Abstract
This chapter provides an overview of the phenomenon of computer hacking, and the ways that individuals with an interest in hacking view themselves and the larger social environment in which they engage with others. The historical development of hacking is discussed in the context of technological change, along with various reasons for which individuals may hack various targets.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Andress, J., & Winterfeld, S. (2013). Cyber warfare: techniques, tactics, and tools for security practitioners. Waltham: Syngress.
Bachmann, M. (2010). The risk propensity and rationality of computer hackers. The International Journal of Cyber Criminology, 4, 643–656.
Bossler, A. M., & Burruss, G. W. (2011). The general theory of crime and computer hacking: Low self-control hackers? In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 38–67). Hershey: ISI Global.
Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3, 400–420.
Brake, M. (1980). The Sociology of Youth Cultures and Youth Subcultures. London: Routledge and Kegan Paul.
Brenner, S. W. (2008). Cyberthreats: The emerging fault lines of the nation state. New York: Oxford University Press.
Ceruzzi, P. (1998). A history of modern computing. Cambridge, MA: MIT Press.
Denning, D. E. (2010). Cyber-conflict as an emergent social problem. In T. J. Holt & B. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 170–186). Hershey: IGI-Global.
Dupont, B., Côté, A. M., Boutin, J. I., and Fernandez, J. (2017). Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world”. American Behavioral Scientist, 61(11), 1219–1243.
Furnell, S. (2002). Cybercrime: Vandalizing the information society. London: Addison-Wesley.
Gilboa, N. (1996). Elites, lamers, narcs, and whores: Exploring the computer underground. In L. Cherny & E. R. Weise (Eds.), Wired_Women (pp. 98–113). Seattle: Seal Press.
Herbert, S. (1998). Police subculture reconsidered. Criminology 36(2):343–370.
Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171–198.
Holt, T. J. (2009). Lone hacks or group cracks: Examining the social organization of computer hackers. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the internet (pp. 336–355). Upper Saddle River: Pearson Prentice Hall.
Holt, T. J. (2010). Examining the role of technology in the formation of deviant subcultures. Social Science Computer Review, 28, 466–481.
Holt, T. J. (2012). Examining the Forces Shaping Cybercrime Markets Online. Social Science Computer Review 31(2):165–177.
Holt, T. J. (2013). Exploring the social organisation and structure of stolen data markets. Global Crime 14(2–3):155–174.
Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress: Theory and prevention of technology-enabled offenses. Routledge: London.
Holt, T. J., & Kilger, M. (2012). Know your enemy: The social dynamics of hacking. The Honeynet Project. [Online] Available at: https://honeynet.org/files/Holt%20and%20Kilger%20-%20KYE%20-%20The%20Social%20Dynamics%20of%20Hacking.pdf
Holt, T. J., & Lampke, E. (2010). Exploring stolen data markets on-line: Products and market forces. Criminal Justice Studies, 23, 33–50.
Holt, T. J., Burruss, G. W., & Bossler, A. M. (2010). Social learning and cyber deviance: Examining the importance of a full social learning model in the virtual world. Journal of Crime and Justice, 33, 15–30.
Holt, T. J., Bossler, A. M., & May, D. C. (2012). Low self-control, deviant peer associations, and juvenile cyberdeviance. American Journal of Criminal Justice, 37(3), 378–395.
Holt, T. J., Freilich, J. D., & Chermak, S. M. (2017). Exploring the subculture of ideologically motivated cyber-attackers. Journal of contemporary criminal justice, 33(3), 212–233.
Holt, T. J., Smirnova, O., & Chua, Y. T. (2016). Data thieves in action: Examining the international market for stolen personal information. New York City: Springer.
Holt, T. J., Stonhouse, M., Freilich, J., Chermak, S. M. (2019) Examining ideologically motivated cyberattacks performed by Far-Left groups. Terrorism and Political Violence,1–22.
Holt, T. J., Kilger, M., Strumsky, D., & Smirnova, O. (2009). Identifying, exploring, and predicting threats in the Russian Hacker Community. Presented at the Defcon 17 Convention, Las Vegas, Nevada.
Hollinger, R. C., Lanza-kaduce L. (1988). The process of criminalization: the case of computer crime laws*. Criminology 26(1):101–126.
Huang, W., & Brockman, A. (2010). Social Engineering Exploitations in Online Communications: Examining Persuasions used in Fraudulent E-mails. In Holt, T. J. (ed.), Crime On-line: Causes, Correlates, and Context (pp. 87–112). Raleigh, NC: Carolina Academic Press.
Hutchings, A., & Holt, T. J. (2015). A crime script analysis of the online stolen data market. British Journal of Criminology, 55, 596–614.
James, L. (2005). Phishing exposed. Rockland: Syngress.
Jordan, T., & Taylor, P. (1998). A sociology of hackers. The Sociological Review, 46, 757–780.
