Cyber Security and Anti-Social Networking

Cyber Security and Anti-Social Networking

Malcolm Shore (Canterbury University, New Zealand)
DOI: 10.4018/978-1-60566-264-0.ch013
OnDemand PDF Download:
$37.50

Abstract

This chapter is about the way in which computer hackers invoke social networking paradigms to support and encourage their activities. It reviews the evolution of hacking as a form of social networking, from its roots in Bulletin Board systems to the current attacks on Second Life, and considers the motivation for hacking. Ajzen’s Theory of Planned Behavior and Beveren’s Flow Theory model are, when considered together, found to explain many of the observed characteristics of early hacker activity. The place of social networks in motivating hacking is explored, and some observations are made in relation to hacking and the Second Life environment. A number of control variables are identified which can be used to reduce the likelihood of people engaging in the hacking activity. Addressing the social network factors which motivate hacking provides an important early step in addressing cybercrime.
Chapter Preview

Laws are like cobwebs, which may catch flies but let wasps and hornets break through

—Jonathan Swift, A Critical Essay Upon the Faculties of Mind

Top

Introduction

This chapter looks at how the many types of social networks and socio-technical systems can be used to enable and support the activity of computer hacking. A hacker was once the name given to a person who was able to rapidly and reliably change computer software to achieve new functionality, often using sophisticated coding techniques which were not generally known or used. Over time, however, the term became used to describe the more restricted group of people who exploit software vulnerabilities to gain unauthorized access to computers. Hackers have a strong networking culture—antisocial networking if you like, with online groups, magazines, and conferences characterizing their interactions and peer recognition rewarding their skills.

However, as with any computer system, socio-technical systems are at risk of attack from hackers. Understanding antisocial networking and the motivation that drives hackers is an important step in reducing the levels of disruption in socio-technical, and other, systems.

Computer Hackers and Bulletin Boards

Computer hackers are usually associated with the Internet, but hacking originated well before the Internet become popular. Early computer hackers attacked systems by accessing them through dial in modems. By the 1980s, phone and computer hackers had organized themselves into strong social networks in the form of hacker groups, one of the best known being the US-based Legion of Doom (LoD). LoD started out as a group of phone hackers, breaking into the operational systems used by telecommunications companies. However, it soon began to attract the more general computer hackers and eventually became notorious for its computer hacking. While much of this was focused on demonstrating their expertise, some hackers did use these skills to commit crimes.

At this time, computer hackers used dial-in bulletin boards to provide a means of sharing information on target vulnerabilities and exploits, and these boards were catalysts for the emergence of the early hacker social networks. Law enforcement agencies were poorly equipped to deal with this emerging field of anti-social computer activity, but some agencies did respond by establishing incognito bulletin boards. One example was the Underground Tunnel bulletin board created in 1985 in Austin, Texas by Sgt Robert Ainsley. Law enforcement boards were typically used as sting operations to catch hackers posting dial-in access codes and pirated software and to collect information that could be used to gain access to other hacker bulletin boards.

The early computer hackers tended to be bright college students with an average age of about 14, self-taught computer users with access to microcomputers and modems (Maxfield, 1990). These youngsters hacked for fun, but the leaders of the hacking groups were often older and sought financial gain from pirated software or using stolen credit card information.

Key Terms in this Chapter

Flow Theory: A psychological theory which addresses compulsive behavior caused through a positive feedback loop.

Hacking: The act of remotely accessing a computer server or network without authorization.

Cyber Police Patrols: Law enforcement staff browsing the internet in order to detect and prevent cyber crime.

Social Networks: Relationships between people with a common interest and a need to intercommunicate.

Second Life: A virtual world which enables a wide range of activities and experiences.

