Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Examining the social networks of malware writers and hackers
School of Criminal Justice, Michigan State University, Lansing, MI, United States.
Department of Geography and Earth Sciences, University of North Carolina at Charlotte, NC, United States.ORCID iD: 0000-0002-4101-4279
Department of Political Science, East Carolina University, NC, United States.
Spartan Devils Honeynet Chapter, The Honeynet Project, Seattle, WA, Broadway, United States.
2012 (English)In: International Journal of Cyber Criminology, E-ISSN 0974-2891, Vol. 6, no 1, p. 891-903Article in journal (Refereed) Published
Abstract [en]

A substantive body of research has emerged exploring the social dynamics and subculture of computer hacking. Few, however, have considered the structure of social networks in the hacker community due in part to the lack of visible information about active hackers or malware writers. Our research focuses on the rarely studied subject of underground networks of computer hackers. Thus, this study explores the social networks of a group of Russian hackers using publicly accessible data to understand the nature of social relationships and the ways that they affect information sharing and action. The findings demonstrate that there are a limited number of highly skilled hackers relative to those with some knowledge of computers. Additionally, those hackers with substantive technical skills are centrally located within friendship networks and are the focus of greater attention overall. The impact of these findings for our understanding of computer hacking, and peer networks generally are considered in detail.

Place, publisher, year, edition, pages
International Journal of Cyber Criminology , 2012. Vol. 6, no 1, p. 891-903
Keywords [en]
Computer hackers, Cyber crime, Geography of networks, Malicious software, Malware, Network analysis
National Category
Economics
Identifiers
URN: urn:nbn:se:hj:diva-58277Scopus ID: 2-s2.0-84867688873OAI: oai:DiVA.org:hj-58277DiVA, id: diva2:1689237
Available from: 2022-08-22 Created: 2022-08-22 Last updated: 2023-10-03Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

ScopusFulltext

Authority records

Strumsky, Deborah

Search in DiVA

By author/editor
Strumsky, Deborah
In the same journal
International Journal of Cyber Criminology
Economics

Search outside of DiVA

GoogleGoogle Scholar

urn-nbn

Altmetric score

urn-nbn
Total: 397 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf