intruders, or hackers, are often thought of as pathological individuals rather than...
Currently, very limited research is available to help researchers and firms understand the behavior ...
In cyber-security the weakest link is often seen as the human factor. This has led to discussions ab...
In cyber-security the weakest link is often seen as the human factor. This has led to discussions ab...
In this work, we aim to better understand outsider perspectives of the hacker community through a se...
Underground hacking has evolved from its early countercultural roots to become a complex and varied ...
The hacker is the epitome of a cybersecurity threat and the embodied misuse of the Internet. However...
The hackers have been widespread throughout the IT world. The main categories of Hackers have evolve...
This dissertation examines both the subculture and social organization practices of computer hackers...
There are various challenges with online data collection, from participant recruitment to ensuring t...
© 1998 Fiona BavintonThis research explores hacking sub-culture, and tests a theory that this sub-cu...
There remains a lack of understanding on the social factors that influence the behaviours and belief...
There are various challenges with online data collection, from participant recruitment to ensuring ...
There remains a lack of understanding as to what determines the path which a young person takes when...
The study is an examination of hacking, placing the act in the context of theories of technological...
Illicit computer intruders, or hackers, are often thought of as pathological individuals rather than...
Currently, very limited research is available to help researchers and firms understand the behavior ...
In cyber-security the weakest link is often seen as the human factor. This has led to discussions ab...
In cyber-security the weakest link is often seen as the human factor. This has led to discussions ab...
In this work, we aim to better understand outsider perspectives of the hacker community through a se...
Underground hacking has evolved from its early countercultural roots to become a complex and varied ...
The hacker is the epitome of a cybersecurity threat and the embodied misuse of the Internet. However...
The hackers have been widespread throughout the IT world. The main categories of Hackers have evolve...
This dissertation examines both the subculture and social organization practices of computer hackers...
There are various challenges with online data collection, from participant recruitment to ensuring t...
© 1998 Fiona BavintonThis research explores hacking sub-culture, and tests a theory that this sub-cu...