Search: onr:"swepub:oai:DiVA.org:hj-58277" > Examining the socia...
Fältnamn | Indikatorer | Metadata |
---|---|---|
000 | 02998naa a2200373 4500 | |
001 | oai:DiVA.org:hj-58277 | |
003 | SwePub | |
008 | 220822s2012 | |||||||||||000 ||eng| | |
024 | 7 | a https://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-582772 URI |
040 | a (SwePub)hj | |
041 | a engb eng | |
042 | 9 SwePub | |
072 | 7 | a ref2 swepub-contenttype |
072 | 7 | a art2 swepub-publicationtype |
100 | 1 | a Holt, Thomas J.u School of Criminal Justice, Michigan State University, Lansing, MI, United States4 aut |
245 | 1 0 | a Examining the social networks of malware writers and hackers |
264 | 1 | b International Journal of Cyber Criminology,c 2012 |
338 | a print2 rdacarrier | |
520 | a A substantive body of research has emerged exploring the social dynamics and subculture of computer hacking. Few, however, have considered the structure of social networks in the hacker community due in part to the lack of visible information about active hackers or malware writers. Our research focuses on the rarely studied subject of underground networks of computer hackers. Thus, this study explores the social networks of a group of Russian hackers using publicly accessible data to understand the nature of social relationships and the ways that they affect information sharing and action. The findings demonstrate that there are a limited number of highly skilled hackers relative to those with some knowledge of computers. Additionally, those hackers with substantive technical skills are centrally located within friendship networks and are the focus of greater attention overall. The impact of these findings for our understanding of computer hacking, and peer networks generally are considered in detail. | |
650 | 7 | a SAMHÄLLSVETENSKAPx Ekonomi och näringslivx Nationalekonomi0 (SwePub)502012 hsv//swe |
650 | 7 | a SOCIAL SCIENCESx Economics and Businessx Economics0 (SwePub)502012 hsv//eng |
653 | a Computer hackers | |
653 | a Cyber crime | |
653 | a Geography of networks | |
653 | a Malicious software | |
653 | a Malware | |
653 | a Network analysis | |
700 | 1 | a Strumsky, Deborahu Department of Geography and Earth Sciences, University of North Carolina at Charlotte, NC, United States4 aut0 (Swepub:hj)strude |
700 | 1 | a Smirnova, Olgau Department of Political Science, East Carolina University, NC, United States4 aut |
700 | 1 | a Kilger, Maxu Spartan Devils Honeynet Chapter, The Honeynet Project, Seattle, WA, Broadway, United States4 aut |
710 | 2 | a School of Criminal Justice, Michigan State University, Lansing, MI, United Statesb Department of Geography and Earth Sciences, University of North Carolina at Charlotte, NC, United States4 org |
773 | 0 | t International Journal of Cyber Criminologyd : International Journal of Cyber Criminologyg 6:1, s. 891-903q 6:1<891-903x 0974-2891 |
856 | 4 | u https://www.cybercrimejournal.com/holtetal2012janijcc.pdfy Fulltext |
856 | 4 8 | u https://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-58277 |
Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.
Copy and save the link in order to return to this view