The current study combined the hacker taxonomies presented by Loper (2000), Parker (1998), Rege-Patwardhan (2009), and Rogers (1999; 2006; personal communication) and proposed a simplified taxonomy which included: script kiddie, cyberpunk, password cracker, internal, and old guard hacker categories. Each category was identified by its characteristic computer deviant behaviors and analyzed against sex and seven motivational factors (i.e., addiction, curiosity, excitement/entertainment, money, power/status/ego, peer recognition, ideological, and revenge). The study had two specific aims: (1) to explore which motivations were associated with each specific computer deviant behavior, and (2) to determine if more males than females are engaging i...
The hacker is the epitome of a cybersecurity threat and the embodied misuse of the Internet. However...
There remains a lack of understanding as to what determines the path which a young person takes when...
This chapter introduces the ideas and practices of digital technology enthusiasts who fall under the...
Although much has been written on topic of hacker motivations, little empirical research has been co...
Currently, very limited research is available to help researchers and firms understand the behavior ...
© 1998 Fiona BavintonThis research explores hacking sub-culture, and tests a theory that this sub-cu...
With the advent of computer crime, law enforcement agencies and investigators have been required to ...
According to the Federal Bureau of Investigations, “The CSIS has defined it (cyber terror) as the us...
Presently, computer crime is rampant and costly. Combating these crimes is not only focused on the t...
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it ...
In the contemporary world, the latter interpretation is by far the more common (although persons bel...
Hackers have been present in computer networks from the moment networks began to exist. Beginning as...
A cyberattack can be defined as an action aiming to cause damages and losses to computer networks, i...
The pervasiveness of the World Wide Web (internet) with the easy flow of information means that ther...
Illegal cyber activities have been developing in past three decades with the mounting number of user...
The hacker is the epitome of a cybersecurity threat and the embodied misuse of the Internet. However...
There remains a lack of understanding as to what determines the path which a young person takes when...
This chapter introduces the ideas and practices of digital technology enthusiasts who fall under the...
Although much has been written on topic of hacker motivations, little empirical research has been co...
Currently, very limited research is available to help researchers and firms understand the behavior ...
© 1998 Fiona BavintonThis research explores hacking sub-culture, and tests a theory that this sub-cu...
With the advent of computer crime, law enforcement agencies and investigators have been required to ...
According to the Federal Bureau of Investigations, “The CSIS has defined it (cyber terror) as the us...
Presently, computer crime is rampant and costly. Combating these crimes is not only focused on the t...
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it ...
In the contemporary world, the latter interpretation is by far the more common (although persons bel...
Hackers have been present in computer networks from the moment networks began to exist. Beginning as...
A cyberattack can be defined as an action aiming to cause damages and losses to computer networks, i...
The pervasiveness of the World Wide Web (internet) with the easy flow of information means that ther...
Illegal cyber activities have been developing in past three decades with the mounting number of user...
The hacker is the epitome of a cybersecurity threat and the embodied misuse of the Internet. However...
There remains a lack of understanding as to what determines the path which a young person takes when...
This chapter introduces the ideas and practices of digital technology enthusiasts who fall under the...