Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace. Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining to the defeat of IS security countermeasures. This research soug...
There has been an increased amount of discussion about firms needing to account for the hacker's per...
Hacking is an ethically and legally ambiguous area, often associated with cybercrime and cyberattack...
Currently, very limited research is available to help researchers and firms understand the behavior ...
Hackers external to the organization continue to wreak havoc upon the information systems infrastruc...
Underground hacking has evolved from its early countercultural roots to become a complex and varied ...
This paper will explore how the often illegal activities of hackers (in the original usage of the te...
This paper will explore how the often illegal activities of hackers (employed in the original usage ...
This paper will explore how the often illegal activities of hackers (employed in the original usage ...
With a growing number of users getting connected to the Internet and given their growing reliance on...
The proliferation of information systems (IS) has afforded modern society with unprecedented benefit...
Social media analytics is a critical research area spawned by the increasing availability of rich an...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
Recent years have seen an increase in the number and severity of Information Operations (IO) attacks...
The hackers have been widespread throughout the IT world. The main categories of Hackers have evolve...
There has been an increased amount of discussion about firms needing to account for the hacker's per...
Hacking is an ethically and legally ambiguous area, often associated with cybercrime and cyberattack...
Currently, very limited research is available to help researchers and firms understand the behavior ...
Hackers external to the organization continue to wreak havoc upon the information systems infrastruc...
Underground hacking has evolved from its early countercultural roots to become a complex and varied ...
This paper will explore how the often illegal activities of hackers (in the original usage of the te...
This paper will explore how the often illegal activities of hackers (employed in the original usage ...
This paper will explore how the often illegal activities of hackers (employed in the original usage ...
With a growing number of users getting connected to the Internet and given their growing reliance on...
The proliferation of information systems (IS) has afforded modern society with unprecedented benefit...
Social media analytics is a critical research area spawned by the increasing availability of rich an...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
Recent years have seen an increase in the number and severity of Information Operations (IO) attacks...
The hackers have been widespread throughout the IT world. The main categories of Hackers have evolve...
There has been an increased amount of discussion about firms needing to account for the hacker's per...
Hacking is an ethically and legally ambiguous area, often associated with cybercrime and cyberattack...
Currently, very limited research is available to help researchers and firms understand the behavior ...