Complete Chapter List

Search this Book:
Reset
Editorial Advisory Board
Table of Contents
Foreword
Ben Shneiderman
Preface
Brian Whitworth, Aldo de Moor
Acknowledgment
Brian Whitworth, Aldo de Moor
List of Reviewers
Prologue: General Socio-Technical Theory
$37.50
Chapter 1
Brian Whitworth
A socio-technical system (STS) is a social system built upon a technical base. An STS adds social requirements to human-computer interaction (HCI)... Sample PDF
The Social Requirements of Technical Systems
$37.50
Chapter 2
Matti Tedre
This chapter introduces the reader to some social research characteristics that are central to the social study of computer science. It introduces... Sample PDF
The Social Study of Computer Science
$37.50
Chapter 3
Ann Borda, Jonathan P. Bowen
This chapter introduces the concept of a Virtual Organization (VO), using the Internet to link geographically separated participants in an efficient... Sample PDF
Virtual Collaboration and Community
$37.50
Chapter 4
David Davenport
This chapter analyses the effect that social values have on the design of technical systems. Beginning with an examination of the role technology... Sample PDF
The Social Derivation of Technical Systems
$37.50
Chapter 5
Ken Eason, José Abdelnour-Nocera
This chapter sets the traditional focus of socio-technical systems theory on primary work systems in a modern context where information and... Sample PDF
Socio-Technical Theory and Work Systems in the Information Age
$37.50
Chapter 6
Peter Day
This chapter introduces the community engagement strategy of the Community Network Analysis (CNA) project and considers its significance to research... Sample PDF
An Engagement Strategy for Community Network Research and Design
$37.50
Chapter 7
Cleidson R.B. de Souza, David F. Redmiles
This chapter reviews the socio-technical relationship between organizational and software structure. It describes the early theoretical work about... Sample PDF
On the Alignment of Organizational and Software Structure
$37.50
Chapter
Ronald K. Stamper
Prologue: Socio-Technical Perspectives
$37.50
Chapter 8
Catherine Heeney
The chapter discusses the traditional expectations about privacy protection and argues that current models for the governance of data do not... Sample PDF
Privacy and the Identity Gap in Socio-Technical Systems
$37.50
Chapter 9
Ronald Leenes
Second Life can be seen as a social microcosmos in which fairly normal people lead a social life and where social needs develop. Privacy is one of... Sample PDF
Privacy Regulation in the Metaverse
$37.50
Chapter 10
David Tuffley
This chapter introduces a process reference model of leadership for integrated teams operating in virtual environments. Geographically dispersed... Sample PDF
Leadership of Integrated Teams in Virtual Environments
$37.50
Chapter 11
Monique Janneck
For a technology use to be successful, the circumstance of its introduction into a use context—or recontextualization— is crucial. The users of a... Sample PDF
Recontextualising Technology in Appropriation Processes
$37.50
Chapter 12
Petter Bae Brandtzæg, Jan Heim
The last few years have seen a substantial growth in online communities such as MySpace and Facebook. In order to survive and increase in size... Sample PDF
Explaining Participation in Online Communities
$37.50
Chapter 13
Malcolm Shore
This chapter is about the way in which computer hackers invoke social networking paradigms to support and encourage their activities. It reviews the... Sample PDF
Cyber Security and Anti-Social Networking
$37.50
Chapter 14
Wilson Huang, Shun-Yung Kevin Wang
This chapter examines the gaps that arise between reactive social control systems and proactive technology systems. The authors further link these... Sample PDF
Emerging Cybercrime Variants in the Socio-Technical Space
$37.50
Chapter 15
Elayne W. Coakes, Peter Smith, Dee Alwis
This chapter presents the argument that service innovation is promoted by supporting divergent interpretations, enlarging the scope of employee and... Sample PDF
Developing Innovative Practice in Service Industries
$37.50
Chapter
Mark Aakhus
Prologue: Socio-Technical Analysis
$37.50
Chapter 16
Hans Weigand
Often socio-technical systems are designed simply on the basis of what the user asks, and without considering explicitly whether the required... Sample PDF
Using Communication Norms in Socio-Technical Systems
$37.50
Chapter 17
Jonas Sjöström, Göran Goldkuhl
This chapter introduces the theoretical framework of Socio-Instrumental Pragmatism (SIP) and illustrates how it has been used as an analytic... Sample PDF
Socio-Instrumental Pragmatism in Action
$37.50
Chapter 18
Paul J. Bracewell
Analytics provides evidence for objective corporate decision-making. Lack of understanding of analytical techniques can create confusion amongst... Sample PDF
