Caslon Analytics elephant logo title for Security & InfoCrime guide
home | about | site use | resources | publications | timeline   spacer graphic   Ketupa

overview

perspectives

frameworks

agencies

CII

desktops

criminals

messaging

vandalism

fraud

authentication

anonymity

pseudonymity

malware

crypto

geolocation

economics

insurance

kids

s-business

appraisal

self-help

forensics










related pages icon
related
Guides:

Governance

Information
Economy


Consumers
& Trust


Privacy


related pages icon
related
Profiles:

Identity
Theft


Forgery &
Forensics


Surveillance





section heading icon     vandalism and DOS

This page is under development.

While you're waiting for the real content to appear you may be entertained by Marc Rogers's ambitious Psychology of Hackers: Steps Toward a New Taxonomy paper, profiling 'The Hacker' or CyberPunk (CP)

The available data indicates that individuals classified as CP are Caucasian, 12-28 years, from middle class families. They are loners, who have limited social skills and perform poorly in school (Chandler, 1996; Littman 1996; Hafner & Markoff, 1995; Sperling, 1992). They are usually not career oriented, but show an aptitude with computers and other electronic equipment. Their families are usually considered dysfunctional, single parent, abusive, and in some cases sexually abusive (Goodell, 1995). Often these individuals display obsessive traits, staying online for days on end with no sleep (Goodell, 1995). Cyber-punks have a tendency to brag about their exploits. This may be due in part to their desire to be admired by their hacking peers (Post, 1996; Sperling, 1992). The bragging often results in them coming to the attention of law enforcement. The bragging and willingness to talk about their exploits continues even while in custody and during interviews with law enforcement (Hafner & Markoff, 1995; Littman, 1995). The fact that many of the attacks are malicious in nature suggests that these individuals have unresolved anger and feel a need to strike out at something or someone (Post, 1996; Sperling, 1992). They are not comfortable with people so they strike out at computers and networks, rationalizing that corporations are immoral and need to be taught a lesson (Post, 1996).

Oh yes, and they like pizza too.






icon for link to next page       next page  (identity crime)


this site
the web

Google

version of June 2007
© Caslon Analytics