CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?

This project examines the protection methods suggested by hackers to guard against online victimization through the lens of Situation Crime Prevention. Data were collected from 85 webpages representing three categories of electronic communications: forums, blogs, and fan pages. The goal of this proj...

Ausführliche Beschreibung

Gespeichert in:  
Bibliographische Detailangaben
1. VerfasserIn: Chavez, Nicholas Marshall (VerfasserIn)
Medienart: Elektronisch Buch
Sprache:Englisch
Veröffentlicht: 2018
In:Jahr: 2018
Online-Zugang: Volltext (kostenfrei)
Verfügbarkeit prüfen: HBZ Gateway

MARC

LEADER 00000nam a22000002 4500
001 186613020X
003 DE-627
005 20231018043645.0
007 cr uuu---uuuuu
008 231018s2018 xx |||||o 00| ||eng c
035 |a (DE-627)186613020X 
035 |a (DE-599)KXP186613020X 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Chavez, Nicholas Marshall  |e VerfasserIn  |4 aut 
245 1 0 |a CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS? 
264 1 |c 2018 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a This project examines the protection methods suggested by hackers to guard against online victimization through the lens of Situation Crime Prevention. Data were collected from 85 webpages representing three categories of electronic communications: forums, blogs, and fan pages. The goal of this project was to identify which of the 25 opportunity reduction techniques the hacking community recommend most often, as well as, what level of expertise was associated with the suggested security measures. Results indicate that the technique most recommended by the hacking community was to remove targets with 27% of the total codings. From the results three themes were found: (1) most recommendations are such that implementing the strategies would serve to protect against opportunistic, low-skilled attacks; (2) most recommendations could be considered routine precautions, that when bundled, would secure most people against cyber-theft; and finally, (3) the Situational Crime Prevention framework was not fully realized because much of cyber-theft does not involve direct victim-perpetrator interactions. From these three themes policy recommendation and limitations are presented as well as avenues for future research 
856 4 0 |u https://core.ac.uk/download/160477548.pdf  |x Verlag  |z kostenfrei  |3 Volltext 
912 |a NOMM 
935 |a mkri 
951 |a BO 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4391810964 
LOK |0 003 DE-627 
LOK |0 004 186613020X 
LOK |0 005 20231018043645 
LOK |0 008 231018||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)CORE39990958 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a core 
OAS |a 1 
ORI |a SA-MARC-krimdoka001.raw