Exploring the Subculture of Ideologically Motivated Cyber-Attackers

Research on physical, that is, violent, terror attacks and extremism has increased dramatically over the last decade. The growth of the Internet and computer technology has also led to concern over the use of cyberattacks by ideologically motivated offenders to cause harm and further their political...

Full description

Saved in:  
Bibliographic Details
Main Author: Holt, Thomas J. (Author)
Contributors: Freilich, Joshua D. ; Chermak, Steven M.
Format: Electronic Article
Language:English
Published: 2017
In: Journal of contemporary criminal justice
Online Access: Volltext (Resolving-System)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000naa a22000002 4500
001 1739011139
003 DE-627
005 20201118103648.0
007 cr uuu---uuuuu
008 201118s2017 xx |||||o 00| ||eng c
024 7 |a 10.1177/1043986217699100  |2 doi 
035 |a (DE-627)1739011139 
035 |a (DE-599)KXP1739011139 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
100 1 |a Holt, Thomas J.  |d 1978-  |e VerfasserIn  |0 (DE-588)14391930X  |0 (DE-627)704643197  |0 (DE-576)167596403  |4 aut 
109 |a Holt, Thomas J. 1978-  |a Holt, Thomas Jeffrey 1978- 
245 1 0 |a Exploring the Subculture of Ideologically Motivated Cyber-Attackers 
264 1 |c 2017 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Research on physical, that is, violent, terror attacks and extremism has increased dramatically over the last decade. The growth of the Internet and computer technology has also led to concern over the use of cyberattacks by ideologically motivated offenders to cause harm and further their political and social agendas. There is, however, a lack of empirical research on cyber-attackers limiting our knowledge of the factors that affect their behavior. This study addresses this empirical gap through a qualitative analysis of 10 interviews conducted with ideologically motivated Turkish computer hackers. The findings demonstrated that Turkish hackers motivated by an ideological agenda reflected the larger values of the hacker subculture, though the targets for their attacks were shaped directly by religious or political beliefs. We conclude by discussing in depth our findings and implications for counterterror and cybersecurity policy and practice. 
700 1 |a Freilich, Joshua D.  |e VerfasserIn  |0 (DE-588)1075831423  |0 (DE-627)833977083  |0 (DE-576)18457045X  |4 aut 
700 1 |a Chermak, Steven M.  |d 1964-  |e VerfasserIn  |0 (DE-588)1127256297  |0 (DE-627)881706507  |0 (DE-576)171603303  |4 aut 
773 0 8 |i Enthalten in  |t Journal of contemporary criminal justice  |d London : Sage, 1978  |g 33(2017), 3, Seite 212-233  |h Online-Ressource  |w (DE-627)324529228  |w (DE-600)2027876-7  |w (DE-576)095238050  |x 1552-5406  |7 nnns 
773 1 8 |g volume:33  |g year:2017  |g number:3  |g pages:212-233 
856 4 0 |u http://dx.doi.org/10.1177/1043986217699100  |x Resolving-System  |3 Volltext 
936 u w |d 33  |j 2017  |e 3  |h 212-233 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 380658706X 
LOK |0 003 DE-627 
LOK |0 004 1739011139 
LOK |0 005 20201118103648 
LOK |0 008 201118||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21-110  |c DE-627  |d DE-21-110 
LOK |0 092   |o n 
LOK |0 689   |a s  |a Cybercrime 
LOK |0 689   |a s  |a Cyberterror 
LOK |0 689   |a s  |a Computer hacking 
LOK |0 689   |a s  |a Hacktivism 
LOK |0 689   |a s  |a Extremism 
LOK |0 852   |a DE-21-110 
LOK |0 852 1  |9 00 
LOK |0 935   |a krub  |a krzo 
ORI |a SA-MARC-krimdoka001.raw