Query Result Set
Skip Navigation Links
   ActiveUsers:1577Hits:18330310Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
HACKER (3) answer(s).
 
SrlItem
1
ID:   171964


50 shades of hacking: How IT and cybersecurity industry actors perceive good, bad, and former hackers / Tanczer, Leonie Maria   Journal Article
Tanczer, Leonie Maria Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The hacker is the epitome of a cybersecurity threat and the embodied misuse of the Internet. However, in recent years, notions of hacking have begun to change. Blurred boundaries mark the term, best expressed in its overlap with “security researcher.” This article draws on a 3.5-year research project on the hacker community and applies an international political sociology framework to uncover routines of rationalization. Interviews with IT and cybersecurity industry experts expose accepted identities, practices, and behaviors of hackers, which allows for the construction of in-group and out-group members in the IT and cybersecurity field. Additionally, the empirical findings are used to propose a conceptual framework (the Möbius strip) to situate the moral valence of hackers on a flexible model. Thus, the article provides insight into the ontological and normative complexities that define the study of hackers, as well as the perception of IT and cybersecurity professionals.
Key Words Industry  Identity  Hacking  Cybersecurity  Hacker  Security Researcher 
        Export Export
2
ID:   104626


ADE-novo look at China's cyber warfare capability from an India / Madhok, Vikas   Journal Article
Madhok, Vikas Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Key Words Information Warfare  China  India  Cyber Warfare  Hacker 
        Export Export
3
ID:   119753


Hacktivism: anthropology of an idea / McCormick, Ty   Journal Article
McCormick, Ty Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Key Words Hacker  Hacktivism  Computer Hackers  Cyberoperations 
        Export Export