2019
DOI: 10.1007/s10796-019-09949-3
|View full text |Cite
|
Sign up to set email alerts
|

Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 41 publications
0
7
0
Order By: Relevance
“…First, as an analysis methodology, grounded theory introduces the formulation of mid-range theories that are able to explain both behavior and processes (Charmaz 2001); this entails that, it is possible to uncover the sensemaking process that users develop, because this methodology "specifically includes elements of process" (Orlikowski 1993). Second, grounded theory methodology is based on the development of analytic codes and categories from the empirical material, rather than from a strict theoretical framework and "preconceived hypotheses" (Urquhart and Fernández 2006); while in many occasions this is understood as disregarding extant literature, in practice it entails that the researcher needs to allow for the emergence of new themes from the empirical material, which previously may not have been uncovered by prior studies (Silic and Lowry 2019). Open coding commenced by examining the data line by line, identifying as many codes as possible.…”
Section: Discussionmentioning
confidence: 99%
“…First, as an analysis methodology, grounded theory introduces the formulation of mid-range theories that are able to explain both behavior and processes (Charmaz 2001); this entails that, it is possible to uncover the sensemaking process that users develop, because this methodology "specifically includes elements of process" (Orlikowski 1993). Second, grounded theory methodology is based on the development of analytic codes and categories from the empirical material, rather than from a strict theoretical framework and "preconceived hypotheses" (Urquhart and Fernández 2006); while in many occasions this is understood as disregarding extant literature, in practice it entails that the researcher needs to allow for the emergence of new themes from the empirical material, which previously may not have been uncovered by prior studies (Silic and Lowry 2019). Open coding commenced by examining the data line by line, identifying as many codes as possible.…”
Section: Discussionmentioning
confidence: 99%
“…The review found that one of the primary types of cybercriminals that studies have focused on is hackers. One example of which is a study exploring black hat hackers and offering valuable new insights on the psychological reasoning in the hacker's decision-making process, during their crime life cycle [51].…”
Section: Types Of Cybercriminal(s) Researchedmentioning
confidence: 99%
“…The type of data used to investigate cybercriminals is also crucial to understanding the nature of this research on this topic. We found that 22 (or, just over half of the) articles rely on new data, be it from surveys, interviews (with criminals and law enforcement), court records, case studies, underground markets or honeypots [3], [7], [8], [10], [11], [24], [29], [31]- [36], [43]- [45], [48], [49], [52], [57]- [59]. The other studies primarily use existing literature to form their arguments and often rely on research from other fields, or established approaches mapped to the cybercrime domain [2], [4], [5], [9], [12], [13], [15], [18], [21], [25], [27], [46], [50], [53]- [56].…”
Section: B Characteristics Of Articlesmentioning
confidence: 99%
See 2 more Smart Citations