메뉴 건너뛰기




Volumn 51, Issue 2, 2010, Pages 31-41

Social network analysis of a criminal hacker community

Author keywords

Hacker; Hacker groups; Network analysis; Shadowcrew; Social organization

Indexed keywords


EID: 79951846085     PISSN: 08874417     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (93)

References (53)
  • 1
    • 84876667596 scopus 로고    scopus 로고
    • Febrary 12, Available
    • Abdulmutallab, U. F. (Febrary 12, 2010). Umar Farouk Abdulmutallab. Available: http://topics.nytimes.comtop/reference/timestopics/people/a/umar- farouk-abdul mutallab/index.html
    • (2010) Umar Farouk Abdulmutallab.
    • Abdulmutallab, U.F.1
  • 2
    • 0034721164 scopus 로고    scopus 로고
    • Error and attack tolerance of complex networks
    • Albert, R., Jcong, H., and Baraba'si, A.-L., "Error and Attack Tolerance of Complex Networks," Nature, vol. 406, pp. 378-382, 2000.
    • (2000) Nature , vol.406 , pp. 378-382
    • Albert, R.1    Jcong, H.2    Baraba'Si, A.-L.3
  • 3
    • 84925923967 scopus 로고
    • The social organization of deviants
    • Best, J. and Luckenbill, D. F., "The Social Organization of Deviants," Social Problems, vol. 28, pp. 14-31, 1980.
    • (1980) Social Problems , vol.28 , pp. 14-31
    • Best, J.1    Luckenbill, D.F.2
  • 5
    • 0001316531 scopus 로고
    • Factoring and weighting approaches to status scores and clique identification
    • Bonacich, P., "Factoring and Weighting Approaches to Status Scores and Clique Identification," Journal of Mathematical Sociology, vol. 2, pp. 113-120, 1972.
    • (1972) Journal of Mathematical Sociology , vol.2 , pp. 113-120
    • Bonacich, P.1
  • 8
    • 0004588719 scopus 로고
    • Coding choices for textual analysis: A comparison of content analysis and map analysis
    • P. Marsden, Ed., ed Oxford: Blackwell
    • Carley, K. M., "Coding Choices for Textual Analysis: A Comparison of Content Analysis and Map Analysis," in Sociological Methodology 23, P. Marsden, Ed., ed Oxford: Blackwell, 1993, pp. 75-126.
    • (1993) Sociological Methodology 23 , pp. 75-126
    • Carley, K.M.1
  • 9
    • 29144478725 scopus 로고    scopus 로고
    • Dynamic network analysis
    • R. Breiger, K. M. Carley, and P. Pattison, Eds., ed: Committee on Human Factors, National Research Council
    • Carley, K. M., "Dynamic Network Analysis," in Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers, R. Breiger, K. M. Carley, and P. Pattison, Eds., ed: Committee on Human Factors, National Research Council, 2003, pp. 133-145.
    • (2003) Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers , pp. 133-145
    • Carley, K.M.1
  • 10
    • 34547683560 scopus 로고    scopus 로고
    • Toward an interoperable dynamic network analysis toolkit
    • Carley, K. M., et al., "Toward an Interoperable Dynamic Network Analysis Toolkit," Decision Support Systems, vol. 43, pp. 1324-1347, 2007.
    • (2007) Decision Support Systems , vol.43 , pp. 1324-1347
    • Carley, K.M.1
  • 11
    • 33751163289 scopus 로고    scopus 로고
    • Mining communities and their relationships in blogs: A study of online hate groups
    • Chau, M. and Xu, J., "Mining Communities and Their Relationships in Blogs: A Study of Online Hate Groups," International Journal of Human-Computer Studies, vol. 65, pp. 57-70, 2007.
    • (2007) International Journal of Human-Computer Studies , vol.65 , pp. 57-70
    • Chau, M.1    Xu, J.2
  • 12
    • 70349346926 scopus 로고    scopus 로고
    • Management of information security: Challenges and research directions
    • Choobineh, J., et al., "Management of Information Security: Challenges and Research Directions," Journal of the Association for Information Systems, vol. 20, pp. 958-971, 2007.
    • (2007) Journal of the Association for Information Systems , vol.20 , pp. 958-971
    • Choobineh, J.1
  • 14
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in information security research: Toward socio-organizational perspectives
    • Dhillon, G. and Backhouse, J., "Current Directions in Information Security Research: Toward Socio-Organizational Perspectives," Information Systems Journal, vol. 11, pp. 127-153, 2001.
    • (2001) Information Systems Journal , vol.11 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 16
    • 31044446654 scopus 로고    scopus 로고
    • Revealing social structure from texts: Metamatrix text analysis as a novel method for network text analysis
    • V. K. Narayanan and D. J. Armstrong, Eds., ed Harrisburg, PA: IDEA Group Publishing
    • Diesner, J. and Carley, K. M., "Revealing Social Structure from Texts: Metamatrix Text Analysis as a Novel Method for Network Text Analysis," in Causal Mapping for Information Systems and Technology Research: Approaches, Advances, and Illustrations, V. K. Narayanan and D. J. Armstrong, Eds., ed Harrisburg, PA: IDEA Group Publishing, 2005, pp. 81-108.
    • (2005) Causal Mapping for Information Systems and Technology Research: Approaches, Advances, and Illustrations , pp. 81-108
    • Diesner, J.1    Carley, K.M.2
  • 17
    • 33750177351 scopus 로고
    • Centrality in social networks: Conceptual clarification
    • Freeman, L., "Centrality in Social Networks: Conceptual Clarification," Social Networks, vol. 1, pp. 215-239, 1979.
    • (1979) Social Networks , vol.1 , pp. 215-239