Jordan, T., & Taylor, P. (2004). Hacktivism and cyber wars. London: Routledge.
Kilger, M. (2010). Social dynamics and the future of technology-driven crime. In T. J. Holt & B. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 205–227). Hershey: IGI-Global.
Kinkade, P. T., Bachmann, M., & Bachmann, B. S. (2013). Hacker Woodstock: Observations on an off-line cyber culture at the Chaos Communication Camp 2011. In T. J. Holt (Ed.), Crime on-line: Correlates, causes, and context (2nd ed., pp. 19–60). Raleigh: Carolina Academic Press.
Krance, M., Murphy, J., & Elmer-Dewitt, P. (1983). The 414 Gang Strikes Again. Time. [Online] Available at: www.time.com/time/magazine/article/0,9171,949797,00.html
Kranenbarg, M. W., Holt, T. J., & Jeroen van der Ham, (2018). Don’t shoot the messenger! A criminological and computer science perspective on coordinated vulnerability disclosure. Crime Science 7(1)
Landreth, B. (1985). Out of the inner circle. Seattle: Microsoft Press.
Leukfeldt, R., Kleemans, E. R., & Stol, W. (2017). Origin, growth, and criminal capabilities of cybercriminal networks. An international empirical analysis. Crime Law and Social Change, 67, 39–53.
Levy, S. (2001). Hackers: Heroes of the computer revolution. New York: Penguin.
Littman, J. (1997). The watchman: The twisted life and crimes of serial hacker Kevin Poulsen. New York: Little Brown.
Loper, K. (2001, November). Profiling hackers: beyond psychology. In annual meeting of the American Academy of Sociology.
Marbach, W. (1983). Cracking Down on Hackers. Newsweek, 34.
Marcum, C. D., Higgins, G. E., Ricketts, M. L., & Wolfe, S. E. (2014). Hacking in high school: Cybercrime perpetration by juveniles. Deviant Behavior, 35(7):581–591.
Meyer, G. R. (1989). The social organization of the computer underground. Master’s thesis.
Miller W. B., (1958). Lower Class Culture as a Generating Milieu of Gang Delinquency. Journal of Social Issues 14(3):5–19
Mitnick, K. D., & Simon, W. L. (2002). The Art of Deception: Controlling the Human Element of Security. New York: Wiley Publishing.
Motoyama, M., McCoy, D., Levchenko, K., Savage, S., & Voelker, G. M. (2011). An Analysis of Underground Forums. IMC’11, 71–79.
Rid, T. (2013). Cyberwar will not take place. London: Hurst Publishers.
Schell, B. H., & Dodge, J. L. (2002). The hacking of America: Who’s doing it, why, and how. Westport: Quorum Books.
Schneider, H. (2008). Wargames. United Artists.
Scott, J. (2005). BBS: The documentary.
Shimomura, T., & Markoff, J. (1996). Takedown: The pursuit and capture of Kevin Mitnick, America’s most wanted computer outlaw – by the man who did it. New York: Hyperion.
Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34, 495–518.
Slatalla, M., & Quittner, J. (1995). Masters of deception: The gang that ruled cyberspace. New York: Harper Collins Publishers.
Smith, R., Grabosky, P., & Urbas, G. (2003). Cybercriminals on Trial. Cambridge University Press.
Steinmetz, K. F. (2015). Craft(y)ness: An ethnographic study of hacking. British Journal of Criminology, 55, 125–145.
Taylor, P. (1999). Hackers: Crime in the digital sublime. London: Routledge.
Thomas, D. (2002). Hacker culture. Minneapolis: University of Minnesota Press.
Turkle, S. (1984). The Second Self: Computers and the Human Spirit. Cambridge, MA: MIT Press.
Verison. (2016). Version 2016 Data Breach Investigations Report. [Online] Avaiable at: https://www.verizon.com/about/news/verizons-2016-data-breach-investigations-report-finds-cybercriminals-are-exploiting-human
Voiskounsky, A. E., & Smyslova, O. V. (2003). Flow in Computer Hacking: A Model. Human.Society@Internet 2003.
Wall, D. S. (2001). Cybercrimes and the internet. In D. S. Wall (Ed.), Crime and the internet (pp. 1–17). New York: Routledge.
Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Cambridge, UK: Polity Press.
Wang, W. (2006). Steal this computer book 4.0: What they won’t tell you about the internet. Boston: No Starch Press.
Woo H., Kim Y., & Dominick J. (2004) Hackers: Militants or Merry Pranksters? A Content Analysis of Defaced Web Pages. Media Psychology 6(1):63–82.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Author(s)
About this entry
Cite this entry
Holt, T.J. (2020). Computer Hacking and the Hacker Subculture. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-78440-3_31
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-78439-7
Online ISBN: 978-3-319-78440-3
eBook Packages: Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences