Do hackers seek variety? An empirical analysis of website defacements

Kok Wei Ooi, Seung Hyun Kim, Qiu Hong Wang, Kai Lung Hui

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

The importance of securing the cyberspace is higher than ever along with the evolution of cyber attacks launched by hackers with malicious intention. However, there has been little research to understand the hackers who are the most important agents determining the landscape of information security. This paper investigates the behaviors of hackers using a longitudinal dataset of defacement attacks. Based on theories of economics of criminal behaviors and variety seeking, we find that hackers seek variety in choosing their victims in terms of region, hacking method, and the type of operating systems; as their prior experience is focused in terms of hacking methods, target regions or operating systems, they tend to launch more attacks using new hacking methods, or against targets in new regions or using new operating systems. Furthermore, hackers are more likely to seek variety as the time interval between the previous and the current attack becomes longer.

Original languageEnglish
Title of host publicationInternational Conference on Information Systems, ICIS 2012
PublisherAIS/ICIS Administrative Office
Pages824-833
Number of pages10
ISBN (Print)9781627486040
Publication statusPublished - 2012 Jan 1
EventInternational Conference on Information Systems, ICIS 2012 - Orlando, FL, United States
Duration: 2012 Dec 162012 Dec 19

Publication series

NameInternational Conference on Information Systems, ICIS 2012
Volume1

Other

OtherInternational Conference on Information Systems, ICIS 2012
CountryUnited States
CityOrlando, FL
Period12/12/1612/12/19

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Statistics, Probability and Uncertainty
  • Applied Mathematics
  • Library and Information Sciences

Cite this

Ooi, K. W., Kim, S. H., Wang, Q. H., & Hui, K. L. (2012). Do hackers seek variety? An empirical analysis of website defacements. In International Conference on Information Systems, ICIS 2012 (pp. 824-833). (International Conference on Information Systems, ICIS 2012; Vol. 1). AIS/ICIS Administrative Office.