    • Freeman, L.1
  • 21
    • 79951840237 scopus 로고    scopus 로고
    • Hacks, cracks, and crime: An examination of the subculture and social
    • Ph.D., University of Missouri, St. Louis, Missouri
    • Holt, T. J., "Hacks, Cracks, and Crime: An Examination of the Subculture and Social," Ph.D., Criminology and Criminal Justice, University of Missouri, St. Louis, Missouri, 2005.
    • (2005) Criminology and Criminal Justice
    • Holt, T.J.1
  • 22
    • 85035287319 scopus 로고    scopus 로고
    • Attack vulnerability of complex networks
    • Homle, P., et al., "Attack Vulnerability of Complex Networks," Physical Review E, vol. 65, 2002.
    • (2002) Physical Review e , vol.65
    • Homle, P.1
  • 23
    • 77957057727 scopus 로고    scopus 로고
    • Fear appeals and information security behaviors: An empirical study
    • Johnston, A. C and Warkentin, M., "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly, vol. 34, 2010.
    • (2010) MIS Quarterly , vol.34
    • Johnston, A.C.1    Warkentin, M.2
  • 28
    • 0000133760 scopus 로고
    • Threats to information systems: Today's reality, yesterday's understanding
    • Loch, K. D., Carr, H. H., and Warkentin, M. E., "Threats to Information Systems: Today's Reality, Yesterday's Understanding," MIS Quarterly, vol. 16, pp. 173-186, 1991.
    • (1991) MIS Quarterly , vol.16 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 30
    • 84884439164 scopus 로고    scopus 로고
    • September 26, Available
    • McCormick, J. and Gage, D. (September 26, 2008). Shadowcrew: Web Mobs. Available: http://www.baselinemag.com/c/a/Security/Shadowcrew-Web-Mobs/
    • (2008) Shadowcrew: Web Mobs.
    • McCormick, J.1    Gage, D.2
  • 34
    • 61349092288 scopus 로고    scopus 로고
    • Studying users' computer security behavior: A health belief perspective
    • Ng, B.-Y., Kankanhalli, A., and Xu, Y., "Studying users' computer security behavior: A health belief perspective," Decision Support Systems, vol. 46, pp. 815-825, 2009.
    • (2009) Decision Support Systems , vol.46 , pp. 815-825
    • Ng, B.-Y.1    Kankanhalli, A.2    Xu, Y.3
  • 37
    • 34249671060 scopus 로고    scopus 로고
    • Operations security awareness: The mind has no firewall
    • Rhodes, K., "Operations security awareness: the mind has no firewall," Computer Security Journal, vol. 18, 2001.
    • (2001) Computer Security Journal , vol.18
    • Rhodes, K.1
  • 40
    • 0036326689 scopus 로고    scopus 로고
    • Taking a stand on hackers
    • Schultz, E., "Taking a stand on hackers," Computers & Security, vol. 21, pp. 382-384, 2002.
    • (2002) Computers & Security , vol.21 , pp. 382-384
    • Schultz, E.1
  • 41
    • 30744438863 scopus 로고    scopus 로고
    • An analysis of the traditional is security approaches: Implications for research and practice
    • Siponen, M. T., "An Analysis of the Traditional IS Security Approaches: Implications for Research and Practice," European Journal of Information Systems, vol. 14, pp. 303-315, 2005.
    • (2005) European Journal of Information Systems , vol.14 , pp. 303-315
    • Siponen, M.T.1
  • 42
    • 76649092853 scopus 로고    scopus 로고
    • Behavioral information security: Two end user survey studies of motivation and security practices, in
    • New York City, New York
    • Stanton, J. M., et al., "Behavioral information security: two end user survey studies of motivation and security practices," in the Tenth America's Conference on Information Systems, New York City, New York, 2004.
    • (2004) The Tenth America's Conference on Information Systems
    • Stanton, J.M.1
  • 43
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • Straub, D. W., "Effective IS Security: An Empirical Study," Information Systems Research, vol. 1, pp. 255-276, 1990.
    • (1990) Information Systems Research , vol.1 , pp. 255-276
    • Straub, D.W.1
  • 44
    • 79951820897 scopus 로고    scopus 로고
    • Framing of information security policies and practice
    • D. W. Straub, S. Goodman, and R. Baskerville, Eds., ed Armonk, NY: M. E. Sharpe
    • Straub, D. W., Goodman, S., and Baskerville, R., "Framing of Information Security Policies and Practice," in Information Security Policies, Processes, and Practices, D. W. Straub, S. Goodman, and R. Baskerville, Eds., ed Armonk, NY: M. E. Sharpe, 2008.
    • (2008) Information Security Policies, Processes, and Practices
    • Straub, D.W.1    Goodman, S.2    Baskerville, R.3
  • 45
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D. W. and Welke, R. J., "Coping with systems risk: security planning models for management decision making," MIS Quarterly, vol. 22, pp. 441-469, 1998.
    • (1998) MIS Quarterly , vol.22 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 48
    • 0345257994 scopus 로고    scopus 로고
    • Minneapolis, MN: University of Minnesote Press
    • Thomas, D., Hacker Culture. Minneapolis, MN: University of Minnesote Press, 2002.
    • (2002) Hacker Culture.
    • Thomas, D.1
  • 53
    • 20344376408 scopus 로고    scopus 로고
    • Criminal network analysis and visualization
    • Xu, J. and Chen, H., "Criminal Network Analysis and Visualization," Commun. ACM, vol. 48, pp. 100-107, 2005.
    • (2005) Commun. ACM , vol.48 , pp. 100-107
    • Xu, J.1    Chen, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.