Please use this identifier to cite or link to this item:
https://scholarbank.nus.edu.sg/handle/10635/78103
DC Field | Value | |
---|---|---|
dc.title | Do hackers seek variety? An empirical analysis of website defacements | |
dc.contributor.author | Ooi, K.W. | |
dc.contributor.author | Kim, S.H. | |
dc.contributor.author | Wang, Q.-H. | |
dc.contributor.author | Hui, K.L. | |
dc.date.accessioned | 2014-07-04T03:12:28Z | |
dc.date.available | 2014-07-04T03:12:28Z | |
dc.date.issued | 2012 | |
dc.identifier.citation | Ooi, K.W.,Kim, S.H.,Wang, Q.-H.,Hui, K.L. (2012). Do hackers seek variety? An empirical analysis of website defacements. International Conference on Information Systems, ICIS 2012 1 : 824-833. ScholarBank@NUS Repository. | |
dc.identifier.isbn | 9781627486040 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/78103 | |
dc.description.abstract | The importance of securing the cyberspace is higher than ever along with the evolution of cyber attacks launched by hackers with malicious intention. However, there has been little research to understand the hackers who are the most important agents determining the landscape of information security. This paper investigates the behaviors of hackers using a longitudinal dataset of defacement attacks. Based on theories of economics of criminal behaviors and variety seeking, we find that hackers seek variety in choosing their victims in terms of region, hacking method, and the type of operating systems; as their prior experience is focused in terms of hacking methods, target regions or operating systems, they tend to launch more attacks using new hacking methods, or against targets in new regions or using new operating systems. Furthermore, hackers are more likely to seek variety as the time interval between the previous and the current attack becomes longer. | |
dc.source | Scopus | |
dc.subject | Economics of information security | |
dc.subject | Hacker | |
dc.subject | Variety seeking | |
dc.subject | Website defacement | |
dc.type | Conference Paper | |
dc.contributor.department | INFORMATION SYSTEMS | |
dc.description.sourcetitle | International Conference on Information Systems, ICIS 2012 | |
dc.description.volume | 1 | |
dc.description.page | 824-833 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.