From Young Hackers To Crackers1

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/262153017

From Young Hackers to Crackers

Article  in  International Journal of Technology and Human Interaction · July 2013


DOI: 10.4018/jthi.2013070104

CITATIONS READS

4 1,585

1 author:

Jean-Loup Richet
University of Nantes
12 PUBLICATIONS   15 CITATIONS   

SEE PROFILE

All content following this page was uploaded by Jean-Loup Richet on 18 August 2015.

The user has requested enhancement of the downloaded file.


International Journal of Technology and Human Interaction, 9(3), 53-62, July-September 2013 53

From Young Hackers to Crackers


Jean-Loup Richet, University of Nantes, Nantes, France

ABSTRACT
A growing number of scholars state that the Internet presents “some unique opportunities for deviant behav-
ior” (Rogers et al, 2006). However, although some researchers have studied this issue, the factors leading
teenagers to adopt a web-deviant behavior have received less attention. From this background, the present
article sets out to explore the facilitators of cybercrime. The author will explain the diffusion of web-deviant
behavior amongst young people through an analysis of the literature while taking into consideration the
conceptual model of diffusion of innovation by Greenhalgh et al. (2004).

Keywords: Cracker, Cybercrime, Diffusion, Hacker, Innovation, Youth

INTRODUCTION Further, a growing number of scholars


state that the Internet presents “some unique
Cyberspace has created a new dimension of opportunities for deviant behavior” (Rogers
social interaction. It has transcended time and et al., 2006). Technology has given people the
space, and, as such, physical context is no unprecedented ability to hide their identities
longer linked with social situation. A virtual under cover of anonymity, and they can avoid
presence need not be true to the actual persona the penalty for embarrassing or illegitimate
of its creator in the physical world. This simple activity. Whereas few people (of any age) would
fact has had an alarming effect on the negative be able to walk into a room full of complete
cyber behaviors of today’s youth, who have strangers and share nude photos of themselves,
used the anonymity of the web to indulge in talk about sex, or discuss illegal use of drugs,
cybercrime or hacking. It has become critical they can do it online behind the “protection”
to inquire into and understand the growing of the magically anonymous keyboard. This
criminal cyber-behavior of teenagers. This re- ability profoundly affects the online behavior
quires a detailed study of the meanings of and of teenagers.
differences between hacking and cybercrime Nevertheless, although some researchers
and the visualization and use of these terms by have studied this issue, the factors leading
the youth alongside their attitudes towards both. teenagers to adopt a web-deviant behavior have

DOI: 10.4018/jthi.2013070104

Copyright © 2013, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
54 International Journal of Technology and Human Interaction, 9(3), 53-62, July-September 2013

received less attention. From this background, an intruder breaking into computer systems to
the present article sets out to explore the facilita- steal or destroy data. Police describe almost any
tors of hacking and cybercrime. This paper will crime committed through, with, by, or against
explain the diffusion of web-deviant behavior a computer as “hacking.” “For many people,
amongst young people through an analysis of the the hacker is an ominous figure, a smart-aleck
literature study while taking into consideration sociopath ready to burst out of his basement wil-
the conceptual model of diffusion of innovation derness and savage other people’s lives for his
by Greenhalgh et al. (2004). own anarchical convenience” (Sterling, 1993).
This concept of “hackers” is still the sub-
ject of heated controversy. In response to the
CYBERCRIME VS. HACKING common demonization of the term hacker, The
New Hacker’s Dictionary (Raymond & Steele,
Cyberspace transforms the scale and scope of
1991) has coined the term “cracker.” Crack-
offense; has its own limits, interactional forms,
ers use their computer-security-related skills
roles, and rules; and it has its own forms of
to author viruses, trojans, etc., and illegally
criminal endeavor (Capeller, 2001). According
infiltrate secure systems with the intention of
to Yar (2005), the “novel socio-interactional
doing harm to the system or criminal intent and
features of the cyberspace environment (pri-
to differentiate them from the original and non-
marily the collapse of spatial-temporal barriers,
criminal hacker. This article will use the term
many-to-many connectivity, and the anonymity
hacker in its original positive meaning and the
and plasticity of online identity) [...] make pos-
term cracker for those committing cybercrime.
sible new forms and patterns of illicit activity.”
Anyone who is computer literate can become
a cybercriminal. CONCEPTUAL MODEL
There is still no clear definition of “cyber- AND METHODOLOGY
crime” (Fafinski et al., 2010). In some cases,
cybercrime can encompass the use of computers Originally, hacking was seen as innovative
to assist “traditional” offending but it can also behavior; even the original term “hack” was a
be a crime mediated through technology (Wall, slang word used by MIT students in the 1950s
2007) or an exclusive technological crime, such to refer to an improvement. According to Rogers
as a denial-of-service attack). Many criminal (1983), an innovation is “an idea, practice, or
law scholars focus on the legalistic framework. object that is perceived as new by an individual
For instance, Wall (2001) uses the categories of or other unit of adoption.” Further, the central
criminal law to create categories of cybercrime. meaning of innovation relates to improvement
Others categorize cybercrime as an offense “re- or renewal, with novelty being a consequence
lated to computers, related to content or against of this improvement. However, eventually
the confidentiality, integrity and availability of hacking led to many teenagers deviating from
computer data and systems” (Council of Europe using their skills to improve or push the limits
Convention on Cybercrime, 2001). of their expertise to using those same skills
The use of the term “hacker” has changed for cybercrimes, such as Internet extortion
over the years from a positive and complimen- and fraud. Our hypothesis is that hacking is
tary definition — the enthusiastic computer an innovation compared to cybercrime and
programmer who is particularly brilliant — to a is different from either cyber or traditional
negative and pejorative one: the cybercriminal. criminal behavior. Computer hacking can lead
Nowadays, “cybercriminal” is a term syn- to constructive technological developments; for
onymous with “hacker.” Hacker, as a term, is example, former hackers Dennis Ritchie and
commonly used by the mass media to refer to Ken Thompson went on to create the UNIX

