From Young Hackers to Crackers
نویسنده
چکیده
A growing number of scholars state that the Internet presents “some unique opportunities for deviant behavior” (Rogers et al, 2006). However, although some researchers have studied this issue, the factors leading teenagers to adopt a web-deviant behavior have received less attention. From this background, the present article sets out to explore the facilitators of cybercrime. The author will explain the diffusion of web-deviant behavior amongst young people through an analysis of the literature while taking into consideration the conceptual model of diffusion of innovation by Greenhalgh et al. (2004). From Young Hackers to Crackers
منابع مشابه
Hackers as Terrorists? Why it Doesn’t Compute
The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism. The remainder of the paper examines why neither hacktivists nor crackers fall easily into the cyberterrorist category either.
متن کاملDefending Your Digital Assets against Hackers, Crackers, Spies and Thieves
It's not surprisingly when entering this site to get the book. One of the popular books now is the defending your digital assets against hackers crackers spies and thieves. You may be confused because you can't find the book in the book store around your city. Commonly, the popular book will be sold quickly. And when you have found the store to buy the book, it will be so hurt when you run out ...
متن کاملVirtuous Hackers: developing ethical sensitivity in a community of practice
It is estimated that losses due to computer break-ins by malicious 'crackers' (who might be external intruders or disgruntled employees intent on personal gain or revenge) are costing companies billions of dollars each year. But former hackers are now assisting the computer security industry to track down such intruders, and to develop sound security practices in order to ward off future attack...
متن کاملAnalysis Tool for Honeypot Systems
The increased utilization of the Internet and the larger number of computers connected to it has brought up a significant security problem. Hackers or crackers have attacked computers and need to be detected and neutralized. This study presents a brief description of tools and methods of the honeypot community. A new tool resulting from a shift on the focus of the research allows system adminis...
متن کاملNetwork Security Algorithms
Viruses, Worms and Trojan Horses, the malware zoo is growing every day. Hackers and Crackers try to penetrate computer systems, either for fun or for commercial benefit. Zombie-like creatures called Bots attack in the 10’s of thousands. Computer intrusions cause monetary as well as prestige losses. Countermeasures surely have to be taken, so a look on current technology and future outlines seem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJTHI
دوره 9 شماره
صفحات -
تاریخ انتشار 2013