A Framework for Using Analytics to Make Decisions
$37.50
Chapter 19
Mikael Lind, Peter Rittgen
Setting up co-design processes involving several stakeholders is a complex task. In this chapter the authors have looked upon experiences from... Sample PDF
The Challenges of Co-Design and the Case of e-Me
$37.50
Chapter 20
Harry S. Delugach
Automated tools are often used to support software development workflows. Many of these tools are aimed toward a development workflow that relies... Sample PDF
Formal Analysis of Workflows in Software Development
$37.50
Chapter 21
Dorit Nevo, Brent Furneaux
This chapter reviews the significance of expectations to information systems development with particular emphasis on the process of requirements... Sample PDF
The Role of Expectations in Information Systems Development
$37.50
Chapter 22
Jeff Axup
With mobile technologies increasingly weaving themselves into the fabric of our communities, it would be beneficial to increase our understanding of... Sample PDF
Building a Path for Future Communities
$37.50
Chapter
Thomas Erickson
Prologue: Socio-Technical Design
$37.50
Chapter 23
Thomas Herrmann
Socio-technical systems integrate technical and organizational structures and are related to various stakeholders and their perspectives. The design... Sample PDF
Systems Design with the Socio-Technical Walkthrough
$37.50
Chapter 24
Anders I. Mørch
This chapter presents a translational approach to socio-technical design, as a new approach to the theorybased design of user interfaces, supported... Sample PDF
Applied Pragmatism and Interaction Design
$37.50
Chapter 25
Manuel Kolp, Yves Wautelet
Information systems are deeply linked to human activities. Unfortunately, development methodologies have been traditionally inspired by programming... Sample PDF
A Social Framework for Software Architectural Design
$37.50
Chapter 26
Designing for Trust  (pages 388-401)
Piotr Cofta
Designing for trust is a methodology that attempts to design our perception of trust in information systems, in the long-term expectation that such... Sample PDF
Designing for Trust
$37.50
Chapter 27
Dan Dixon
Three decades ago the concept of pattern languages were introduced in the field of architecture and they have since become widely used in... Sample PDF
Pattern Languages for CMC Design
$37.50
Chapter 28
Anton Nijholt, Dirk Heylen, Rutger Rienks
In this chapter the authors discuss a particular approach to the creation of socio-technical systems for the meeting domain. Besides presenting a... Sample PDF
Creating Social Technologies to Assist and Understand Social Interactions
$37.50
Chapter 29
Jos Benders, Ronald Batenburg, Paul Hoeken, Roel Schouteten
This chapter sketches an Organization Design perspective called “Modern Socio-technical Design”, and subsequently discusses the implementation of... Sample PDF
A Modern Socio-Technical View on ERP-Systems
$37.50
Chapter 30
Mary Allan, David Thorns
The chapter introduces the Bourdieuean habitus and field theory as a framework for an alternative way of investigating how perceptions of Media Rich... Sample PDF
Being Face to Face: A State of Mind or Technological Design?
$37.50
Chapter 31
Rebecca M. Ellis
This chapter introduces the work of sociologist Pierre Bourdieu and his concepts of “the field” and “capital” in relation to eBay. In any given... Sample PDF
Applying Bourdieu to eBay's Success and Socio-Technical Design
$37.50
Chapter 32
Christopher A. Miller
This chapter focuses not on technology mediation of human relationships, but rather on human-like relationships with technology itself. The author... Sample PDF
Relationships and Etiquette with Technical Systems
$37.50
Chapter
Anton Nijholt
Prologue: Socio-Technical Implementation
$37.50
Chapter 33
Laura Anna Ripamonti, Ines Di Loreto, Dario Maggiorini
The necessity of supporting more and more social interaction (and not only mere information sharing) in online environments is the disruptive force... Sample PDF
Augmenting Actual Life Through MUVEs
$37.50
Chapter 34
Mohamed Ben Ammar, Mahmoud Neji, Adel M. Alimi
Affective computing is a new artificial intelligence area that deals with the possibility of making computers able to recognize human emotions in... Sample PDF
The Role of Affect in an Agent-Based Collaborative E-Learning System Used for Engineering Education
$37.50
Chapter 35
Pernilla Qvarfordt, Shumin Zhai
Eye-gaze plays an important role in face-to-face communication. This chapter presents research on exploiting the rich information contained in human... Sample PDF
Gaze-Aided Human-Computer and Human-Human Dialogue
$37.50
Chapter 36
Licia Calvi
The chapter presents and combines the results of two case studies dealing with online communities1 in order to understand under which conditions... Sample PDF
