Exploring the Subculture of Ideologically Motivated Cyber-Attackers

@article{Holt2017ExploringTS,
  title={Exploring the Subculture of Ideologically Motivated Cyber-Attackers},
  author={Thomas J. Holt and Joshua D. Freilich and Steven M. Chermak},
  journal={Journal of Contemporary Criminal Justice},
  year={2017},
  volume={33},
  pages={212 - 233}
}
Research on physical, that is, violent, terror attacks and extremism has increased dramatically over the last decade. The growth of the Internet and computer technology has also led to concern over the use of cyberattacks by ideologically motivated offenders to cause harm and further their political and social agendas. There is, however, a lack of empirical research on cyber-attackers limiting our knowledge of the factors that affect their behavior. This study addresses this empirical gap… Expand
Examining Ideologically Motivated Cyberattacks Performed by Far-Left Groups
ABSTRACT Over the last two decades, there has been a massive increase in research examining terror and extremist-related violence. Few have considered the extent to which these same groups may engageExpand
Interviewing cybercrime offenders
Research on cybercrime offending and victimization has increased dramatically over the past two decades, though qualitative scholarship on more technical offenses such as computer misuse has not keptExpand
Examining the Use of Interviews in Cybercrime Research
Research on cybercrime offending and victimization has increased dramatically over the past two decades, though qualitative scholarship on more technical offenses such as computer misuse have notExpand
Perceived formal and informal sanctions on the willingness to commit cyber attacks against domestic and foreign targets
  • A. Bossler
  • Business
  • Journal of Crime and Justice
  • 2019
ABSTRACT Scholars have expressed concerns over the effectiveness of formal sanctions in deterring cybercrime, particularly regarding computer intrusions and cyber attacks. Little empirical research,Expand
An Ethical Framework for Hacking Operations
In recent years the power and reach of prominent hacker groups such as Anonymous and LulzSec has been clearly demonstrated. However, in a world where hackers are able to wield significant onlineExpand
Loners, Colleagues, or Peers? Assessing the Social Organization of Radicalization
This study explores the utility of a sociological model of social organization developed by Best and Luckenbill (1994) to classify the radicalization processes of terrorists (i.e., extremistExpand
Explaining Why Cybercrime Occurs: Criminological and Psychological Theories
Several criminological and psychological theories and their empirical support for explaining cybercrime are reviewed. Social learning theory, self-control theory, and subcultural theories haveExpand
Do Hacker Groups Pose a Risk to Organizations? Study on Financial Institutions Targeted by Hacktivists
As organizations are increasingly engaged in the digital world with greater dependency on data, crime and activism have shifted from the streets to the internet. In this paper, we study the impact ofExpand
The impact of cybercrime on e-banking: A proposed model
TLDR
This study seeks to propose a research model which can be used to evaluate the significance of cybercrime in deterring the use of e-banking in the financial sector and it is hoped that the proposed research model will influence other researchers to conduct empirical research in their context. Expand
Heterogeneity in trajectories of cybercriminals: A longitudinal analyses of web defacements
Abstract Longitudinal criminological studies greatly improved our understanding of the longitudinal patterns of criminality. These studies, however, focused almost exclusively on traditional types ofExpand
...
1
2
3
...

References

SHOWING 1-10 OF 79 REFERENCES
Hackers: Crime in the Digital Sublime
From the Publisher: Freedom fighers or anarchists? In Hackers, Paul A. Taylor looks at these characters and the perennial battle between computer hackers and the security industry. He talks toExpand
Examining Willingness to Attack Critical Infrastructure Online and Offline
The continuing adoption of technologies by the general public coupled with the expanding reliance of critical infrastructures connected through the Internet has created unique opportunities forExpand
The Hidden Face of Jihadist Internet Forum Management: The Case of Ansar Al Mujahideen
ABSTRACT This article offers a descriptive analysis of the private interactions which took place on the jihadist Internet forum known as Ansar Al Mujahideen between 2008 and 2010. The analysis of theExpand
Exploring the Correlates of Individual Willingness to Engage in Ideologically Motivated Cyberattacks
ABSTRACT In the last few years, there has been an increase in the use of Web defacements, where individuals post political or ideological messages on websites in place of the original content. ThereExpand
Hacktivism and Cyberwars: Rebels with a Cause?
As global society becomes more and more dependent, politically and economically on the flow of information, the power of those who can disrupt and manipulate that flow also increases. This textExpand
A Sociology of Hackers
Illicit computer intruders, or hackers, are often thought of as pathological individuals rather than as members of a community. However, hackers exist within social groups that provide expertise,Expand
Cybercrime: Vandalizing the Information Society
TLDR
It is concluded that cybercrime is an inevitable downside of the information society, and that organizations and individuals consequently have a stake in ensuring their own protection. Expand
Exploring the Intersections of Technology, Crime, and Terror
The Internet and computer-mediated communications (CMCs) have drastically changed the way that individuals communicate and share information across the globe. Over the last two decades, financialExpand
Social Dynamics and the Future of Technology-Driven Crime
The future of cybercrime and cyber terrorism is not likely to follow some monotonic, simple deterministic path. The complex interplay of technology and social forces, as demonstrated in the previousExpand
Radicalization into Violent Extremism I: A Review of Social Science Theories
In discourse about countering terrorism, the term "radicalization" is widely used, but remains poorly defined. To focus narrowly on ideological radicalization risks implying that radical beliefs areExpand
...
1
2
3
4
5
...