2022
DOI: 10.1177/08944393221097881
|View full text |Cite
|
Sign up to set email alerts
|

The Illicit Ecosystem of Hacking: A Longitudinal Network Analysis of Website Defacement Groups

Abstract: Over the past four decades, research on hackers has widely propagated within the social sciences. Although this area of scholarship yields rich insight into the interpersonal dynamics of hackers, research on the unique ecosystems they create and inhabit is scant in comparison. The current study aims to offer a more complete assessment of hackers’ ecosystems by incorporating the group affiliations which link hackers to one another. Using 12 months of archived website defacement data containing individuals’ self… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 71 publications
0
1
0
Order By: Relevance
“…This work combines perspectives across many fields, including theory from criminology. The social aspects of cybercriminals has been studied across criminological literature and quantitative social science [11], [24], [27], [30], including the application of social network analysis approaches [12], [29], [35], ranging from studying small real-world criminal groups to larger online communities. This has included using ground truth data following arrests, to build up real-world social networks of key hackers and model how a network could be destabilised [12], and the use of time-series data in longitudinal network analysis for exploring online ecosystems of hacking defacement groups [35].…”
Section: Social Network Analysis and Churnmentioning
confidence: 99%
“…This work combines perspectives across many fields, including theory from criminology. The social aspects of cybercriminals has been studied across criminological literature and quantitative social science [11], [24], [27], [30], including the application of social network analysis approaches [12], [29], [35], ranging from studying small real-world criminal groups to larger online communities. This has included using ground truth data following arrests, to build up real-world social networks of key hackers and model how a network could be destabilised [12], and the use of time-series data in longitudinal network analysis for exploring online ecosystems of hacking defacement groups [35].…”
Section: Social Network Analysis and Churnmentioning
confidence: 99%