메뉴 건너뛰기




Volumn 24, Issue 4, 2007, Pages 281-287

Hacking into the minds of hackers

Author keywords

Computer crime; Hacker; Security

Indexed keywords

HACKER; SECURITY; UTILITY VALUES;

EID: 35148899544     PISSN: 10580530     EISSN: None     Source Type: Journal    
DOI: 10.1080/10580530701585823     Document Type: Article
Times cited : (71)

References (22)
  • 2
    • 0030210417 scopus 로고    scopus 로고
    • Automatocity of social behavior: Direct effects of trait construct and stereotype activation on action
    • Bargh, J. A., Chen, M., & Burrows, L. (1996). Automatocity of social behavior: Direct effects of trait construct and stereotype activation on action. Journal of Personality and Social Psychology, 71, 230-244.
    • (1996) Journal of Personality and Social Psychology , vol.71 , pp. 230-244
    • Bargh, J.A.1    Chen, M.2    Burrows, L.3
  • 4
    • 14544292121 scopus 로고    scopus 로고
    • Why computer scientists should attend hacker conferences
    • Conti, G. (2005). Why computer scientists should attend hacker conferences, Communications of the ACM. 48(3), 23-24.
    • (2005) Communications of the ACM , vol.48 , Issue.3 , pp. 23-24
    • Conti, G.1
  • 6
    • 0033420443 scopus 로고    scopus 로고
    • Just going along: Nonconscious priming and conformity to social pressure
    • Epley, N., & Gilovich, T. (1999). Just going along: Nonconscious priming and conformity to social pressure. Journal of Personality and Social Psychology, 35. 578-589.
    • (1999) Journal of Personality and Social Psychology , vol.35 , pp. 578-589
    • Epley, N.1    Gilovich, T.2
  • 7
    • 21944448888 scopus 로고    scopus 로고
    • Discourses of danger and the computer hacker
    • Halbert, D. (1997). Discourses of danger and the computer hacker. Information Society, 73(4), 361-374.
    • (1997) Information Society , vol.73 , Issue.4 , pp. 361-374
    • Halbert, D.1
  • 8
    • 84928836428 scopus 로고
    • Negative social sanctions and juvenile delinquency: Effects of labeling in a model of deviant behavior
    • Kaplan, H. B. & Johnson, R.J. (1991). Negative social sanctions and juvenile delinquency: Effects of labeling in a model of deviant behavior. Social Science Quarterly, 72 (1), 98-122.
    • (1991) Social Science Quarterly , vol.72 , Issue.1 , pp. 98-122
    • Kaplan, H.B.1    Johnson, R.J.2
  • 9
    • 33244491931 scopus 로고    scopus 로고
    • The simple economics of cybercrimes
    • Kshetri, N. (2006) The simple economics of cybercrimes. IEEE Security & Privacy, 4 (1), 33-39.
    • (2006) IEEE Security & Privacy , vol.4 , Issue.1 , pp. 33-39
    • Kshetri, N.1
  • 10
    • 84965761374 scopus 로고
    • Enforcements, inducements, expected utility and employee misconduct
    • Leatherwood, M. L. & Spector, L. C. (1991). Enforcements, inducements, expected utility and employee misconduct. Journal of Management, 17 (3), 553-569.
    • (1991) Journal of Management , vol.17 , Issue.3 , pp. 553-569
    • Leatherwood, M.L.1    Spector, L.C.2
  • 11
    • 0030341964 scopus 로고    scopus 로고
    • Improving Memory in Old Age through Implicit Self Stereotyping
    • Levy, B. (1996). Improving Memory in Old Age through Implicit Self Stereotyping. Journal of Personality and Social Psychology. 71, 1092-1107.
    • (1996) Journal of Personality and Social Psychology , vol.71 , pp. 1092-1107
    • Levy, B.1
  • 12
    • 0032264105 scopus 로고    scopus 로고
    • Help, I need somebody: Automatic action and inaction
    • Macrae, C. N. & Johnston, L. (1998). Help, I need somebody: Automatic action and inaction. Social Cognition, 16, 400-417.
    • (1998) Social Cognition , vol.16 , pp. 400-417
    • Macrae, C.N.1    Johnston, L.2
  • 13
    • 23044531794 scopus 로고    scopus 로고
    • Consequences for victims: A comparison of bias- and non-bias-motivated assaults
    • McDevitt, J., Balboni, J., Garcia, L., & Gu, J. (2001). Consequences for victims: A comparison of bias- and non-bias-motivated assaults. American Behavioral Scientist, 45 (4), 697-713.
    • (2001) American Behavioral Scientist , vol.45 , Issue.4 , pp. 697-713
    • McDevitt, J.1    Balboni, J.2    Garcia, L.3    Gu, J.4
  • 14
    • 23444457598 scopus 로고    scopus 로고
    • Tapping into the underground
    • Mollick, E. (2005) Tapping into the underground. Sloan Management Review, 46 (4), 21-24.
    • (2005) Sloan Management Review , vol.46 , Issue.4 , pp. 21-24
    • Mollick, E.1
  • 16
    • 49849096421 scopus 로고    scopus 로고
    • Giant retailer reveals customer data breach
    • January 18
    • Sidel, R. (2007, January 18). Giant retailer reveals customer data breach. Wall Street Journal, D1.
    • (2007) Wall Street Journal
    • Sidel, R.1
  • 17
    • 84886759103 scopus 로고    scopus 로고
    • Hacking your way to hard time: Application of computer crime laws to specific types of hacking attacks
    • Sinrod, E. J. & Reilly, W. P. (2000). Hacking your way to hard time: Application of computer crime laws to specific types of hacking attacks. Journal of Internet Laws, 4 (3), 1-14.
    • (2000) Journal of Internet Laws , vol.4 , Issue.3 , pp. 1-14
    • Sinrod, E.J.1    Reilly, W.P.2
  • 18
    • 33847372060 scopus 로고    scopus 로고
    • Cybercrimes & misdemeanors: Reevaluation of the computer fraud and abuse act
    • Skibell, R. (2003). Cybercrimes & misdemeanors: Reevaluation of the computer fraud and abuse act. Berkeley Technology Law Journal, 18, 909-944.
    • (2003) Berkeley Technology Law Journal , vol.18 , pp. 909-944
    • Skibell, R.1
  • 19
    • 85044795112 scopus 로고    scopus 로고
    • Hackers as information space phenomenon
    • Skorodumova, O. (2004). Hackers as information space phenomenon. Social Sciences, 35 (4), 105-113.
    • (2004) Social Sciences , vol.35 , Issue.4 , pp. 105-113
    • Skorodumova, O.1
  • 20
    • 0037258929 scopus 로고    scopus 로고
    • Theory and method in the Edinburgh study of youth transitions and crime
    • Smith, D. J. & McVie, S. (2003). Theory and method in the Edinburgh study of youth transitions and crime. The British Journal of Criminology, 43 (1), 169-195.
    • (2003) The British Journal of Criminology , vol.43 , Issue.1 , pp. 169-195
    • Smith, D.J.1    McVie, S.2
  • 21
    • 84876621260 scopus 로고    scopus 로고
    • Stone, T. M. Computer hacking. (1999). Retrieved August 27, 2007 from: http://www.uni.uiuc.edu/~dstone/hacking.html.
    • Stone, T. M. Computer hacking. (1999). Retrieved August 27, 2007 from: http://www.uni.uiuc.edu/~dstone/hacking.html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.