Copyright © 2013, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of Technology and Human Interaction, 9(3), 53-62, July-September 2013 55

operating system in the 1970s, and hacker literature reviews target prominent journals and
Shawn Fanning created Napster. An analysis conferences. This approach is relevant to mature
of literature through a model of diffusion of research topics but is not pertinent for a literature
innovation highlights the facilitators of hacking. review on cybercrime, as it is a contemporary
We used the conceptual model of diffu- phenomenon; therefore, focusing on limited
sion of innovation by Greenhalgh et al. (2004). outlets cannot be justified. In light of this, this
The authors conducted a systematic review of effort mainly focused on online databases and
empirical literature and theory pertaining to targeted Business Source Complete, ProQuest,
the diffusion of innovation. They studied 6,000 ScienceDirect, Scirus, Scopus, and Web of
papers, books, and abstracts, focusing on 495 Science. We conducted keyword and abstract
sources for the final report. They formulated a searches across these six databases for all avail-
conceptual model from the synthesis of these able years. Articles were filtered by scanning
theoretical and empirical findings; this model titles, abstracts, and excluding duplicates and
categorizes the critical success factors for in- articles only mentioning hacking or cybercrime
novation. that were not focused on these topics. After a full
The key attributes of successful innova- text review, irrelevant articles were discarded
tion indicated in their model involve multiple and we classified the remaining articles under
elements: each of the critical success factors described
by Greenhalgh et al.
1. Compatibility: Must be consistent with
the adopter’s values and perceived needs;
VALIDITY THREATS
2. Risk: Zero risk is highly unlikely, so we
have modified this need to an acceptable This paper has several limitations. First, al-
level of risk, where the possibility and value though the procedure followed includes search-
of loss is inferior to the expected positive ing, filtering, and classifying processes, our
outcome; approach is vulnerable to subjectivity because
3. Relative advantage: Better than the pre- it is based on a qualitative interpretation of the
vious model in terms of effectiveness or literature. Second, the sample was largely based
cost-effectiveness; on grey and professional literature. Although
4. Ability to solve user issues: Improving the search was oriented towards peer-reviewed
users’ performance; and scholarly articles, the literature on hackers
5. Observability: Must have visible benefits; is recent, and because it is industry-driven —
6. Accessibility: Must be easy to use and from the information systems security industry
require only a little knowledge; to national agencies — very few research articles
7. Adaptability: Must be modifiable to fit were found that also embrace this phenomenon,
users’ needs; compared to more mature literature like elec-
8. Support: Should be open to experiment tronic commerce. Even if untrustworthy studies
and have a supporting community provid- and non-rigorous articles are excluded from
ing training and customization. this review, the research method — a narrative
literature review — might hinder the ability of
This research used this framework to the present paper to draw a complete picture of
analyze the present literature on cybercrime the current development in this field. Finally,
and hacking. An extensive narrative literature the search criteria may be incomplete, as some
review (King & He, 2005) was conducted, papers that do not have the term cybercrime in
synthesizing prior research and analyzing it the keywords or abstract may not have been
with regard to the hypothesis. Traditionally, included.

Copyright © 2013, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
56 International Journal of Technology and Human Interaction, 9(3), 53-62, July-September 2013

FROM YOUNG HACKERS sis. According to this perspective, people choose


TO CRACKERS illegal over legal alternatives in the same way
they make consumption and economic choices
In this first part, we will study those two critical in the marketplace. The decision to commit a
success factors: risk and observability. crime involves calculations based on an as-
Hacking is a normal part of the lives of most sessment of the availability, risks, and costs
youngsters. Multiple surveys have been carried of the opportunity and one’s ability to reach a
out on teenagers and hacking (Panda Security, desired end. Low earnings or the lack of suffi-
2009; Trend Micro, 2009; Tufin Technolo- cient opportunities to obtain income are factors
gies, 2010). Although there is suspicion about behind committing crime. Teenagers have lower
industry bias, these studies generally come to earnings, fewer opportunities to obtain income,
the same conclusion: casual hacking is almost and may easily discount the future in assessing
as established a part of teenage life as down- the opportunity costs of crime (Becker, 1976).
loading music to an iPod. The most common Hacking is perceived as riskless and highly
reasons cited for hacking were “for fun,” (50%) compatible to the lifestyles of the computer-
followed by “curiosity” (30%). Over four out savvy teenage population.
of ten teens have hacked into another person’s Cracking, too, is perceived as low risk or
account to read e-mails, looked at another’s bank riskless — teenagers discount the future —
account details, or logged into another person’s and its benefits are apparent: how else could
social networking profile. The majority of these a teenager earn nearly £100,000 a year? The
young hackers are pranksters making fun of mass media indirectly promotes crackers’
their friends, but one in three teens have admit- earnings, and even academic studies show that
ted to being tempted to try hacking or spying spam is highly profitable and that botmasters
on the Internet to make money (with eventual (individuals who are responsible for or maintain
transition to cybercrime). The history of hack- a herd of compromised computers) can earn
ing is replete with juvenile hackers. Jonathan roughly $3,500,000 a year (Kanich et al., 2009;
James was a fifteen-year-old American hacker TrendMicro, 2011). Although cybercrime is
arrested in 1999 for a series of intrusions into under-recorded and under-reported (Fafinski
various systems from NASA to the Department et al., 2010), studies highlight crackers’ “huge
of Defense. Michael Calce was a Canadian high profits” (Bizeul, 2007; Shah & Cole, 2005)
school student who shut down Yahoo, Amazon, For instance, Esthost botnet owner generated
eBay, and other websites in 2000. at least $14 million in fraudulent advertising
However, many youngsters have also fees (FBI, 2011). The aim of this paper is not to
turned into crackers committing serious criminal give statistical evidence but to point out media
offenses. In 2005, eighteen-year-old Phillip emphasis on crackers’ revenue — Greenhalgh’s
Shortman from South Wales was sentenced for observability factor, i.e., visible benefits of on-
having fraudulently stolen £102,000 from eBay line crime compared to traditional crime. In fact,
users (Griffith, 2005). In 2009, young Australian the reality of cybercrimes is under documented,
cracker Anthony Scott Harrison infected more and some researchers criticize statistical abuse
than 3,000 computers to steal credit card and and misuse in information security (Ryan &
other bank account details with his malware in Jefferson, 2003; Florencio & Herley, 2011).
Australia and abroad (Fewster, 2010). In 2010,
twenty-one-year-old Alistair Peckover was
jailed for scamming, ID theft, and online fraud LOW BARRIERS TO ENTRY
of around £110,000 (Blincoe, 2010).
In economic theories of competition, barriers
In his economic approach to crime, G.
to entry are obstacles that make it difficult to
Becker (1968) states that people decide whether
enter a given market (Fisher, 1984); technical
to commit a crime through a cost-benefit analy-

Copyright © 2013, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of Technology and Human Interaction, 9(3), 53-62, July-September 2013 57

expertise and accessibility could act as barriers that may otherwise be hidden” (Billig et al.,
to entry. However, in this case, it is observed 2008). The main problem is that the majority
that the barriers to entry into the “world of of tools used by information systems security
hacking” through technical expertise are low; auditors can be used by hackers, too, whether
hence, we could say that Greenhalgh’s com- it be network protocol packet sniffers, network
patibility factor is present. Young people find vulnerability scanners, password recovery
hacking an easily accessible activity because tools, web server scanners, or packet crafters.
hacking is compatible with their lifestyle. Consequently, hackers disguise themselves
Computers are in everyone’s lives, and the with a disclaimer such as “this site is devoted
“digital natives” were born with Internet and a to internet security, and we help people in
keyboard (Prensky, 2001). These digital natives the security field investigate tools they are
make little distinction between the online and unfamiliar with.” Similarly, numerous books
offline realms, the virtual and the real (Palfrey on hacking were published during the 2000s;
& Gasser, 2008). They may not even know there was even a Hacking for Dummies. Several
that they behaved illegally (Kallman & Grillo, hacking tools are available online and require
1996); for example, searching on the web and very little knowledge (Krebs, 2006).
downloading a movie from a hacking forum Blogs and communities have hugely
board may seem like a casual and insignificant contributed to information sharing: beginners
activity. This is an unfamiliar mindset for many could benefit from older hackers’ knowledge
“digital immigrants” born before the 1980s who and advice (Imperva, 2011). Teenagers could
perceive hacking as being foreign and elusive also easily adopt deviant behavior through
because they are less familiar with contemporary experimentation. It is simple to try a network
perceptions of cyberspace. “Hackers are gener- sniffer tool on a private network and then just
ally teenagers and college kids not engaged in use it on a public network out of sheer curiosity.
earning a living. They often come from fairly A great number of hacking tools are very easy to
well-to-do middle class backgrounds, and are use or completely user friendly (Krebs, 2006).
markedly anti-materialistic” (Sterling, 1993). For instance, with port scanners, the user only
has to input the IP address of the computer to
scan in order to get detailed descriptions for
KNOWLEDGE DIFFUSION common ports.
AND INNOVATION Thus, we could say that cybercrime is
accessible, i.e., according to Greenhalgh’s
Furthermore, hacking is much less complex than
definition, cybercrime is easy to do and requires
it was a few years ago, as hacking communities
little knowledge. Moreover, online communi-
have greatly diffused their knowledge through
ties not only provide support and training, but
the Internet (Kshetri, 2006). The web has,
also offer customizations and opportunities for
therefore, progressively reduced the complex-
innovations (Imperva, 2011).
ity of becoming a hacker. With a simple search
on Google, anybody can find a large amount
of documentation, including hacking how-tos, FITTING USERS’ NEEDS
toolkits, and tips (Long, 2005). For instance,
a Google search with the keywords “hacker The last factor that contributes to lower barri-
toolkit” could lead one to a website where he ers is that hacking is now cheaper than ever,
or she could find all of the tools needed for and that could easily fit criminals’ needs. For
hacking. With the query “how to hack,” this instance, cloud computing is a way to easily
researcher found easy entry to a website with increase capacity or add capabilities without
a vast number of hacking guides. “By using even investing in infrastructure. Hosted services
Google, [one] can gain access to information are delivered over the Internet; they are sold on

Copyright © 2013, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
58 International Journal of Technology and Human Interaction, 9(3), 53-62, July-September 2013

demand, are “elastic,” and are fully managed by cracking has become easier than ever nowadays
the provider. One needs nothing but a personal through the diffusion of toolkits, advice, and
computer and Internet access. Infrastructure as a support from the hacking community. Thanks
Service (IaaS) provides a virtual server with the to the ease of cloud computing, attempting to
ability to create, access, and configure virtual perform hacking is cheaper and requires fewer
servers and storage. Cloud computing allows a skills than ever before.
student to pay for only as much capacity as is
needed and bring more functionalities online
as soon as they are required. Cloud computing RELATIVE ADVANTAGES
could be helpful for a cracker as a way to lever- OVER TRADITIONAL CRIME
age his attack (Subashini & Kavitha, 2011).
The psychological cost of committing a crime
In other words, a cracker could use the
through the web is low for two main reasons. The
IaaS massive computing power to brute-force
first one is that victims of cybercrime are fre-
a password (Meer et al., 2009). Brute force
quently difficult to identify (Phukan, 2002). This
software can generate millions of passphrases,
means that in massive scamming campaigns,
encrypt them, and see if they allow access to
for instance, hackers send an overwhelming
the network. Thus, cracking a wireless network
amount of e-mails and do not face the victims
could be done cheaply and easily (Roth, 2011).
(they effectively just press “send”). Alterna-
Because there are no bandwidth agreements
tively, when a hacker creates and distributes
— or detection of servers taking malicious
malware through the web to steal credit card
actions — in order to set up an account on an
numbers, he catches “someone” (i.e., numbers)
IaaS, an amateur hacker can easily conduct a
but never sees the victims’ faces or physically
denial-of-service attack, sending a flood of
interacts with them. The second reason is that
packets toward the target company’s network
hackers do not see their behavior as unethical.
at low cost and on a large scale, using the high
Scholars report that many students do not con-
capabilities of the service provider (Ristanpart et
sider software piracy as unethical behavior (Im
al., 2009). In addition, scamming and spamming
& Van Epps, 1991; Reid et al., 1992). On the
are facilitated. Indeed, before cloud comput-
contrary, some believe that unethical behavior
ing, in order to spam one needed a dedicated
could help them be successful in life (Davis &
server, skills in server management, network
Vitell, 1991).
configuration and maintenance, knowledge
The main advantage of cybercrime over tra-
of Internet service provider standards, etc. By
ditional crime is that “such crimes are less likely
comparison, a mail software as a service is a
to be caught and prosecuted […] only about 5%
scalable, inexpensive, bulk, and transactional
of cyber-criminals are caught” (Kshetri, 2009).
e-mail-sending service for marketing purposes
Cybercrimes could be large-scale and highly
and could be easily set up for spam (Krebs,
profitable crimes; even a minuscule response
2008; Armbrust et al., 2010). On-demand e-mail
rate to spam is enough to reward spammers with
service providers don’t deserve to be blamed
a large profit (Kanich et al., 2009). Moreover,
for the capabilities they are making accessible
cybercrimes are committed from home. For
to potential criminals, but one should be aware
instance, instead of sifting through rubbish for
that these services could easily be manipulated
personal information and searching in the target
to send cheap spam and malware.
victim’s residential trash (dumpster diving), an
As mentioned above, teenagers are digital
identity thief could browse social networking
natives and are accustomed to using computers
websites for personal details published by his
and the Internet. Cybercrime is thus compatible
or her target or could search online databases
with their environment. Furthermore, hacking/
(Delaney, 2005).

Copyright © 2013, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of Technology and Human Interaction, 9(3), 53-62, July-September 2013 59

Teenage crackers are aware of their victims’ CONCLUSION


weak points, the first one being ignorance.
In fact, a majority of computer users are still It was established that anonymity of cyberspace
ignorant of computer security. A survey of has several advantages. A hacker or cracker is
home computers and their owners revealed a less likely to be caught, feels no guilt or remorse
gap between user perception and the increasing after cracking or spamming, profits from his
prevalence of threats on the Internet (McAfee, or her victims’ ignorance, and inspires fear.
2010). The National Cyber Security Alliance Further, in The Rites of Passage (1960), Van
(NCSA) is a non-profit group that seeks to Gennep states that there are rituals marking
raise public awareness of cyber security issues. transitional phases between childhood and the
This organization pointed out in 2004 that us- full inclusion into a social group. Theses rites
ers thought they were safe from online threat have three stages: separation, transition, and
despite the fact that a virus or worm infected reincorporation.
20% of home computers and that snooping Hacking is seen as a rite of passage from
programs such as spyware and adware were on childhood to adulthood, as the teenager will
an overwhelming 80% of systems (following come to consider hacking as a childish activ-
the interview, technical experts examined home ity — just for pranks — and enter into the legal
computers, looking for viruses and spyware). economy. This phase would be the departure
The second weakness of most victims is from the status of teenager, during which the
fear. Businesses are frequently the victims of young adult is formally accepted into his or
ransomware (Tsiklis, 2010), computer malware her new role. A great number of hackers are
that holds a computer system or data hostage self-taught prodigies and some organizations
and then demands a ransom for its restora- actually employ hackers as part of their informa-
tion. Ransomware is like a virus, but instead tion technology staff. These hackers use their
of destroying a file, it encrypts it, leaving the skills to find vulnerabilities in the company’s
author of the malware as the only person with information system(s) so that they can be fixed
the knowledge of the “private decryption key” quickly. This type of hacker activity actually
needed to release the system or data. The author prevents serious cybercrimes. On the other hand,
of this crypto-viral extortion attack then offers it could be seen that hacking has become a rite of
to recover the key for a fee; businesses prefer aggregation, the detachment from childish cyber
to pay instead of being publicized or losing key activities to the assumption of a new criminal
data (Luo & Liao, 2009). Web extortions are cyber identity. Similarly, cracking is perceived
increasing. In 2006, two teenagers attempted to as a rite of passage from the age of pranks, such
extort $150,000 from MySpace (Evers, 2006). as logging into a friend’s Facebook profile,
Recently, teens are being extorted in online to the age of crimes – using another person’s
schemes and both federal prosecutors and ID in online fraud. By learning the hacking
child safety experts have seen a rise in online subculture and language (Holt, 2010), hack-
sexual extortion, now called “sextortion.” In ers integrate themselves into the hacker social
2010, Anthony Stancl, an eighteen-year-old subculture, which is not necessarily criminal.
student from Wisconsin, was sentenced to By leaving the legal market, they become part
fifteen years in prison after prosecutors said of the cybercriminal underground.
he posed as a girl on Facebook to trick male The intention of this paper is to illustrate
high school classmates into sending him nude a landscape of current literature in cybercrime,
cell phone photos, which he then used to extort taking into consideration Greenhalgh et al.‘s
them (Ellis, 2010). conceptual model of diffusion of innovation. A

