首页> 外文学位 >Hacks, cracks, and crime: An examination of the subculture and social organization of computer hackers.
【24h】

Hacks, cracks, and crime: An examination of the subculture and social organization of computer hackers.

机译:黑客,裂缝和犯罪:对计算机黑客的亚文化和社会组织的考察。

获取原文
获取原文并翻译 | 示例

摘要

This dissertation examines both the subculture and social organization practices of computer hackers. The concept of normative orders (Herbert, 1998: 347) is used to explore hacker subculture in different contexts (Herbert, 1998: 347). To assess hacker social organization, I use Best and Luckenbill's (1994) framework of organizational sophistication as well as measures from Decker et al. (1998). The relationships between subculture, social organization, and behavior are explored as well. I collected three qualitative data sets to explore these issues, including posts from six on-line hacker discussion forums, in-depth interviews with active hackers, and field observations at the Defcon 12 hacker convention. These data were triangulated and used to investigate the research questions.; The findings suggest the social world of hackers is shaped by five normative orders: technology, knowledge, commitment, categorization, and law. These orders are interrelated, and overwhelmingly influenced by technology. Furthermore, hackers tend to perform hacks alone, but have relatively loose social networks that are used to share information and introduce subcultural norms to new hackers. These networks are couched in a larger hacker community that provided access to a variety of resources and materials. Finally, this analysis demonstrates the dynamic relationships between subculture, social organization, and behavior. I found that subculture and social organization structure the nature of deviant relationships, norms, and behavior. At the same time, the nature of deviant acts appears to influence social organization and subculture. I also discuss the implications for research on computer hackers and crime generally.
机译:本文研究了计算机黑客的亚文化和社会组织实践。规范秩序的概念(Herbert,1998:347)用于探索不同背景下的黑客亚文化(Herbert,1998:347)。为了评估黑客的社会组织,我使用Best and Luckenbill(1994)的组织复杂度框架以及Decker等人的方法。 (1998)。还探讨了亚文化,社会组织和行为之间的关系。我收集了三个定性数据集来探讨这些问题,包括来自六个在线黑客讨论论坛的帖子,对活跃黑客的深入采访以及在Defcon 12黑客大会上的实地观察。这些数据被三角化,并用于调查研究问题。研究结果表明,黑客的社会世界由五个规范性秩序所塑造:技术,知识,承诺,分类和法律。这些顺序是相互关联的,并且受技术的影响很大。此外,黑客倾向于单独执行黑客攻击,但社交网络相对宽松,用于共享信息并向新的黑客介绍亚文化规范。这些网络位于一个较大的黑客社区中,该社区提供对各种资源和资料的访问。最后,该分析证明了亚文化,社会组织和行为之间的动态关系。我发现亚文化和社会组织构成了异常关系,规范和行为的本质。同时,越轨行为的性质似乎会影响社会组织和亚文化。我还将讨论有关计算机黑客和犯罪的总体研究含义。

著录项

  • 作者

    Holt, Thomas J.;

  • 作者单位

    University of Missouri - Saint Louis.;

  • 授予单位 University of Missouri - Saint Louis.;
  • 学科 Sociology General.; Sociology Criminology and Penology.; Computer Science.
  • 学位 Ph.D.
  • 年度 2005
  • 页码 210 p.
  • 总页数 210
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 社会学;法学各部门;自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号