The Social Organization of a Criminal Hacker Network: A Case Study

The Social Organization of a Criminal Hacker Network: A Case Study

Yong Lu
Copyright: © 2009 |Volume: 3 |Issue: 2 |Pages: 15
ISSN: 1930-1650|EISSN: 1930-1669|ISSN: 1930-1650|EISBN13: 9781615203222|EISSN: 1930-1669|DOI: 10.4018/jisp.2009040107
Cite Article Cite Article

MLA

Lu, Yong. "The Social Organization of a Criminal Hacker Network: A Case Study." IJISP vol.3, no.2 2009: pp.90-104. http://doi.org/10.4018/jisp.2009040107

APA

Lu, Y. (2009). The Social Organization of a Criminal Hacker Network: A Case Study. International Journal of Information Security and Privacy (IJISP), 3(2), 90-104. http://doi.org/10.4018/jisp.2009040107

Chicago

Lu, Yong. "The Social Organization of a Criminal Hacker Network: A Case Study," International Journal of Information Security and Privacy (IJISP) 3, no.2: 90-104. http://doi.org/10.4018/jisp.2009040107

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Financial fraud and identity theft conducted by criminal hackers have become the top source of the greatest financial losses for organizations. Even though Hacker groups are complex socio-technical systems, much extant research on hackers is conducted at the individual level of analysis. This research proposes a research model composed of five dimensions and their relations in order to study hacker’s social organization in the whole socio-technical context. Based on this model, the researcher applies network analysis methods to disclose the structure and patterns of a significant and complex hacker group, Shadow crew. Network analysis tools, such as Automap and ORA, are applied for data processing and data analysis. Three network measures: degree centrality, cognitive demand, and eigenvector centrality, are utilized to determine the critical leaders. Out-degree centrality is employed to analyze the relations among the five dimensions in the research model.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.