Copyright © 2013, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
60 International Journal of Technology and Human Interaction, 9(3), 53-62, July-September 2013

narrative review of the literature was carried out, Council of Europe Convention on Cybercrime.
facilitators leading to cybercrime were explored (2001). Treaties. Retrieved from http://conventions.
coe.int/Treaty/EN/Treaties/html/185.htm
and explained, and how hacking expertise is
disseminated was discovered. Beginning with Davis, D. L., & Vitell, S. J. (1991). The ethical
innocent hacking, teenagers could be tempted problems, conflicts, and beliefs of small business
to crack and spy on the Internet to make money. information personnel. Journal of Computer Infor-
mation Systems, 22(4), 53–57.
The shift from non-criminal to criminal activity
is facilitated by various factors: hacking com- Delaney, K. (2005, March 29). Identity theft made
patibility with youth culture, relative advantage easier. Wall Street Journal, p. B1.
over traditional crime, ease of use, and support. Ellis, R. (2010, August 16). Sextortion: Are your teens
This review provides a snapshot and reference being “sexploited” online? Examiner. Retrieved from
base for academics and practitioners with an http://www.examiner.com/cyber-safety-in-national/
interest in the diffusion of cybercrime. sextortion-are-your-teens-being-sexploited-online
Webster and Watson (2002) suggested that Evers, J. (2006, May 2006). Teens arrested in al-
the lack of review articles has been hindering leged MySpace extortion scam. Zdnet. Retrieved
the progress of the IS field; this article contrib- from http://www.zdnet.com/news/teens-arrested-in-
utes to a cumulative culture that is desired in alleged-myspace-extortion-scam/148219
any research field, especially in IS. Although Fafinski, S., Dutton, W. H., & Margetts, H. Z. (2010).
this review cannot claim to be exhaustive, it Mapping and measuring cybercrime. OII Working
provides some insights into the diffusion of Paper, 18.
deviant behavior amongst young people and FBI. (2011). Manhattan U.S. attorney charges
into current literature on cybercrime. seven individuals for engineering sophisticated
internet fraud scheme that infected millions of
computers worldwide and manipulated internet
advertising business. [Press release]. Retrieved from
REFERENCES http://www.fbi.gov/newyork/press-releases/2011/
manhattan-u.s.-attorney-charges-seven-individu-
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., als-for-engineering-sophisticated-internet-fraud-
Katz, R., & Konwinski, A. et al. (2010). A view of scheme-that-infected-millions-of-computers-world-
cloud computing. Communications of the ACM, wide-and-manipulated-internet-advertising-business
53(4), 50–58. doi:10.1145/1721654.1721672.
Fewster, S. (2010). Computer virus created by
Becker, G. (1968). Crime and punishment: An eco- Anthony Scott Harrison sparked worldwide alert.
nomic approach. The Journal of Political Economy, News. Retrieved from http://www.news.com.au/
76, 169–217. doi:10.1086/259394. technology/computer-virus-created-by-anthony-
scott-harrison-sparked-worldwide-alert/story-
Becker, G. (1976). The economic approach to human
e6frfrnr-1225897175334#ixzz1EiBSPNal
behavior. Chicago, IL: University of Chicago Press.
Fisher, F. M. (1979). Diagnosing monopoly. The
Billig, J., Danilchenko, Y., & Frank, C. (2008).
Quarterly Review of Economics and Business,
Evaluation of Google hacking. In Proceedings of the
19(2), 7–33.
5th Conference on Information Security Curriculum
Development (pp. 27-32). New York, NY: ACM. Florencio, D., & Herley, C. (2011) Sex, lies and cyber-
crime surveys. Proceedings of the Tenth Workshop
Bizeul, D. (2007). Russian business networks
on the Economics of Information Security (WEIS),
study. Retrieved from http://www.bizeul.org/files/
George Mason University, USA.
RBN_study.pdf
Greenhalgh, T., Robert, G., Macfarlane, F., Bate, P.,
Blicoe, R. (2010). High-living hacker swaps Porsche
& Kyriakidou, O. (2004). Diffusion of innovations
for porridge. The Register. Retrieved from http://
in service organizations: Systematic review and
www.theregister.co.uk/2010/06/18/hacker_jailed/
recommendations. The Milbank Quarterly, 82(4),
Capeller, W. (2001). Not such a neat net: Some 581–629. doi:10.1111/j.0887-378X.2004.00325.x
comments on virtual criminality. Social & Legal PMID:15595944.
Studies, 10, 229–242.

