SOC 2070 Lecture Notes - Lecture 14: Script Kiddie, Risk-Seeking, Innocent Victims
Document Summary
We really have no idea: the challenge of anonymity, depends on definitional criteria, for example: Membership isn"t formally regulated (there is no gatekeeper to monitor who belongs and who doesn"t) Anonymity and technology facilitates transience (come and go: yet, research shows that some hackers have relevantly similar behavior, dominant norms and values of the hacker subculture: All consuming love for technology, desire to explore it and apply it in new ways. Belief that technology can solve our problems (technological utopianism) help build a better world than we have now. Constant pursuit of new skills/knowledge those who don"t have this desire are looked down upon and considered to be a crappy hacker. Demonstrate mastery by exerting control of other individuals computers or technology. Secrecy about identity and activity (what they are up to) They are dependent on secrecy but also love social recognition. Successes are attributed to individual or group alias/handle.