{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T19:10:09Z","timestamp":1654110609102},"reference-count":0,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,4,1]]},"abstract":"<p>Financial fraud and identity theft conducted by criminal hackers have become the top source of the greatest financial losses for organizations. Even though Hacker groups are complex socio-technical systems, much extant research on hackers is conducted at the individual level of analysis. This research proposes a research model composed of five dimensions and their relations in order to study hacker\u2019s social organization in the whole socio-technical context. Based on this model, the researcher applies network analysis methods to disclose the structure and patterns of a significant and complex hacker group, Shadow crew. Network analysis tools, such as Automap and ORA, are applied for data processing and data analysis. Three network measures: degree centrality, cognitive demand, and eigenvector centrality, are utilized to determine the critical leaders. Out-degree centrality is employed to analyze the relations among the five dimensions in the research model.<\/p>","DOI":"10.4018\/jisp.2009040107","type":"journal-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T18:54:54Z","timestamp":1297796094000},"page":"90-104","source":"Crossref","is-referenced-by-count":0,"title":["The Social Organization of a Criminal Hacker Network"],"prefix":"10.4018","volume":"3","author":[{"given":"Yong","family":"Lu","sequence":"first","affiliation":[{"name":"Pennsylvania State University, USA"}]}],"member":"2432","container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=34061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T18:34:46Z","timestamp":1654108486000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jisp.2009040107"}},"subtitle":["A Case Study"],"short-title":[],"issued":{"date-parts":[[2009,4,1]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jisp.2009040107","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,4,1]]}}}