|
|
|
|
LEADER |
00000naa a22000002 4500 |
001 |
1739011139 |
003 |
DE-627 |
005 |
20201118103648.0 |
007 |
cr uuu---uuuuu |
008 |
201118s2017 xx |||||o 00| ||eng c |
024 |
7 |
|
|a 10.1177/1043986217699100
|2 doi
|
035 |
|
|
|a (DE-627)1739011139
|
035 |
|
|
|a (DE-599)KXP1739011139
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rda
|
041 |
|
|
|a eng
|
100 |
1 |
|
|a Holt, Thomas J.
|d 1978-
|e VerfasserIn
|0 (DE-588)14391930X
|0 (DE-627)704643197
|0 (DE-576)167596403
|4 aut
|
109 |
|
|
|a Holt, Thomas J. 1978-
|a Holt, Thomas Jeffrey 1978-
|
245 |
1 |
0 |
|a Exploring the Subculture of Ideologically Motivated Cyber-Attackers
|
264 |
|
1 |
|c 2017
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Research on physical, that is, violent, terror attacks and extremism has increased dramatically over the last decade. The growth of the Internet and computer technology has also led to concern over the use of cyberattacks by ideologically motivated offenders to cause harm and further their political and social agendas. There is, however, a lack of empirical research on cyber-attackers limiting our knowledge of the factors that affect their behavior. This study addresses this empirical gap through a qualitative analysis of 10 interviews conducted with ideologically motivated Turkish computer hackers. The findings demonstrated that Turkish hackers motivated by an ideological agenda reflected the larger values of the hacker subculture, though the targets for their attacks were shaped directly by religious or political beliefs. We conclude by discussing in depth our findings and implications for counterterror and cybersecurity policy and practice.
|
700 |
1 |
|
|a Freilich, Joshua D.
|e VerfasserIn
|0 (DE-588)1075831423
|0 (DE-627)833977083
|0 (DE-576)18457045X
|4 aut
|
700 |
1 |
|
|a Chermak, Steven M.
|d 1964-
|e VerfasserIn
|0 (DE-588)1127256297
|0 (DE-627)881706507
|0 (DE-576)171603303
|4 aut
|
773 |
0 |
8 |
|i Enthalten in
|t Journal of contemporary criminal justice
|d London : Sage, 1978
|g 33(2017), 3, Seite 212-233
|h Online-Ressource
|w (DE-627)324529228
|w (DE-600)2027876-7
|w (DE-576)095238050
|x 1552-5406
|7 nnns
|
773 |
1 |
8 |
|g volume:33
|g year:2017
|g number:3
|g pages:212-233
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1177/1043986217699100
|x Resolving-System
|3 Volltext
|
936 |
u |
w |
|d 33
|j 2017
|e 3
|h 212-233
|
951 |
|
|
|a AR
|
ELC |
|
|
|a 1
|
LOK |
|
|
|0 000 xxxxxcx a22 zn 4500
|
LOK |
|
|
|0 001 380658706X
|
LOK |
|
|
|0 003 DE-627
|
LOK |
|
|
|0 004 1739011139
|
LOK |
|
|
|0 005 20201118103648
|
LOK |
|
|
|0 008 201118||||||||||||||||ger|||||||
|
LOK |
|
|
|0 040
|a DE-21-110
|c DE-627
|d DE-21-110
|
LOK |
|
|
|0 092
|o n
|
LOK |
|
|
|0 689
|a s
|a Cybercrime
|
LOK |
|
|
|0 689
|a s
|a Cyberterror
|
LOK |
|
|
|0 689
|a s
|a Computer hacking
|
LOK |
|
|
|0 689
|a s
|a Hacktivism
|
LOK |
|
|
|0 689
|a s
|a Extremism
|
LOK |
|
|
|0 852
|a DE-21-110
|
LOK |
|
|
|0 852 1
|9 00
|
LOK |
|
|
|0 935
|a krub
|a krzo
|
ORI |
|
|
|a SA-MARC-krimdoka001.raw
|