메뉴 건너뛰기




Volumn 13, Issue 3, 2012, Pages 160-175

The social network of hackers

Author keywords

botnet; hackers; organised crime; social network analysis

Indexed keywords


EID: 84865416232     PISSN: 17440572     EISSN: 17440580     Source Type: Journal    
DOI: 10.1080/17440572.2012.702523     Document Type: Article
Times cited : (80)

References (44)
  • 1
    • 34249319104 scopus 로고    scopus 로고
    • Law-Enforcement Disruption of a Drug Importation Network
    • Morselli, Carlo, and Katia Petit, 'Law-Enforcement Disruption of a Drug Importation Network', Global Crime 8, no. 2 (2007): 109-30.
    • (2007) Global Crime , vol.8 , Issue.2 , pp. 109-130
    • Morselli, C.1    Petit, K.2
  • 7
    • 27844472177 scopus 로고    scopus 로고
    • Transnational Criminal Networks
    • eds. John Arquilla and David Ronfeldt, Santa Monica, CA: RAND Corporation
    • Williams, Phil, 'Transnational Criminal Networks', in Networks and Netwars: The Future of Terror, Crime, and Militancy, eds. John Arquilla and David Ronfeldt (Santa Monica, CA: RAND Corporation, 2001).
    • (2001) Networks and Netwars: The Future of Terror, Crime, and Militancy
    • Williams, P.1
  • 9
    • 36348994955 scopus 로고    scopus 로고
    • Social Network Analysis as an Approach to Combat Terrorism: Past, Present and Future Research
    • Ressler, Steve, 'Social Network Analysis as an Approach to Combat Terrorism: Past, Present and Future Research', Homeland Security Affairs 2, no. 2 (2006): 1-10.
    • (2006) Homeland Security Affairs , vol.2 , Issue.2 , pp. 1-10
    • Ressler, S.1
  • 10
    • 4243169182 scopus 로고    scopus 로고
    • Graph-Based Technologies for Intelligence Analysis
    • Coffman, T., S. Greenblatt, and S. Marcus, 'Graph-Based Technologies for Intelligence Analysis', Communications of the ACM 47, no. 3 (2004): 45-7.
    • (2004) Communications of the ACM , vol.47 , Issue.3 , pp. 45-47
    • Coffman, T.1    Greenblatt, S.2    Marcus, S.3
  • 13
    • 20344376408 scopus 로고    scopus 로고
    • Criminal Network Analysis and Visualization
    • Xu, Jennifer, and Hsinchun Chen, 'Criminal Network Analysis and Visualization', Communications of the ACM 48, no. 6 (2005): 101-7.
    • (2005) Communications of the ACM , vol.48 , Issue.6 , pp. 101-107
    • Xu, J.1    Chen, H.2
  • 14
    • 33745889592 scopus 로고    scopus 로고
    • Analysing the Terrorist Social Networks with Visualization Tools
    • Yang, C., N. Liu, and M. Sageman, 'Analysing the Terrorist Social Networks with Visualization Tools', Intelligence and Security Informatics (2006): 331-42.
    • (2006) Intelligence and Security Informatics , pp. 331-342
    • Yang, C.1    Liu, N.2    Sageman, M.3
  • 16
    • 3042526674 scopus 로고    scopus 로고
    • Terrorist/Liberators: Researching and Dealing with Adversary Social Networks
    • van Meter, Karl M., 'Terrorist/Liberators: Researching and Dealing with Adversary Social Networks', Connection 24, no. 3 (2002): 66-78.
    • (2002) Connection , vol.24 , Issue.3 , pp. 66-78
    • van, M.1    Karl, M.2
  • 20
    • 77951583374 scopus 로고    scopus 로고
    • Using Social Network Analysis to Target Criminal Networks
    • Schwartz, Daniel M. and Tony D.A. Rouselle, 'Using Social Network Analysis to Target Criminal Networks', Trends in Organized Crime 12 no. 2, (2008): 188-207.
    • (2008) Trends In Organized Crime , vol.12 , Issue.2 , pp. 188-207
    • Schwartz, D.M.1    Rouselle, T.D.A.2
  • 21
    • 34247160604 scopus 로고    scopus 로고
    • Upper Saddle River, NJ: Pearson Prentice Hall
    • Grabosky, Peter, Electronic Crime (Upper Saddle River, NJ: Pearson Prentice Hall, 2007).
    • (2007) Electronic Crime
    • Grabosky, P.1
  • 25
    • 84865427614 scopus 로고    scopus 로고
    • Note
    • It is common for people who use IRC to change their nicknames frequently, making it very difficult for researchers to keep track of all the nicknames used by hackers. We analysed the distribution of nicknames found in the conversations and merged the nicknames that were nearly identical (ex: Poison and Poison). We also identified the nicknames for bots (computer programs) used by hackers to send commands through IRC and removed them from our sample. (These bots were easily recognisable by the string of numbers appended to their nicknames.) The resulting dataset included 771 individuals. In order to protect their privacy, the online nicknames of the individuals will not be used in this article. We assigned each individual a numeric code (N1, N2, N3, etc.) that is used to identify them in the rest of this article. The police organisation that provided us the dataset also added an additional layer of privacy protection for the people involved in this study (including convicted hackers) by refusing to disclose the real identities behind the nicknames.