Copyright © 2013, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of Technology and Human Interaction, 9(3), 53-62, July-September 2013 61

Griffith, H. (2005, June 7). eBay fraud boy con ‘re- McAfee. (2010). Threats report: Third quarter
ally easy.’ BBC News. Retrieved from http://news. 2010. Retrieved from http://www.mcafee.com/us/
bbc.co.uk/1/hi/wales/4615117.stm resources/reports/rp-quarterly-threat-q3-2010.pdf
Holt, T. (2010). Examining the role of technol- Meer, H., Arvanitis, N., & Slaviero, M. (2009).
ogy in the formation of deviant subcultures. So- Clobbering the cloud. Black Hat USA 2009. Las
cial Science Computer Review, 28(4), 466–481. Vegas, NV: Techweb.
doi:10.1177/0894439309351344.
Palfrey, J., & Gasser, U. (2008). Born digital: Un-
Im, J. H., & van Epps, P. D. (1991). Software piracy derstanding the first generation of digital natives.
and software security in business schools: An ethical New York, NY: Basic Books.
perspective. Database, 22(3), 15–21.
Panda Security. (2009). Studying or hacking? Today’s
Imperva (2011). Monitoring hacker forums. Research adolescents could be the hackers of the future. Re-
Note, 5, 1-14. trieved from http://www.pitchengine.com/preview-
release.php?id=11537
Kallman, E. A., & Grillo, J. P. (1996). Ethical deci-
sion making and information technology. New York, Phukan, S. (2002). IT ethics in the internet age: New
NY: McGraw Hill. dimensions. In Proceedings of the Informing Science
& IT Education Conf. (InSITE). Santa Rosa, CA:
Kanich, C., Kreibich, C., Levchenko, K., Enright, Informing Science Press.
B., Voelker, G., Paxson, V., & Savage, S. (2009).
Spamalytics: An empirical analysis of spam mar- Prensky, M. (2001). Digital natives, digital immi-
keting conversion. In Proceedings of the 15th ACM grants. On the horizon. MCB University Press, 9(5).
Conference on Computer and Communications
Security. Alexandria, VA: ACM Raymond, E. S., & Steele, G. S. (1991). The new
hacker’s dictionary. Cambridge, MA: MIT Press.
King, W. R., & He, J. (2005). Understanding the
role and methods of meta-analysis in IS research. Reid, R. A., Thompson, J. K., & Logsdon, J. L.
Communications of the Association for Information (1992). Knowledge and attitudes of management
Systems, 16, 1. students toward software piracy. Journal of Computer
Information Systems, 33(1), 46–51.
Krebs, B. (2006, March 16). Hacking made easy.
Washington Post. Retrieved from http://www.wash- Ristanpart, T., Tromer, E., Sacham, H., & Savage,
ingtonpost.com/wp-dyn/content/article/2006/03/16/ S. (2009) Hey, you, get off of my cloud: Exploring
AR2006031600916.html information leakage in third-party compute clouds.
In Proceedings of the 16th ACM Conference on
Krebs, B. (2008, July 1). Amazon: Hey spammers, get Computer and Communications Security. Chicago,
off my cloud! Washington Post. Retrieved fromhttp:// IL: ACM.
voices.washingtonpost.com/securityfix/2008/07/
amazon_hey_spammers_get_off_my.html Rogers, E. M. (1983). Diffusion of innovations. New
York, NY: Free Press.
Kshetri, N. (2006). The simple economics of cy-
bercrimes. IEEE Security and Privacy, 4(1), 33–39. Rogers, M., Smoak, N., & Liu, J. (2006). Self-reported
doi:10.1109/MSP.2006.27. deviant computer behavior. Deviant Behavior, 27(3),
245–268. doi:10.1080/01639620600605333.
Kshetri, N. (2009). Positive externality, increasing
returns, and the rise in cybercrimes. Communications Roth, T. (2011). Breaking encryptions. In Proceed-
of the ACM, 52(12). doi:10.1145/1610252.1610288 ings of the Black Hat Conference 2011. Retrieved
PMID:21218176. from https://media.blackhat.com/bh-dc-1/Roth/
BlackHat_DC_2011_Roth_Breaking%20encryp-
Long, J. (2005). Google hacking for penetration tions-Slides.pdf
testers. Rockland, MA: Syngress Publishing.
Ryan, J., & Jefferson, T. I. (2003). The use, misuse,
Luo, X., & Liao, Q. (2009). Ransomware: A new and abuse of statistics in information security re-
cyber hijacking threat to enterprises. In J. Gupta & search. In Proceedings of the 23rd ASEM National
S. Sharma (Eds.), Handbook of research on infor- Conference. St. Louis, MO: ASEM.
mation security and assurance (1–6), Hershey, PA:
IGI Global.

