{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T01:46:42Z","timestamp":1697852802008},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2009,8,7]],"date-time":"2009-08-07T00:00:00Z","timestamp":1249603200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1007\/s10796-009-9203-y","type":"journal-article","created":{"date-parts":[[2009,8,6]],"date-time":"2009-08-06T11:59:55Z","timestamp":1249559995000},"page":"425-431","source":"Crossref","is-referenced-by-count":6,"title":["Hacker Taggers: A new type of hackers"],"prefix":"10.1007","volume":"12","author":[{"given":"Matthew","family":"Warren","sequence":"first","affiliation":[]},{"given":"Shona","family":"Leitch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,8,7]]},"reference":[{"key":"9203_CR1","unstructured":"ACT Government. (2005) Press Release: Sabotage of Chief Minister\u2019s Website, 1st November, http:\/\/chiefminister.act.gov.au\/media.php?v=3871&m=51&s=33 , Accessed 15th November, 2008."},{"key":"9203_CR2","volume-title":"Shifting boundaries of cybercrime: From computer hacking to cyber-terrorism, Journal of Criminal Legal Justice","author":"S Bronitt","year":"2003","unstructured":"Bronitt, S., & Gani, M. (2003). Shifting boundaries of cybercrime: From computer hacking to cyber-terrorism, Journal of Criminal Legal Justice. Australia: Lawbooks.Co."},{"key":"9203_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-349-10137-5","volume-title":"Information security for managers","author":"W Caelli","year":"1989","unstructured":"Caelli, W., Longley, D., & Shain, M. (1989). Information security for managers. New York: Stockton."},{"key":"9203_CR4","volume-title":"Perceptions of computer crime, conference proceedings crime against business (Australian Institute of Criminology)","author":"R Coldwell","year":"1994","unstructured":"Coldwell, R. (1994). Perceptions of computer crime, conference proceedings crime against business (Australian Institute of Criminology). Australia: Canberra."},{"key":"9203_CR5","doi-asserted-by":"crossref","unstructured":"Coldwell, R. (1995) Australian attitudes toward legal intervention into hacking. Communications of the ACM, Vol 38, No 11.","DOI":"10.1145\/219717.219812"},{"key":"9203_CR6","unstructured":"Computer World. (2005) ACT Chief Minister targeted by hackers, November, 1st, http:\/\/www.computerworld.com.au\/index.php\/id;1349625640;fp;16;fpid;0 , Accessed May, 2008."},{"key":"9203_CR7","unstructured":"Chantler, A. (1995) Risk: The profile of the computer hacker, PhD Thesis, Curtin Business School, Australia."},{"key":"9203_CR8","volume-title":"Underground hacking, madness and obsession on the electronic frontier","author":"S Dreyfus","year":"1997","unstructured":"Dreyfus, S. (1997). Underground hacking, madness and obsession on the electronic frontier. Australia: Random House."},{"key":"9203_CR9","volume-title":"The hacker ethic and the spirit of the information age","author":"P Himanen","year":"2001","unstructured":"Himanen, P. (2001). The hacker ethic and the spirit of the information age. UK: Random House."},{"key":"9203_CR10","unstructured":"Hughes, G. (1990). Computer crime: the liability of Hackers. Australian Computer Journal, 22(2), May. http:\/\/www.samaritans.org.uk"},{"key":"9203_CR11","volume-title":"Cybercrime: Vandalizing the information society","author":"S Furnell","year":"2002","unstructured":"Furnell, S. (2002). Cybercrime: Vandalizing the information society. London: Addison-Wesley."},{"key":"9203_CR12","doi-asserted-by":"crossref","unstructured":"Furnell, S. (2004). Hacking begins at home: Are company networks at risk from home computers? Computer fraud and security, 2004(1), 4-7, January 2004.","DOI":"10.1016\/S1361-3723(04)00016-8"},{"key":"9203_CR13","volume-title":"Computer abuse: Vandalising the information society, Internet research Vol 7, No 1","author":"S Furnell","year":"1996","unstructured":"Furnell, S., & Warren, M. J. (1996). Computer abuse: Vandalising the information society, Internet research Vol 7, No 1. UK: MCB."},{"key":"9203_CR14","volume-title":"Dissecting the \u2018Hacker Manifesto\u2019, Information management and computer security Vol 7, No 2","author":"S Furnell","year":"1999","unstructured":"Furnell, S., Dowland, P. S., & Sanders, P. (1999). Dissecting the \u2018Hacker Manifesto\u2019, Information management and computer security Vol 7, No 2. UK: MCB."