Skip to main content
Erschienen in: Information Systems Frontiers 4/2010

01.09.2010

Hacker Taggers: A new type of hackers

verfasst von: Matthew Warren, Shona Leitch

Erschienen in: Information Systems Frontiers | Ausgabe 4/2010

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Organisations often spend large sums of money to ensure that they are protected against the risks associated with online attacks. The perceived threats against organisations are well known and the losses can be easily quantified. This perceived threat is usually portrayed by the media as being the work of a hacker however little is known about hacker subgroups, their rationale and ethical views. This paper focuses upon hacker subgroups and their activities and in particular the new hacker subgroup identified as ‘Hacker Taggers’.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Bronitt, S., & Gani, M. (2003). Shifting boundaries of cybercrime: From computer hacking to cyber-terrorism, Journal of Criminal Legal Justice. Australia: Lawbooks.Co. Bronitt, S., & Gani, M. (2003). Shifting boundaries of cybercrime: From computer hacking to cyber-terrorism, Journal of Criminal Legal Justice. Australia: Lawbooks.Co.
Zurück zum Zitat Caelli, W., Longley, D., & Shain, M. (1989). Information security for managers. New York: Stockton. Caelli, W., Longley, D., & Shain, M. (1989). Information security for managers. New York: Stockton.
Zurück zum Zitat Coldwell, R. (1994). Perceptions of computer crime, conference proceedings crime against business (Australian Institute of Criminology). Australia: Canberra. Coldwell, R. (1994). Perceptions of computer crime, conference proceedings crime against business (Australian Institute of Criminology). Australia: Canberra.
Zurück zum Zitat Coldwell, R. (1995) Australian attitudes toward legal intervention into hacking. Communications of the ACM, Vol 38, No 11. Coldwell, R. (1995) Australian attitudes toward legal intervention into hacking. Communications of the ACM, Vol 38, No 11.
Zurück zum Zitat Chantler, A. (1995) Risk: The profile of the computer hacker, PhD Thesis, Curtin Business School, Australia. Chantler, A. (1995) Risk: The profile of the computer hacker, PhD Thesis, Curtin Business School, Australia.
Zurück zum Zitat Dreyfus, S. (1997). Underground hacking, madness and obsession on the electronic frontier. Australia: Random House. Dreyfus, S. (1997). Underground hacking, madness and obsession on the electronic frontier. Australia: Random House.
Zurück zum Zitat Himanen, P. (2001). The hacker ethic and the spirit of the information age. UK: Random House. Himanen, P. (2001). The hacker ethic and the spirit of the information age. UK: Random House.
Zurück zum Zitat Furnell, S. (2002). Cybercrime: Vandalizing the information society. London: Addison-Wesley. Furnell, S. (2002). Cybercrime: Vandalizing the information society. London: Addison-Wesley.
Zurück zum Zitat Furnell, S. (2004). Hacking begins at home: Are company networks at risk from home computers? Computer fraud and security, 2004(1), 4-7, January 2004. Furnell, S. (2004). Hacking begins at home: Are company networks at risk from home computers? Computer fraud and security, 2004(1), 4-7, January 2004.
Zurück zum Zitat Furnell, S., & Warren, M. J. (1996). Computer abuse: Vandalising the information society, Internet research Vol 7, No 1. UK: MCB. Furnell, S., & Warren, M. J. (1996). Computer abuse: Vandalising the information society, Internet research Vol 7, No 1. UK: MCB.
Zurück zum Zitat Furnell, S., Dowland, P. S., & Sanders, P. (1999). Dissecting the ‘Hacker Manifesto’, Information management and computer security Vol 7, No 2. UK: MCB. Furnell, S., Dowland, P. S., & Sanders, P. (1999). Dissecting the ‘Hacker Manifesto’, Information management and computer security Vol 7, No 2. UK: MCB.
Zurück zum Zitat Kamay, V., & Adams, T. (1992). The 1992 profile of computer abuse in Australia, ACARB (Centre for Computer Abuse research at RMIT). Australia: Melbourne. Kamay, V., & Adams, T. (1992). The 1992 profile of computer abuse in Australia, ACARB (Centre for Computer Abuse research at RMIT). Australia: Melbourne.
Zurück zum Zitat Kingsley, P. (2002) Queen v Boden, ACISP 2002 Forensic Computer Workshop, Melbourne. Kingsley, P. (2002) Queen v Boden, ACISP 2002 Forensic Computer Workshop, Melbourne.
Zurück zum Zitat Levy, S. (1984). Hackers: Heroes of the computer revolution. London: Penguin. Levy, S. (1984). Hackers: Heroes of the computer revolution. London: Penguin.
Zurück zum Zitat McCaughey, M., & Ayers, D. (2003). Cyberactivism: Online activism in theory and practice. London: Routledge. McCaughey, M., & Ayers, D. (2003). Cyberactivism: Online activism in theory and practice. London: Routledge.
Zurück zum Zitat Meikle, G. (2002). Future active: Media activism and the internet. London: Routledge. Meikle, G. (2002). Future active: Media activism and the internet. London: Routledge.
Zurück zum Zitat O’Grady, D. (2006) Italians jailed for breaching Australian defence website, Sydney Morning News, July 12th. O’Grady, D. (2006) Italians jailed for breaching Australian defence website, Sydney Morning News, July 12th.
Zurück zum Zitat Parker, D. (1976). Crimes by computer. USA: Scribner. Parker, D. (1976). Crimes by computer. USA: Scribner.
Zurück zum Zitat Parker, T., Devost, M., Sachs, M., Shaw, E., & Stroz, E. (2004). Cyber adversary characterization: Auditing the hacker mind. USA: Syngress. Parker, T., Devost, M., Sachs, M., Shaw, E., & Stroz, E. (2004). Cyber adversary characterization: Auditing the hacker mind. USA: Syngress.
Zurück zum Zitat Simons, G. (1989). Viruses, bugs and Star Wars. UK: NCC Blackwell. Simons, G. (1989). Viruses, bugs and Star Wars. UK: NCC Blackwell.
Zurück zum Zitat Sterling, B. (1993). The Hacker crackdown: Law and disorder on the electronic frontier. USA: Mass Market Paperback. Sterling, B. (1993). The Hacker crackdown: Law and disorder on the electronic frontier. USA: Mass Market Paperback.
Zurück zum Zitat Thomas, D. (2002). Hacker culture. USA: University of Minnesota Press. Thomas, D. (2002). Hacker culture. USA: University of Minnesota Press.
Zurück zum Zitat Wark, M. (2004). A Hacker manifesto. USA: Harvard University Press. Wark, M. (2004). A Hacker manifesto. USA: Harvard University Press.
Metadaten
Titel
Hacker Taggers: A new type of hackers
verfasst von
Matthew Warren
Shona Leitch
Publikationsdatum
01.09.2010
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 4/2010
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-009-9203-y

Weitere Artikel der Ausgabe 4/2010

Information Systems Frontiers 4/2010 Zur Ausgabe