Copyright © 2013, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
62 International Journal of Technology and Human Interaction, 9(3), 53-62, July-September 2013

Shah, S., & Cole, D. (2011). Spyware/adware. In Tufin Technologies. (2010). Survey of hack-
Proceedings of the Black Hat Conference 2005. ing habits in New York. Retrieved from http://
Retrieved from http://www.blackhat.com/html/bh- www.tufin.com/news_events_press_releases.
japan-05/bh-jp-05-en-speakers.html php?index=2010-04-14
Snyder, F. (2001). Sites of criminality and sites of Van Gennep, A. (1960). The rites of passage. Chicago,
governance. Social & Legal Studies, 10, 251–256. IL: The University of Chicago Press.
Sterling, B. (1993). The hacker crackdown: Law Wall, D. (2001). Cybercrimes and the internet. In
and disorder on the electronic frontier. New York, D. Wall (Ed.), Crime and the internet. London,
NY: Bantam. UK: Routledge.
Subashini, S., & Kavitha, V. (2011). A survey on Wall, D. S. (2007). Cybercrime: The transformation
security issues in service delivery models of cloud of technology in the networked age. Cambridge,
computing. Journal of Network and Computer Appli- UK: Polity Press.
cations, 34(1), 1–11. doi:10.1016/j.jnca.2010.07.006.
Webster, J., & Watson, R. T. (2002). Analyzing the
Trend Micro. (2009). Brits breeding the next-genera- past to prepare for the future: Writing a literature
tion of computer hackers. Global Security Magazine. review. Management Information Systems Quarterly,
Retrieved from http://www.globalsecuritymag.com/ 26(2), iii–xiii.
Trend-Micro-Brits-Breeding-the,20090403,8329
Yar, M. (2005). The novelty of cybercrime: An
Trend Micro. (2011). Big botnet busts. Retrieved assessment in light of routine activity theory. Eu-
from http://blog.trendmicro.com/big-botnet-busts/ ropean Journal of Criminology, 2(4), 407–427.
doi:10.1177/147737080556056.
Tsiklis, T. (2010). Avira-Ransomware threatens with
official complaint of piracy. Retrieved from http://
www.virus.gr/portal/en/content/avira-ransomware-
threatens-official-complaint-piracy

Jean-Loup Richet is a PhD student at the University of Nantes and a research associate at the
Canada Research Chair in Identity, Security and Technology at the University of Montréal. Fel-
low of the Institute for Strategic Innovation & Services at Essec Business School, he graduated
from the French National Institute of Telecommunications, Telecom Business School, and holds
a research master’s from IAE/HEC Paris. A member of the post-graduate committee of the Brit-
ish Society of Criminology, his research interests include cybercrime, internet censorship and
information systems security. Richet has been a speaker at several national and international
conferences, and has published articles in academic and trade journals.

Copyright © 2013, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.

View publication stats

You might also like