Assessing the correlates of cyberattacks against high-visibility institutions

While cyberattacks are a persistent problem, particularly web defacements, it is unclear what factors differentiate the likelihood of these attacks based on the type of institution that could be targeted. Military and government entities are high-visibility targets for some attackers, though it is u...

Full description

Saved in:  
Bibliographic Details
Authors: Lee, Jin R. (Author) ; Holt, Thomas J. 1978- (Author)
Format: Electronic Article
Language:English
Published: 2023
In: Criminal justice studies
Year: 2023, Volume: 36, Issue: 3, Pages: 251-268
Online Access: Volltext (lizenzpflichtig)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000caa a22000002 4500
001 1869448839
003 DE-627
005 20231108121136.0
007 cr uuu---uuuuu
008 231107s2023 xx |||||o 00| ||eng c
024 7 |a 10.1080/1478601X.2023.2254098  |2 doi 
035 |a (DE-627)1869448839 
035 |a (DE-599)KXP1869448839 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Lee, Jin R.  |e VerfasserIn  |0 (DE-588)1206224479  |0 (DE-627)1692189506  |4 aut 
109 |a Lee, Jin R.  |a Lee, Jin 
245 1 0 |a Assessing the correlates of cyberattacks against high-visibility institutions 
264 1 |c 2023 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a While cyberattacks are a persistent problem, particularly web defacements, it is unclear what factors differentiate the likelihood of these attacks based on the type of institution that could be targeted. Military and government entities are high-visibility targets for some attackers, though it is unclear whether they are more likely to be defaced on the basis of their operational characteristics or the motives of the attacker. The same is true for educational institutions, which are frequently targeted by ideologically motivated hackers and others seeking to abuse their IT infrastructure. The current study attempted to address this gap in the literature through the application of routine activities theory to identify the factors significantly associated with web defacements against military, government, and educational web domains. Using a sample of 2.2 million web defacements, we examined the perceived value, inertia, visibility, and accessibility of the targets and the attack methods employed in each defacement. The implications of this analysis for our understanding of cyberattacks against high-visibility institutions are discussed in detail. 
650 4 |a Routine Activity Theory 
650 4 |a Cybercrime 
650 4 |a high-visibility institutions 
650 4 |a cyberattacks 
650 4 |a Web defacement 
700 1 |a Holt, Thomas J.  |d 1978-  |e VerfasserIn  |0 (DE-588)14391930X  |0 (DE-627)704643197  |0 (DE-576)167596403  |4 aut 
773 0 8 |i Enthalten in  |t Criminal justice studies  |d Getzville, NY : HeinOnline, 2003  |g 36(2023), 3, Seite 251-268  |h Online-Ressource  |w (DE-627)385031890  |w (DE-600)2142127-4  |w (DE-576)27177309X  |x 1478-6028  |7 nnns 
773 1 8 |g volume:36  |g year:2023  |g number:3  |g pages:251-268 
856 4 0 |u https://doi.org/10.1080/1478601X.2023.2254098  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
912 |a NOMM 
935 |a mkri 
936 u w |d 36  |j 2023  |e 3  |h 251-268 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4403431291 
LOK |0 003 DE-627 
LOK |0 004 1869448839 
LOK |0 005 20231107043604 
LOK |0 008 231107||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)KrimDok#2023-11-06#8BD4853F5CBC731C3709D37755A75D446A1BE8B3 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a zota 
ORI |a WA-MARC-krimdoka001.raw