Global Criminology 2013
DOI: 10.1201/b13925-9
|View full text |Cite
|
Sign up to set email alerts
|

Hacking and Fraud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 15 publications
1
2
0
Order By: Relevance
“…The current study's results substantiate several studies which found the social structures of hackers are communities marked by centralized, yet densely clustered, interpersonal relations (Décary-Hétu & Dupont, 2012; Howell et al, 2019;Samtani et al, 2017). Moreover, the findings also support the extant literature's qualitative (Hutchings, 2013;Jordan & Taylor, 1998) and quantitative Duxbury & Haynie, 2018) understanding on the influential and substantial role a small number of actors can have within an ecosystem.…”
Section: Discussionsupporting
confidence: 88%
“…The current study's results substantiate several studies which found the social structures of hackers are communities marked by centralized, yet densely clustered, interpersonal relations (Décary-Hétu & Dupont, 2012; Howell et al, 2019;Samtani et al, 2017). Moreover, the findings also support the extant literature's qualitative (Hutchings, 2013;Jordan & Taylor, 1998) and quantitative Duxbury & Haynie, 2018) understanding on the influential and substantial role a small number of actors can have within an ecosystem.…”
Section: Discussionsupporting
confidence: 88%
“…Cyber-enabled crimes are more interpersonal in nature, and deception of Internet users through socially engineered messages is key in the commission of cyber-enabled crimes (Chen et al , 2017; Halevi et al , 2015). However, cyber-dependent crimes heavily rely on technical subterfuge, such as infecting target computers or exploiting technological vulnerabilities (Almomani et al , 2013; Hutchings, 2013).…”
Section: Discussionmentioning
confidence: 99%
“…Hacking is the unauthorised access to computers or computer systems with the aim of damaging, altering or stealing data (Wall, 2001). Hackers utilise technical subterfuge such as malware infection or social engineering to access computer systems (Hutchings, 2013; Reyns and Henson, 2016). Although the initial hackers were motivated by naïve ends, such as curiosity or identifying deficiencies in computer systems, recent hackers have been motivated more by criminal intent, such as financial gain or terrorism (Koops, 2010).…”
Section: Literature Reviewmentioning
confidence: 99%
“…For instance, reference [40] found that software crackers do not deny responsibility for their actions and argue that some of their targets (i.e., vendors of expensive software) deserve to be victimised. According to reference [41], hackers not only refute the idea that victims are harmed, but also argue that their actions benefit others since they bring attention to security vulnerabilities in systems. Furthermore, some offenders believe that even if victims incur financial losses, this is only temporary as they are eventually compensated by financial institutions [15].…”
Section: Neutralisation Theory and Cybercrimementioning
confidence: 99%
“…Perpetrators that commit minor forms of hacking and use illegal software argue that computer intrusions are not as serious as other illegal acts [35,42]. Hackers may deliberately target specific victims, especially if the victims are viewed as harming others [41]. This is particularly true for offenders who commit cyber-attacks for ideological, religious and political purposes [43,44].…”
Section: Neutralisation Theory and Cybercrimementioning
confidence: 99%