Analyze what makes computer hacking and cyber crime attractive for some people. Briefly examine the history of computer hacking and hackers.

Subculture of Cyber Crime
Prior to beginning work on this Interactive Assignment, read the Choo (2008) and Koops (2010) articles.

As the newly elected sheriff of the Village of Dibley, you have been assigned to head the National Cybersecurity Squad. Your team is responsible for developing a report on the typology of a computer hacker. You have recently stumbled across the 1983 motion picture Wargames and were surprised to learn that it is widely considered to be one of the most significant factors responsible for increasing public interest in technology, most notably computer hacking.

After watching the movie, you have gained an interest in the world of cyber crime and have started lurking in various hacking fan sites, news groups, Facebook groups, and bulletin board networks in an attempt to learn as much as possible about the culture of cyber criminals and computer hackers. You want to ensure that you bring as much relevant information to your team as possible.

Create a workable typology of a computer hacker to present to your team. Your report must be in the form of a PowerPoint presentation comprised of at least six content slides. Your PowerPoint presentation must be clear and provide your audience with an understanding of the purpose and meaning of the report.

Include the following elements in your presentation:

Analyze what makes computer hacking and cyber crime attractive for some people.
Briefly examine the history of computer hacking and hackers.
Identify the defining characteristics of a hacker.
Describe the beneficial aspects of computer hacking.
Examine how hackers utilize cyberspace to communicate and form communities.
Evaluate the computer hacking aspects of cyber crime that thwart efforts by the law enforcement community to detect and combat such activity.

Analyze what makes computer hacking and cyber crime attractive for some people. Briefly examine the history of computer hacking and hackers.
Scroll to top