Hacktivism: from loners to formal organizations?: assessing the social organization of hacktivist networks
The organizational aspects of hacktivist networks are seldom studied, with research mainly focused on exploratory and descriptive case studies. To narrow the gap, we have used the sociological model for the social organization of deviants developed by Best and Luckenbill (1994). Said model illustrat...
Autores principales: | ; |
---|---|
Tipo de documento: | Electrónico Artículo |
Lenguaje: | Inglés |
Publicado: |
2025
|
En: |
Deviant behavior
Año: 2025, Volumen: 46, Número: 9, Páginas: 1104-1124 |
Acceso en línea: |
Volltext (kostenfrei) Volltext (kostenfrei) |
Journals Online & Print: | |
Verificar disponibilidad: | HBZ Gateway |
Palabras clave: |
Sumario: | The organizational aspects of hacktivist networks are seldom studied, with research mainly focused on exploratory and descriptive case studies. To narrow the gap, we have used the sociological model for the social organization of deviants developed by Best and Luckenbill (1994). Said model illustrates how hacktivist networks are organized and contributes to a clear-cut categorization useful when dealing with hacktivism. Our study uses a rich dataset obtained from 32 semi-structured qualitative interviews conducted within 23 different networks. By expanding on past research on cybercriminal and hacktivist networks, the results show that hacktivists operate at varying levels of sophistication, favoring small, well-organized teams where roles and tasks are clearly divided. While there are differences among networks, our analysis reveals the importance of individual actions within larger operations: being affiliated with like-minded people, the existence of internal rules, and the importance of hacking skills to determine, if not hierarchies, then who is the most influential. Most of the networks analyzed were classified as "peers" or "teams," although the landscape shows considerable heterogeneity. Compared to other cybercriminal networks, hacktivists seem to have lower level of sophistication, while embracing the hacking subculture that places importance on the role of the individual within the network. |
---|---|
Notas: | Literaturverzeichnis: Seite 1122-1124 |
ISSN: | 1521-0456 |
DOI: | 10.1080/01639625.2024.2431066 |