• Corpus ID: 152048015

The New Computer Hacker's Quest and Contest with the Experienced Hackers: A Qualitative Study Applying Pierre Bourdieu's Field Theory

@article{Nycyk2016TheNC,
  title={The New Computer Hacker's Quest and Contest with the Experienced Hackers: A Qualitative Study Applying Pierre Bourdieu's Field Theory},
  author={Michael Nycyk},
  journal={International Journal of Cyber Criminology},
  year={2016},
  volume={10},
  pages={92}
}
  • Michael Nycyk
  • Published 1 July 2016
  • Sociology
  • International Journal of Cyber Criminology
IntroductionThe considerable body of literature seeking to understand computer hackers' motivations and behaviors still needs further inquiry as hacking cyber crime grows in sophistication and geographic reach (Decary-Hetu & Dupont, 2013; Nikitina, 2012; Turgeman-Goldschmidt, 2008; Yar, 2005; Taylor, 1999; Jordan & Taylor, 1998). Needing further investigation is the area of new computer hackers or newbies. This study specifically examines newbie hackers' acquisitions of skills and knowledge in… 

Tables from this paper

Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools
TLDR
A systematic review of literature is adopted to discuss and analyse some of the common tools the black hat hackers have developed to hack into selected systems and commercial software and why they do it.
Freedom in the wilderness: A study of a Darknet space
Mass media and journalistic accounts of Darknets have focused disproportionately on their criminogenic aspects. Moreover, research has focused mainly on the Darknet technology Tor. We wish to expand
White-Collar Cybercrime: White-Collar Crime, Cybercrime, or Both?
The study of white-collar crime has evolved over the past eight decades. So too has the nature of white-collar crime. Varieties of white-collar crime have changed as the types of occupations evolved.
Application of a Risk-Based Approach Using Reflexive Risk Models in Building Information Security Systems
TLDR
The study of reflexive models in a number of cases made it possible to determine the maximum volume of investments in the information security system and reveal the limitations in the application of the RBA to the construction of the Information security system.
A Dynamic Cyber-Based View of the Firm
TLDR
The Cyber-Based View (CBV) of the firm is developed, a multidimensional conceptualization of firm readiness for a cyberattack that fills a gap in the existing theory by incorporating physical, cognitive, and informational dimensions into a single framework.
Cyberdaders: Uniek profiel, unieke aanpak?
Er zijn verschillende indicaties dat hacken, het uitvoeren van DDoS-aanvallen, het verspreiden van ransomware en andere vormen van cybercriminaliteit in enge zin in omvang toenemen onder zowel

References

SHOWING 1-10 OF 43 REFERENCES
Meanings that Hackers Assign to their Being a Hacker
IntroductionComputer-related deviance has not been sufficiently studied, especially from the perspective of the perpetrators themselves (Yar, 2005). The present study analyzes the ways in which
A Sociology of Hackers
Illicit computer intruders, or hackers, are often thought of as pathological individuals rather than as members of a community. However, hackers exist within social groups that provide expertise,
Hackers’ media practices
The increased level of technical abstractness poses a challenge for laypersons and politicians alike to notice the political impacts specific technical developments might bring. By presenting
The "Ethics" of Teaching Ethical Hacking
INTRODUCTION Hacking grew out of a tradition of mutual cooperation among software developers to create software projects that were innovative, aesthetic and included some form of technical virtuosity
The Hacking of America: Who's Doing It, Why, and How
Hacker Basics Introduction: Fears about Hackers and Why This Book Was Written Hackersom History: Highlights, Facts, and Headline Makers A Balanced View about Hackers: The Good Side A Balanced View
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory,
Harnessing the hackers: The emergence and exploitation of Outlaw Innovation
This paper will explore how the often illegal activities of hackers (employed in the original usage of the term to refer to individuals who modify computer hardware and software) may produce valuable
Computer Hacking: Just Another Case of Juvenile Delinquency?
Recent discussions of computer 'hacking' make explicit reference to the disproportionate involvement of juveniles in this form of computer crime. While criminal justice, computer security, public and
Hacking into the Minds of Hackers
TLDR
Results show that hackers continue to engage in illegal hacking activities despite the perception of severe judicial punishment, and hackers perceive a high utility value from hacking, little informal sanctions, and a low likelihood of punishment.
Examining the social networks of malware writers and hackers
TLDR
This study explores the social networks of a group of Russian hackers using publicly accessible data to understand the nature of social relationships and the ways that they affect information sharing and action.
...
1
2
3
4
5
...