3,779
Views
52
CrossRef citations to date
0
Altmetric
THEMED ARTICLES: DATA COMMUNICATIONS & NETWORK SECURITY

Hacking into the Minds of Hackers

, &
Pages 281-287 | Published online: 10 Dec 2007

REFERENCES

  • Bandura , A. , Barbaranelli , C. , Gian , V. and Pastorelli , C. 1996 . Mechanism of disengagement in exercise of moral agency. . Journal of Personality and Social Psychology , 71 ( 2 ) : 364 – 374 .
  • Bargh , J. A. , Chen , M. and Burrows , L. 1996 . Automatocity of social behavior: Direct effects of trait construct and stereotype activation on action. . Journal of Personality and Social Psychology , 71 : 230 – 244 .
  • Cavusoglu , H. , Mishra , B. and Raghunathan , S. 2004 . A model for evaluating IT security investments. . Communications of the ACM , 47 ( 7 ) : 87 – 92 .
  • Conti , G. 2005 . Why computer scientists should attend hacker conferences . Communications of the ACM. , 48 ( 3 ) : 23 – 24 .
  • Ellis, P. & Walsh, P. (2004). DefCon harbors sex, geeks and rock 'n' roll in one sleepless package. Retrieved August 29, 2007 from: https://www.defcon.org/html/links/dc_press_archives/12/citylife_hackingtheplanet.htm
  • Epley , N. and Gilovich , T. 1999 . Just going along: Nonconscious priming and conformity to social pressure. . Journal of Personality and Social Psychology , 35 : 578 – 589 .
  • Halbert , D. 1997 . Discourses of danger and the computer hacker. . Information Society , 13 ( 4 ) : 361 – 374 .
  • Kaplan , H. B. and Johnson , R. J. 1991 . Negative social sanctions and juvenile delinquency: Effects of labeling in a model of deviant behavior. . Social Science Quarterly , 72 ( 1 ) : 98 – 122 .
  • Kshetri , N. 2006 . The simple economics of cybercrimes. . IEEE Security & Privacy , 4 ( 1 ) : 33 – 39 .
  • Leatherwood , M. L. and Spector , L. C. 1991 . Enforcements, inducements, expected utility and employee misconduct. . Journal of Management , 17 ( 3 ) : 553 – 569 .
  • Levy , B. 1996 . Improving Memory in Old Age through Implicit Self Stereotyping. . Journal of Personality and Social Psychology , 71 : 1092 – 1107 .
  • Macrae , C. N. and Johnston , L. 1998 . Help, I need somebody: Automatic action and inaction. . Social Cognition , 16 : 400 – 417 .
  • McDevitt , J. , Balboni , J. , Garcia , L. and Gu , J. 2001 . Consequences for victims: A comparison of bias- and non-bias-motivated assaults. . American Behavioral Scientist , 45 ( 4 ) : 697 – 713 .
  • Mollick , E. 2005 . Tapping into the underground. . Sloan Management Review , 46 ( 4 ) : 21 – 24 .
  • Rogers , M. K. 2001 . Modern-day robin hood or moral disengagement: Understanding the justification for criminal computer activity. , Winnipeg , CA : Unpublished dissertation, University of Manitoba .
  • Sidel , R. 2007, January 18 . Giant retailer reveals customer data breach. . Wall Street Journal , : D1
  • Sinrod , E. J. and Reilly , W. P. 2000 . Hacking your way to hard time: Application of computer crime laws to specific types of hacking attacks. . Journal of Internet Laws , 4 ( 3 ) : 1 – 14 .
  • Skibell , R. 2003 . Cybercrimes & misdemeanors: Reevaluation of the computer fraud and abuse act. . Berkeley Technology Law Journal , 18 : 909 – 944 .
  • Skorodumova , O. 2004 . Hackers as information space phenomenon. . Social Sciences , 35 ( 4 ) : 105 – 113 .
  • Smith , D. J. and McVie , S. 2003 . Theory and method in the Edinburgh study of youth transitions and crime. . The British Journal of Criminology , 43 ( 1 ) : 169 – 195 .
  • Stone, T. M. Computer hacking. (1999). Retrieved August 27, 2007 from: http://www.uni.uiuc.edu/∼dstone/hacking.html
  • Von Hirsch , A. , Bottoms , A. E. , Burney , E. and Wickstrom , P. O. 1999 . Criminal deterrence and sentence severity. , Oxford : Hart .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.