From Young Hackers to Crackers

نویسنده

  • Jean-Loup Richet
چکیده

A growing number of scholars state that the Internet presents “some unique opportunities for deviant behavior” (Rogers et al, 2006). However, although some researchers have studied this issue, the factors leading teenagers to adopt a web-deviant behavior have received less attention. From this background, the present article sets out to explore the facilitators of cybercrime. The author will explain the diffusion of web-deviant behavior amongst young people through an analysis of the literature while taking into consideration the conceptual model of diffusion of innovation by Greenhalgh et al. (2004). From Young Hackers to Crackers

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hackers as Terrorists? Why it Doesn’t Compute

The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism. The remainder of the paper examines why neither hacktivists nor crackers fall easily into the cyberterrorist category either.

متن کامل

Defending Your Digital Assets against Hackers, Crackers, Spies and Thieves

It's not surprisingly when entering this site to get the book. One of the popular books now is the defending your digital assets against hackers crackers spies and thieves. You may be confused because you can't find the book in the book store around your city. Commonly, the popular book will be sold quickly. And when you have found the store to buy the book, it will be so hurt when you run out ...

متن کامل

Virtuous Hackers: developing ethical sensitivity in a community of practice

It is estimated that losses due to computer break-ins by malicious 'crackers' (who might be external intruders or disgruntled employees intent on personal gain or revenge) are costing companies billions of dollars each year. But former hackers are now assisting the computer security industry to track down such intruders, and to develop sound security practices in order to ward off future attack...

متن کامل

Analysis Tool for Honeypot Systems

The increased utilization of the Internet and the larger number of computers connected to it has brought up a significant security problem. Hackers or crackers have attacked computers and need to be detected and neutralized. This study presents a brief description of tools and methods of the honeypot community. A new tool resulting from a shift on the focus of the research allows system adminis...

متن کامل

Network Security Algorithms

Viruses, Worms and Trojan Horses, the malware zoo is growing every day. Hackers and Crackers try to penetrate computer systems, either for fun or for commercial benefit. Zombie-like creatures called Bots attack in the 10’s of thousands. Computer intrusions cause monetary as well as prestige losses. Countermeasures surely have to be taken, so a look on current technology and future outlines seem...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJTHI

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2013