2011
DOI: 10.1177/0022427811420876
|View full text |Cite
|
Sign up to set email alerts
|

Welcome to the Scene

Abstract: Objectives. This article seeks to describe and understand the social organization as well as the distribution of recognition in the online community (also known as the warez scene) of hackers who illegally distribute intellectual property online. Method. The data were collected from an online index that curates a list of illegal content that was made available between 2003 and 2009. Sutherland's notion of behavior systems in crime as well as Boase and Wellman's notion of network individualism are used to theor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

3
8
0
1

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 34 publications
(12 citation statements)
references
References 28 publications
3
8
0
1
Order By: Relevance
“…This area of scholarship continues to challenge out-of-date impressions of hackers as solitary and unsociable offenders, showing “computer intrusions come not from random, obsessed individuals but from a community that offers network and support.” (Jordan & Taylor, 1998, p. 758). Studies suggests hackers embed themselves within close-knit online communities where collaborative ties are forged (Dupont et al, 2017), specialized skills acquired (Leukfeldt et al, 2017), and social status sought (Dècary-Hetu et al, 2012). Although a growing body of research yields rich insight into the interpersonal dynamics of hackers, much of this work focuses on the connections between individual hackers, and less is known about the groups they belong to.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…This area of scholarship continues to challenge out-of-date impressions of hackers as solitary and unsociable offenders, showing “computer intrusions come not from random, obsessed individuals but from a community that offers network and support.” (Jordan & Taylor, 1998, p. 758). Studies suggests hackers embed themselves within close-knit online communities where collaborative ties are forged (Dupont et al, 2017), specialized skills acquired (Leukfeldt et al, 2017), and social status sought (Dècary-Hetu et al, 2012). Although a growing body of research yields rich insight into the interpersonal dynamics of hackers, much of this work focuses on the connections between individual hackers, and less is known about the groups they belong to.…”
Section: Introductionmentioning
confidence: 99%
“…This represents an important gap as group affiliation increases the frequency, severity, and duration of offending (Esbensen & Huizinga, 1993; Melde & Esbensen, 2013; Pyrooz et al, 2016; Sweeten et al, 2013; Thornberry et al, 1993). There is also reason to believe these findings carry over to online settings, where the most active groups within the hacking community receive the greatest recognition and provide a pool of affiliates from which to confer and receive social status (Dècary-Hetu et al, 2012). By scaling up the unit of analysis to the group-level, greater insight can be drawn into the interventions designed to disrupt group formation as well as individual-level explanations of joining or leaving groups (McGloin & Nguyen, 2013; Tremblay et al, 2019).…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations