Hacktivist activity is becoming increasingly prominent within the cyber domain and society. The boundaries between cyber terrorism and hacktivism are becoming more unclear. Hackers are becoming more skilled and involved in socio-political matters, not only in the U.S. but also internationally. Terrorist groups like the Islamic State of Iraq and Syria (ISIS) have found a venue to voice their ideals and recruit via social media. Furthermore, terrorist groups have partnerships with hacktivist groups such as Cyber Caliphates. This practice has pointed particular inclinations that characterize different hacker groups with different events. For this reason, computer security has become a matter of national security in the U.S. and research regarding political and socio-economic trends as stimuli for the increment on hacktivist activity must be conducted. This research explored the issue of profiling hacktivist groups, departing from the analysis of the hacker’s motivation as a product of a political and socio-economic environment. As comparative angles of analysis, the literature exposed empirical and factual information that integrated U.S. and international hacktivist events. The final research analysis proposed that U.S. political and socio-economic trends promoted hacktivist activity. Moreover, the research exposed that the existent relationship between extrinsic and intrinsic stimuli with political and socio-economical stressors (i.e., misrepresentation, restriction of freedoms, frustration and aggression) promotes hackers to act as hacktivists. Keywords: Psychological profiling; Professor Riddell, Hackers; Hacktivist; Hacktivism; Political Hacktivism; Socio-economic Hacktivism; Extrinsic stimuli; Intrinsic stimuli; Cyber Diplomacy; Cyber Constitution; Cybercrime Awareness Normalization Unit.
|School Location:||United States -- New York|
|Source:||MAI 54/05M(E), Masters Abstracts International|
|Subjects:||Information Technology, Criminology, Public policy|
|Keywords:||Cyber constitution, Cyber diplomacy, Cyber security, Hacker socio- economic stimuli, Hacktivism, Haker profiling|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be