Longitudinal criminological studies greatly improved our understanding of the longitudinal patterns of criminality. These studies, however, focused almost exclusively on traditional types of offending and it is therefore unclear whether results are generalizable to online types of offending. This study attempted to identify the developmental trajectories of active hackers who perform web defacements. The data for this study consisted of 2,745,311 attacks performed by 66,553 hackers and reported to Zone-H between January 2010 and March 2017. Semi-parametric group-based trajectory models were used to distinguish six different groups of hackers based on the timing and frequency of their defacements. The results demonstrated some common relationships to traditional types of crime, as a small population of defacers accounted for the majority of defacements against websites. Additionally, the methods and targeting practices of defacers differed based on the frequency with which they performed defacements generally.
DOCUMENT
According to the essayist and memoirist Rebecca Solnit, to be lost is 'to be fully present, and to be fully present is to be capable of being in uncertainty and mystery.' Solnit considers being lost 'a psychic state achievable through geography'. The flip-side is that geography can also prevent one from getting lost. It is easier to find one's way in the grid-like cities of the new world than in the swerving cobblestone streets of the old. A similar evolution of efficiency is happening on the web. The new world, in this analogy, is Web 2.0, and its shape is neither grid- nor weblike. Increasingly, it's a point of convergence.
MULTIFILE
In the fall of 1999, an international integrated product development pilot project based on collaborative engineering was started with team members in two international teams from the United States, The Netherlands and Germany. Team members interacted using various Internet capabilities, including, but not limited to, ICQ (means: I SEEK YOU, an internet feature which immediately detects when somebody comes "on line"), web phones, file servers, chat rooms and Email along with video conferencing. For this study a control group with all members located in the USA only also worked on the same project.
DOCUMENT