2008
DOI: 10.1201/9781420086942
|View full text |Cite
|
Sign up to set email alerts
|

Profiling Hackers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 31 publications
(11 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…Alongside knowledge, schools and universities also provide their students with access to advanced networked systems without which it is much harder to commit cybercrime [ 25 , 26 , 67 ]. For example, by hacking into a university’s network, an individual can access much greater computer capacity for committing a digital attack than what is possible with only a home computer [ 7 ]. Similar to what has been discussed with respect to employment in the IT-sector above, criminal organizations may directly contact IT-students as well [ 3 ].…”
Section: Introductionmentioning
confidence: 99%
“…Alongside knowledge, schools and universities also provide their students with access to advanced networked systems without which it is much harder to commit cybercrime [ 25 , 26 , 67 ]. For example, by hacking into a university’s network, an individual can access much greater computer capacity for committing a digital attack than what is possible with only a home computer [ 7 ]. Similar to what has been discussed with respect to employment in the IT-sector above, criminal organizations may directly contact IT-students as well [ 3 ].…”
Section: Introductionmentioning
confidence: 99%
“…It reveals a highly negative connotation of hackers with respect to their presumed motivation (e.g., bad, malicious, and/or illicit; respectively damage, disrupt, and harm for the incentives). The attackers' backgrounds are significantly different [16], [37], and there is no obvious differentiation from the rest of the population [11], [31]. The high dominance of malicious motives is not supported in scientific studies trying to quantify hacker motives.…”
Section: B Results From the Quantitative Content Analysis And Their Discussionmentioning
confidence: 99%
“…This entails every illegal means of gaining unauthorised access to computer system or networks (Chiesa et al , 2008, pp. 20, 87, 136).…”
Section: Computer As the Target Of Cybercrimementioning
confidence: 99%