2015
DOI: 10.1016/j.diin.2015.07.002
|View full text |Cite
|
Sign up to set email alerts
|

A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex model

Abstract: Cyber attacks continue to increase in frequency and variety, making cyber malfeasance a rising area of study and a major policy issue. Categorizing cyber attackers aids targeted organizations in efficiently directing resources to enhance security. However, extant hacker typologies do not fully account for the multifaceted nature of cyber malfeasance, including the rise in socially and ideologically motivated hacking (e.g. crowdsourcing, hacktivism). I clarify the current state of field by uniting recent case s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
23
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(25 citation statements)
references
References 15 publications
(53 reference statements)
1
23
0
Order By: Relevance
“…Those investigations yielded several hackers typologies that mainly differentiate between hackers' level of malicious intents (for instance white, black and grey hackers [10]), skill levels (i.e. low, mid and high [11,12]), and motivation to launch a cyber attack (for instance, thrill, monetary gain, revenge, recreation, ideology and exploration) [13]. Consistent with these typologies, Parker [14] developed a model for assessing attackers' (both individuals and groups) potential threat to organizational information systems.…”
Section: Assessing Attackers' Potential Threat To An Organizationmentioning
confidence: 99%
See 1 more Smart Citation
“…Those investigations yielded several hackers typologies that mainly differentiate between hackers' level of malicious intents (for instance white, black and grey hackers [10]), skill levels (i.e. low, mid and high [11,12]), and motivation to launch a cyber attack (for instance, thrill, monetary gain, revenge, recreation, ideology and exploration) [13]. Consistent with these typologies, Parker [14] developed a model for assessing attackers' (both individuals and groups) potential threat to organizational information systems.…”
Section: Assessing Attackers' Potential Threat To An Organizationmentioning
confidence: 99%
“…We believe that understanding cyber-criminals' goals in launching cyber-dependent crimes against an organization could improve security officials' assessments of potential cyber-risks to their organizations. Specifically, we suspect that online criminals' goals in launching cyber-dependent events could range from a desire to explore computer technology, the thrill of engaging in illegal activities, willingness to gain prestige among peers, revenge, obsession, ideology, or monetary gain [13]. Moreover, it is possible that cybercriminals are willing to engage in online criminal behaviors in order to obtain more than just one goal.…”
Section: Attackers' Goalsmentioning
confidence: 99%
“…Recent recommendations in hacker typologies have been made to include the increase in social and ideological motivations in hacking, incorporating those who are seen as 'hacktivists', also a contentious term but meaning a combination of 'hacker' and 'activist' (Krapp, 2005). This growth of social and ideological motivations have been attributed in part to the fact that a generation has been raised in a time of digital evolution and innovation (Seebruck, 2015), with increased user generated content and unrestrained communication increasing the confidence and perception of power individuals possess. (Seebruck, 2015).…”
Section: Hackers Hacktivists and Motivationmentioning
confidence: 99%
“…This growth of social and ideological motivations have been attributed in part to the fact that a generation has been raised in a time of digital evolution and innovation (Seebruck, 2015), with increased user generated content and unrestrained communication increasing the confidence and perception of power individuals possess. (Seebruck, 2015).…”
Section: Hackers Hacktivists and Motivationmentioning
confidence: 99%
See 1 more Smart Citation