},{"key":"9203_CR15","volume-title":"The 1992 profile of computer abuse in Australia, ACARB (Centre for Computer Abuse research at RMIT)","author":"V Kamay","year":"1992","unstructured":"Kamay, V., & Adams, T. (1992). The 1992 profile of computer abuse in Australia, ACARB (Centre for Computer Abuse research at RMIT). Australia: Melbourne."},{"key":"9203_CR16","unstructured":"Kingsley, P. (2002) Queen v Boden, ACISP 2002 Forensic Computer Workshop, Melbourne."},{"key":"9203_CR17","volume-title":"Hackers: Heroes of the computer revolution","author":"S Levy","year":"1984","unstructured":"Levy, S. (1984). Hackers: Heroes of the computer revolution. London: Penguin."},{"key":"9203_CR18","volume-title":"Cyberactivism: Online activism in theory and practice","author":"M McCaughey","year":"2003","unstructured":"McCaughey, M., & Ayers, D. (2003). Cyberactivism: Online activism in theory and practice. London: Routledge."},{"key":"9203_CR19","volume-title":"Future active: Media activism and the internet","author":"G Meikle","year":"2002","unstructured":"Meikle, G. (2002). Future active: Media activism and the internet. London: Routledge."},{"key":"9203_CR20","unstructured":"Mizrach, S. (1997) Is there a Hacker Ethic for 90s Hackers? http:\/\/www.fiu.edu\/\u223cmizrachs\/hackethic.html , Accessed 10th Jan, 2008."},{"key":"9203_CR21","unstructured":"O\u2019Grady, D. (2006) Italians jailed for breaching Australian defence website, Sydney Morning News, July 12th."},{"key":"9203_CR22","volume-title":"Crimes by computer","author":"D Parker","year":"1976","unstructured":"Parker, D. (1976). Crimes by computer. USA: Scribner."},{"key":"9203_CR23","volume-title":"Cyber adversary characterization: Auditing the hacker mind","author":"T Parker","year":"2004","unstructured":"Parker, T., Devost, M., Sachs, M., Shaw, E., & Stroz, E. (2004). Cyber adversary characterization: Auditing the hacker mind. USA: Syngress."},{"key":"9203_CR24","volume-title":"Viruses, bugs and Star Wars","author":"G Simons","year":"1989","unstructured":"Simons, G. (1989). Viruses, bugs and Star Wars. UK: NCC Blackwell."},{"key":"9203_CR25","volume-title":"The Hacker crackdown: Law and disorder on the electronic frontier","author":"B Sterling","year":"1993","unstructured":"Sterling, B. (1993). The Hacker crackdown: Law and disorder on the electronic frontier. USA: Mass Market Paperback."},{"key":"9203_CR26","unstructured":"Sydney Morning Herald. (2005) Hackers shut down Stanhope website, November 1st, http:\/\/www.smh.com.au\/news\/national\/hackers-shut-down-stanhope-website\/2005\/11\/01\/1130720534395.html , Accessed 15th May, 2008."},{"key":"9203_CR27","unstructured":"The Age. (2005). Leaking minister in dog house, October 22nd, http:\/\/www.theage.com.au\/news\/war-on-terror\/leaking-minister-in-dog-house\/2005\/10\/21\/1129775962082.html , Accessed 15th May, 2008."},{"key":"9203_CR28","volume-title":"Hacker culture","author":"D Thomas","year":"2002","unstructured":"Thomas, D. (2002). Hacker culture. USA: University of Minnesota Press."},{"key":"9203_CR29","doi-asserted-by":"crossref","DOI":"10.4159\/9780674044845","volume-title":"A Hacker manifesto","author":"M Wark","year":"2004","unstructured":"Wark, M. (2004). A Hacker manifesto. USA: Harvard University Press."},{"key":"9203_CR30","unstructured":"ZDNET. (2002). Australian Hacking group closes its doors, November 18th, http:\/\/www.zdnet.com.au\/news\/security\/soa\/Australian-hacking-group-closes-its-doors\/0,130061744,120270013,00.htm , Accessed 15th May, 2008."}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-009-9203-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-009-9203-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-009-9203-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T07:59:47Z","timestamp":1685087987000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-009-9203-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8,7]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,9]]}},"alternative-id":["9203"],"URL":"https:\/\/doi.org\/10.1007\/s10796-009-9203-y","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,8,7]]}}}