| overview 
 perspectives
 
 frameworks
 
 agencies
 
 CII
 
 desktops
 
 criminals
 
 messaging
 
 vandalism
 
 fraud
 
 authentication
 
 anonymity
 
 pseudonymity
 
 malware
 
 crypto
 
 geolocation
 
 economics
 
 insurance
 
 kids
 
 s-business
 
 appraisal
 
 self-help
 
 forensics
 
 
 
 
 
 
 
 
 
 
 
  related
 Guides:
 
 Governance
 
 Information
 Economy
 
 Consumers
 & Trust
 
 Privacy
 
 
 
  related
 Profiles:
 
 Identity
 Theft
 
 Forgery &
 Forensics
 
 Surveillance
 
 
 
 
 
 
 |  vandalism 
                        and DOS 
 This page is under development.
 
 While you're waiting for the real content to appear you 
                        may be entertained by Marc Rogers's ambitious Psychology 
                        of Hackers: Steps Toward a New Taxonomy paper, 
                        profiling 'The Hacker' or CyberPunk (CP)
 
                        The 
                          available data indicates that individuals classified 
                          as CP are Caucasian, 12-28 years, from middle class 
                          families. They are loners, who have limited social skills 
                          and perform poorly in school (Chandler, 1996; Littman 
                          1996; Hafner & Markoff, 1995; Sperling, 1992). They 
                          are usually not career oriented, but show an aptitude 
                          with computers and other electronic equipment. Their 
                          families are usually considered dysfunctional, single 
                          parent, abusive, and in some cases sexually abusive 
                          (Goodell, 1995). Often these individuals display obsessive 
                          traits, staying online for days on end with no sleep 
                          (Goodell, 1995). Cyber-punks have a tendency to brag 
                          about their exploits. This may be due in part to their 
                          desire to be admired by their hacking peers (Post, 1996; 
                          Sperling, 1992). The bragging often results in them 
                          coming to the attention of law enforcement. The bragging 
                          and willingness to talk about their exploits continues 
                          even while in custody and during interviews with law 
                          enforcement (Hafner & Markoff, 1995; Littman, 1995). 
                          The fact that many of the attacks are malicious in nature 
                          suggests that these individuals have unresolved anger 
                          and feel a need to strike out at something or someone 
                          (Post, 1996; Sperling, 1992). They are not comfortable 
                          with people so they strike out at computers and networks, 
                          rationalizing that corporations are immoral and need 
                          to be taught a lesson (Post, 1996). Oh 
                        yes, and they like pizza too.
 
 
 
 
 
 
  next page  (identity 
                        crime) 
 
 | 
                        
                       |