Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Hacker

Handbook of Research on Information Security and Assurance
A person who breaks into a system with no authorization, or a person who intentionally oversteps his/her bounds on systems for which they do have legitimate access.
Published in Chapter:
Information Warfare: Survival of the Fittest
Pamela Ajoku (University of Pittsburgh, USA)
Copyright: © 2009 |Pages: 11
DOI: 10.4018/978-1-59904-855-0.ch003
Abstract
Even though weapons and money are considered important factors for running a modern world, at the end of the day, it is all about controlling and exploiting information for political, military, economic, and commercial advantage. The objective of this chapter is to present a basic understanding of the concept of Information Warfare (IW) and the need for relevant strategies to aid its successful implementation. IW is an important topic in this electronic era and within enterprises, security strategies, tools, and processes are essential in order to maintain a competitive advantage against an adversary or group of adversaries. In this chapter, a Survival of the Fittest IW (SFIW) conceptual framework is presented based on the adaptive nature of IW, and a case study is used to discuss its validity.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
E-Commerce Models and Consumer Concerns
A programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.
Full Text Chapter Download: US $37.50 Add to Cart
POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing
It is a term attributed to people who create and modify computer software and hardware in order to acquire information. Depending on the type of hacker, it can use the information he collects, holding it to inform organizations of inherent vulnerabilities or use it for your own benefit, seeking recognition, insider information, or even monetary compensations.
Full Text Chapter Download: US $37.50 Add to Cart
Evaluating Cyber Attacks in Rail Transit
An individual or a group of individuals who persistently tries to gain access to software-driven systems through unauthorized means or methods.
Full Text Chapter Download: US $37.50 Add to Cart
Video Game Making and Modding
Someone who exploits weaknesses in computer programs.
Full Text Chapter Download: US $37.50 Add to Cart
A Historical Analysis of the Emergence of Free Cooperative Software Production
In this text, this term is used in its original acceptation, i.e., a highly-skilled developer.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Hacking and Hacktivism as an Information Communication System Threat
Hacker is a term used by some to mean “a clever programmer” and by others, especially those in popular media, to mean “someone who tries to break into computer systems.”
Full Text Chapter Download: US $37.50 Add to Cart
Hacker Culture and the FLOSS Innovation
According to Wikipedia, a hacker is a person who creates and modifies computer software and computer hardware including computer programming, administration, and security-related items. The term usually bears strong connotations, but may be either positive or negative depending on cultural context. However, this chapter challenges a fixed definition of hacker and suggests a look at different interpretations of hackers and practices of becoming hacker.
Full Text Chapter Download: US $37.50 Add to Cart
Collaborative Development within Open Source Communities
In the computing community, a skilled, experienced or even a wizard software developer. Also a person who creates and modifies computer software or hardware. Used in the media and popularly to mean computer and network security expert, this term has nothing to do with the hackers that contribute to the OSCs.
Full Text Chapter Download: US $37.50 Add to Cart
Guarding Corporate Data from Social Engineering Attacks
A person trying to break into an information system, either to cause damage, find information or to satisfy their curiosity.
Full Text Chapter Download: US $37.50 Add to Cart
RFID Technologies and Applications
Someone with substantial technical know-how. The hacker (and it is almost always a male) is very interested in developing and administrating systems. The hacker is frequently motivated by a search for knowledge and interest in improving the hacker’s systems and programs.
Full Text Chapter Download: US $37.50 Add to Cart
Security in Digital Marketing: Challenges and Opportunities
Is an individual who dedicates himself, with unusual intensity, to knowing and modifying the innermost aspects of devices, programs, and computer networks.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Cybercrime and Cybercriminals
Someone who is able the break the security of computer systems. The intention can go for enforcing penetration testing from the ethical hackers to launch powerful cyberattacks lead by black hat hackers.
Full Text Chapter Download: US $37.50 Add to Cart
Design and Implementation of a Distributed Firewall
An intruder who gains unauthorized access to computer system.
Full Text Chapter Download: US $37.50 Add to Cart
Introduction to Quantum-Resistant Blockchain
Is someone who utilizes computers to obtain data without authorization or one who steals from a vulnerable entity.
Full Text Chapter Download: US $37.50 Add to Cart
The Age of Ransomware: Understanding Ransomware and Its Countermeasures.
A person who gains unauthorized access to a machine with the intention to cause harm or steal.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Risk Management in Banks: Cyber Risk Insurance
A person who gains unauthorized access to personal computers or computers and networks of corporations. Simply put, a hacker tries to gain economic benefits using the security weaknesses of the digital world.
Full Text Chapter Download: US $37.50 Add to Cart
Social Engineering Techniques, Password Selection, and Health Care Legislation: A Health Care Setting
Someone with the skill and ability to modify a part of a system to use it in ways not originally intended, such as gaining unauthorized access and information.
Full Text Chapter Download: US $37.50 Add to Cart
Group Signature System Using Multivariate Asymmetric Cryptography
Is a term used by some to mean a clever programmer and by other, especially those in popular media to mean someone who tries to break into computer systems.
Full Text Chapter Download: US $37.50 Add to Cart
Electronic Mail Security
Full Text Chapter Download: US $37.50 Add to Cart
Identification Protocols
A term used by some to mean a clever programmer and by other, especially those in popular media to mean someone who tries to break into computer systems.
Full Text Chapter Download: US $37.50 Add to Cart
The Ethics of Deception in Cyberspace
An amateur attacker in cyberspace.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR