The Social Network Structure of a Computer Hacker Community

Identity theft and financial fraud conducted by hackers have evolved into serious and pervasive threats to consumers and the financial services industry (Furnell, 2002). Computer hackers, both individually and as a group, have been identified as a primary threat to computer systems and users. The CSI Computer Crime & Security Survey, the world’s most widely quoted survey on computer crime, found that financial fraud, password sniffing, and malware infection cost organizations the most, with an average loss close to $289,000 for each respondent’s organization (Richardson, 2009). Academic research from a variety of disciplines has contributed to our understanding of the hacker’s attack methods (Furnell, 2002), subculture (Thomas, 2002), and motivations (Taylor, 1999). Previous studies by Meyer (1989) and Holt ABSTRACT

[1]  Raj Sharman,et al.  Handbook of Research on Social and Organizational Liabilities in Information Security , 2008 .

[2]  Chandan Mazumdar,et al.  A Practical Approach of Fairness in E-Procurement , 2012, Int. J. Inf. Secur. Priv..

[3]  Tharam S. Dillon,et al.  Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication , 2007, Int. J. Inf. Secur. Priv..

[4]  S. E. Kruck,et al.  Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Use , 2008, Int. J. Inf. Secur. Priv..

[5]  Tyrone Grandison,et al.  Privacy Protection Issues for Healthcare Wellness Clouds , 2012 .

[6]  Jun Zheng,et al.  Handbook of Research on Wireless Security , 2008 .

[7]  Joel Best,et al.  The Social Organization of Deviants , 1980 .

[8]  Yun Wang,et al.  Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection , 2008 .

[9]  Albert Y. Zomaya,et al.  Access Control in Wireless Local Area Networks: Fast Authentication Schemes , 2008 .

[10]  Social and Human Elements of Information Security: A Case Study , 2009 .

[11]  Kathleen M. Carley,et al.  Toward an interoperable dynamic network analysis toolkit , 2007, Decis. Support Syst..

[12]  Kathleen M. Carley,et al.  Revealing Social Structure from Texts: Meta-Matrix Text Analysis as a Novel Method for Network Text Analysis , 2005 .

[13]  George Yee Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards , 2011 .

[14]  Bernardo Magnini,et al.  A WordNet-Based Approach to Named Entites Recognition , 2022 .

[15]  Jyh-haw Yeh,et al.  Security Issues and Possible Countermeasures for a Mobile Agent Based M-Commerce Application , 2005 .

[16]  Hamid R. Nemati International Journal of Information Security and Privacy , 2007 .