How to Engage Users in Online Sociability
$37.50
Chapter 37
Ivan Launders
The UK National Health Service (NHS) provides the opportunity to undertake local socio-technical system design to help staff maximize the... Sample PDF
Socio-Technical Systems and Knowledge Representation
$37.50
Chapter 38
Claire de la Varre, Julie Keane, Matthew J. Irvin, Wallace Hannum
This chapter describes the design of a sociotechnical system to support rural high school students in an online distance education (ODE) course. The... Sample PDF
Social Support for Online Learning
$37.50
Chapter 39
Jeremy Birnholtz, Emilee J. Rader, Daniel B. Horn, Thomas Finholt
This chapter uses the theoretical notion of common ground to explore remote participation in experimental research. On one hand, there is a desire... Sample PDF
Enabling Remote Participation in Research
$37.50
Chapter
Starr Roxanne Hiltz
Prologue: Socio-Technical Evaluation
$37.50
Chapter 40
John M. Carroll, Mary Beth Rosson, Umer Farooq, Jamika D. Burge
Socio-technical systems are social systems that incorporate technological infrastructures. At the group level of analysis, the most important... Sample PDF
Community Collective Efficacy
$37.50
Chapter 41
Tanguy Coenen, Wouter Van den Bosch, Veerle Van der Sluys
This chapter views social networking sites as supporting social capital and the advantages which derive from it, namely emotional support... Sample PDF
An Analysis of the Socio-Technical Gap in Social Networking Sites
$37.50
Chapter 42
Olga Kulyk, Betsy van Dijk, Paul van der Vet, Anton Nijholt, Gerrit van der Veer
This chapter addresses awareness support to enhance teamwork in co-located collaborative environments. In particular, the authors focus on the... Sample PDF
Situational Awareness In Collaborative Work Environments
$37.50
Chapter 43
Janet L. Holland
This chapter deals with research on the development and use of an assessment instrument for measuring affective satisfaction in online learning. The... Sample PDF
A Scale of Affective Satisfaction in Online Learning Communities
$37.50
Chapter 44
David Hinds, Ronald M. Lee
In this chapter, the authors suggest how measures of “social network health” can be used to evaluate the status and progress of a virtual community.... Sample PDF
Assessing the Social Network Health of Virtual Communities
$37.50
Chapter 45
Bertram C. Bruce, Andee Rubin, Junghyun An
This chapter introduces situated evaluation as an approach for evaluating socio-technical innovation and change. Many current evaluations simply... Sample PDF
Situated Evaluation of Socio-Technical Systems
$37.50
Chapter 46
Heike Winschiers-Theophilus
Communities all over the world have established their own value systems which do not necessarily correlate with the intrinsic values of technology.... Sample PDF
Cultural Appropriation of Software Design and Evaluation
$37.50
Chapter
Charles Steinfield
Prologue: The Future of Socio-Technical Systems
$37.50
Chapter 47
Peter J. Denning
Wicked problems (messes) are tangled social situations that are too costly to stay in and too intransigent to get out of. Collaboration is essential... Sample PDF
Resolving Wicked Problems through Collaboration
$37.50
Chapter 48
Rachel McLean
As a social activity, the shopping experience can not be recreated or improved through technical design alone. This chapter proposes that there is... Sample PDF
The Myth of the e-Commerce Serf to Sovereign Powershift
$37.50
Chapter 49
Theresa Dirndorfer Anderson
This chapter explores the challenges associated with teaching the principles of socio-technical systems in the dynamic climate that characterizes... Sample PDF
Teaching the Socio-Technical Practices of Tomorrow Today
$37.50
Chapter 50
Isa Jahnke
The chapter describes an empirical study of a socio-technical community—as an extended part of an institution— with the aim of revealing its... Sample PDF
Socio-Technical Communities: From Informal to Formal?
$37.50
Chapter 51
Laurence Claeys, Johan Criel
This chapter introduces the concept of critical user participation as a means to see the socio-technical gap in context aware applications as an... Sample PDF
Future Living in a Participatory Way
$37.50
Chapter 52
Paul Hodgson
This chapter analyses the formation and generation of social trust through communications technology in postmodern society, and presents some... Sample PDF
The Impact of Communications Technology on Trust
$37.50
Chapter 53
Kenneth E. Kendall, Julie E. Kendall
This chapter explores the social, organizational, and individual impacts of emerging information technologies using the advent of recent... Sample PDF
Good and Evil in the Garden of Emerging Information Technologies
$37.50
About the Contributors