  • 26
    • 0039593329 scopus 로고
    • The Social Organization of the Computer Underground
    • Master's thesis in sociology, Northern Illinois University
    • Meyer, Gordon R., 'The Social Organization of the Computer Underground' (Master's thesis in sociology, Northern Illinois University, 1989).
    • (1989)
    • Meyer, G.R.1
  • 27
    • 0042855099 scopus 로고    scopus 로고
    • A Sociology of Hackers
    • Jordan, Tim, and Paul Taylor, 'A Sociology of Hackers', The Sociological Review 46, no. 4 (1998): 757-80.
    • (1998) The Sociological Review , vol.46 , Issue.4 , pp. 757-780
    • Jordan, T.1    Taylor, P.2
  • 29
    • 55149123066 scopus 로고    scopus 로고
    • Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers
    • eds. Frank Schmalleger, and Michael Pittaro, Upper Saddle River, NJ: Pearson
    • Holt, Thomas J., 'Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers', in Crimes of the Internet, eds. Frank Schmalleger, and Michael Pittaro (Upper Saddle River, NJ: Pearson, 2009), 336-55.
    • (2009) Crimes of the Internet , pp. 336-355
    • Holt, T.J.1
  • 32
    • 57249097134 scopus 로고    scopus 로고
    • Who's in the Network? When Stakeholders Influence Data Analysis
    • Prell, C.K. Hubacek, C. Quinn, and M. Reed, 'Who's in the Network? When Stakeholders Influence Data Analysis', Systemic Practice and Action Research 21, no. 6 (2008): 443-58.
    • (2008) Systemic Practice and Action Research , vol.21 , Issue.6 , pp. 443-458
    • Prell, C.K.H.1    Quinn, C.2    Reed, M.3
  • 33
    • 70349639385 scopus 로고    scopus 로고
    • An Empirical Study of the Driving Forces Behind Online Communities
    • Toral, S.L., M.R. Martinez-Torres, F. Barrero, and F. Cortes, 'An Empirical Study of the Driving Forces Behind Online Communities', Internet Research 19, no. 4 (2009): 378-92.
    • (2009) Internet Research , vol.19 , Issue.4 , pp. 378-392
    • Toral, S.L.1    Martinez-Torres, M.R.2    Barrero, F.3    Cortes, F.4
  • 34
    • 84936824655 scopus 로고
    • Power and Centrality: A Family of Measures
    • Bonacich, P., 'Power and Centrality: A Family of Measures', The American Journal of Sociology 92, no. 5 (1987): 1170-82.
    • (1987) The American Journal of Sociology , vol.92 , Issue.5 , pp. 1170-1182
    • Bonacich, P.1
  • 35
    • 84865432797 scopus 로고    scopus 로고
    • Note
    • Borgatti is the creator of Ucinet, a software package used to study social networks that is very popular among academics. He has recently published an article in Science describing the current state of social networks analysis (Borgatti et al., 2009). His work on the political independence measure has yet to be published.
  • 37
    • 84865434024 scopus 로고    scopus 로고
    • This software is still not feature-complete according to Borgatti (2010). It has thus never been publicized or promoted by its creator. This does not affect the core functions of the software used for this article, which is available free of charge from Analytic Technologies' website
    • This software is still not feature-complete according to Borgatti (2010). It has thus never been publicized or promoted by its creator. This does not affect the core functions of the software used for this article, which is available free of charge from Analytic Technologies' website (www.analytictech.com).
  • 38
    • 33845632678 scopus 로고    scopus 로고
    • Visualizing Social Networks
    • accessed December 21, 2010
    • Freeman, Linton C., 'Visualizing Social Networks', Journal of Social Structure 1, no. 1 (2000), http://www.cmu.edu/joss/content/articles/volume1/Freeman.html (accessed December 21, 2010).
    • (2000) Journal of Social Structure , vol.1 , Issue.1
    • Freeman, L.C.1
  • 39
    • 84865442879 scopus 로고    scopus 로고
    • Note
    • The power in this network is held to stem from the ability to provide information and easy access to information.
  • 43
    • 39749093168 scopus 로고
    • The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information
    • Miller, George A., 'The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information', The Psychological Review 63, no. 2 (1956): 81-97.
    • (1956) The Psychological Review , vol.63 , Issue.2 , pp. 81-97
    • Miller, G.A.1
  • 44
    • 84970748043 scopus 로고
    • Social Network Analysis
    • Scott, John, 'Social Network Analysis', Sociology 22, no. 1 (1988): 109-27.
    • (1988) Sociology , vol.22 , Issue.1 , pp. 109-127
    • Scott, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.