The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Cyber Security and Anti-Social Networking
Abstract
This chapter is about the way in which computer hackers invoke social networking paradigms to support and encourage their activities. It reviews the evolution of hacking as a form of social networking, from its roots in Bulletin Board systems to the current attacks on Second Life, and considers the motivation for hacking. Ajzen’s Theory of Planned Behavior and Beveren’s Flow Theory model are, when considered together, found to explain many of the observed characteristics of early hacker activity. The place of social networks in motivating hacking is explored, and some observations are made in relation to hacking and the Second Life environment. A number of control variables are identified which can be used to reduce the likelihood of people engaging in the hacking activity. Addressing the social network factors which motivate hacking provides an important early step in addressing cybercrime.
Related Content
Nitesh Behare, Rashmi D. Mahajan, Meenakshi Singh, Vishwanathan Iyer, Ushmita Gupta, Pritesh P. Somani.
© 2024.
36 pages.
|
Shikha Mittal.
© 2024.
21 pages.
|
Albérico Travassos Rosário.
© 2024.
31 pages.
|
Carla Sofia Ribeiro Murteira, Ana Cristina Antunes.
© 2024.
23 pages.
|
Mario Sierra Martin, Alvaro Díaz Casquero, Marina Sánchez Pérez, Bárbara Rando Rodríguez.
© 2024.
17 pages.
|
Poornima Nair, Sunita Kumar.
© 2024.
18 pages.
|
Neli Maria Mengalli, Antonio Aparecido Carvalho.
© 2024.
16 pages.
|
|
|