SOC 2070 Lecture Notes - Lecture 14: Script Kiddie, Risk-Seeking, Innocent Victims

48 views5 pages
30 Mar 2017
Department
Course
Professor

Document Summary

We really have no idea: the challenge of anonymity, depends on definitional criteria, for example: Membership isn"t formally regulated (there is no gatekeeper to monitor who belongs and who doesn"t) Anonymity and technology facilitates transience (come and go: yet, research shows that some hackers have relevantly similar behavior, dominant norms and values of the hacker subculture: All consuming love for technology, desire to explore it and apply it in new ways. Belief that technology can solve our problems (technological utopianism) help build a better world than we have now. Constant pursuit of new skills/knowledge those who don"t have this desire are looked down upon and considered to be a crappy hacker. Demonstrate mastery by exerting control of other individuals computers or technology. Secrecy about identity and activity (what they are up to) They are dependent on secrecy but also love social recognition. Successes are attributed to individual or group alias/handle.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents