IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cyber Security and Anti-Social Networking

Cyber Security and Anti-Social Networking
View Sample PDF
Author(s): Malcolm Shore (Canterbury University, New Zealand)
Copyright: 2011
Pages: 12
Source title: Virtual Communities: Concepts, Methodologies, Tools and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-60960-100-3.ch412

Purchase

View Cyber Security and Anti-Social Networking on the publisher's website for pricing and purchasing information.

Abstract

This chapter is about the way in which computer hackers invoke social networking paradigms to support and encourage their activities. It reviews the evolution of hacking as a form of social networking, from its roots in Bulletin Board systems to the current attacks on Second Life, and considers the motivation for hacking. Ajzen’s Theory of Planned Behavior and Beveren’s Flow Theory model are, when considered together, found to explain many of the observed characteristics of early hacker activity. The place of social networks in motivating hacking is explored, and some observations are made in relation to hacking and the Second Life environment. A number of control variables are identified which can be used to reduce the likelihood of people engaging in the hacking activity. Addressing the social network factors which motivate hacking provides an important early step in addressing cybercrime.

Related Content

Kumar Shalender, Babita Singla. © 2024. 11 pages.
R. Akash, V. Suganya. © 2024. 32 pages.
Prathmesh Singh, Arnav Upadhyaya, Nripendra Singh. © 2024. 14 pages.
Arpan Anand, Priya Jindal. © 2024. 13 pages.
Surjit Singha, K. P. Jaheer Mukthar. © 2024. 26 pages.
M. Vaishali, V. Kiruthiga. © 2024. 14 pages.
Ranjit Singha, Surjit Singha. © 2024. 21 pages.
Body Bottom