Hacker Wars: E-Collaboration by Vandals and Warriors

نویسنده

  • Richard Baskerville
چکیده

This chapter develops an analytical framework for new forms of information warfare that may threaten commercial and government computing systems by using e-collaboration in new ways. The framework covers (1) strategic model, (2) strategic arena, (3) e-collaboration, and (4) ethics and law. The framework then is used to compare two recorded instances of major hacker wars that erupted in the shadow of kinetic conflicts. In both cases, the hacker war appears to have been a grassroots collaborative enterprise by loosely organized civilians with neither government control nor permission. Collaborating across networks to coordinate their attacks, such hacker wars can attack both government and commercial computer networks without warning. The analysis shows how hacker wars demonstrate characteristics found in the frameworks and that there are forms of e-collaboration that represent a potentially difficult new source of threat for globalized information systems. IntroductIon

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Battle of Ayyārs: An Analysis of Methods, Tricks and Tools Based on the Story of "Hossein-e Kurd-e Shabesstari"

The story of Hossein Kurd is considered to be a fiction book of folk literature and can be considered as one of the stories of Ayyārs. The origin of this story and its events is a report of the social situation of Iran in part of the Safavid era, which refers to the traditions of the Ayyārs on that particular date that have not been mentioned so far. The traditions of their battles and wars are...

متن کامل

The Garden: Evolving Warriors in Core Wars

The Garden is a new architecture for evolving Core Wars programs, short, assembly-language like creatures which battle in a simulated computer environment. With an agressive direct-compilation scheme, the Garden avoids nearly all external overhead for evaluating Core Wars programs. The resulting eÆciency allows us to explore and compare di erent evolutionary methods at a scale (thousands of war...

متن کامل

War ,

Anyone who is inclined to think that the " Reading Wars " are over, or that the main warriors in these wars are only professional educators and researchers who support either whole language or phonics approaches to reading will continuously rethink their views during the reading of Reading across International Boundaries: History, Policy, and Politics. Openshaw and Soler have compiled a collect...

متن کامل

CERIAS Tech Report 2005-43 THE DEVELOPMENT OF A MEANINGFUL HACKER TAXONOMY: A TWO DIMENSIONAL APPROACH

The current paper extends and matures the earlier taxonomy framework of the author (Rogers, 1999), and provides a preliminary two dimensional classification model. While there is no one generic profile of a hacker, studies indicate that there are at least eight primary classification variables: Novices (NV), Cyber-Punks (CP), Internals (IN), Petty Thieves (PT), Virus Writers (VW), Old Guard hac...

متن کامل

Underwater Hacker Missile Wars: A Cryptography and Engineering Contest

For a recent student conference, the authors developed a day-long design problem and competition suitable for engineering, mathematics, and science undergraduates. The competition included a cryptography problem, for which a workshop was run during the conference. This paper describes the competition, focusing on the cryptography problem and the workshop. Notes from the workshop and code for th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IJeC

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2006