Loading…
An Exploratory Analysis of the Characteristics of Ideologically Motivated Cyberattacks
Web defacement is a form of hacking that involves altering the content of a website, resulting in repairs to the website code, loss of revenue, internal loss of productivity, and reputational damage. Limited research has examined the frequency of web defacements, the factors that distinguish them fr...
Saved in:
Published in: | Terrorism and political violence 2022-10, Vol.34 (7), p.1305-1320 |
---|---|
Main Authors: | , , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c366t-f2cec48af7b1ebd7e500c54e94b76ae121edbd6f5445202dfed07a662131a33 |
---|---|
cites | |
container_end_page | 1320 |
container_issue | 7 |
container_start_page | 1305 |
container_title | Terrorism and political violence |
container_volume | 34 |
creator | Holt, Thomas J. Lee, Jin Ree Freilich, Joshua D. Chermak, Steven M. Bauer, Johannes M. Shillair, Ruth Ross, Arun |
description | Web defacement is a form of hacking that involves altering the content of a website, resulting in repairs to the website code, loss of revenue, internal loss of productivity, and reputational damage. Limited research has examined the frequency of web defacements, the factors that distinguish them from other hacking motives, and the extent to which the correlates mirror research on physical acts of ideologically-motivated crime. The current study examined over 2.4 million web defacements hosted in the U.S. from 2012 to 2016 to assess aspects of routine activities theory associated with target selection and attack methods among ideologically-motivated defacements. A binary logistic regression analysis revealed that ideologically-motivated defacers were more likely to use unknown vulnerabilities; engage in repeated attacks; target top-level domains linked to foreign nations; domains ending in.edu; and homepages within websites. The findings of this study suggest that the target selection process of ideologically-motivated defacers are more purposive and designed to draw attention to their cause, resembling target preferences of individuals who engage in physical violence in support of an ideological agenda. |
doi_str_mv | 10.1080/09546553.2020.1777987 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2865138974</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2865138974</sourcerecordid><originalsourceid>FETCH-LOGICAL-c366t-f2cec48af7b1ebd7e500c54e94b76ae121edbd6f5445202dfed07a662131a33</originalsourceid><addsrcrecordid>eNp9kF1LwzAYhYMoOKc_QSh43Zk0n71zjKmDiReKtyFNE5fZNTPJ1P57Wzdvd_XC4TkH3geAawQnCAp4C0tKGKV4UsCijzjnpeAnYIQoZTkSmJ2C0cDkA3QOLmJcQ4goo-UIvE3bbP6zbXxQyYcum7aq6aKLmbdZWplstlJB6WSCi8npv3hRG9_4d6dV03TZk0_uSyVTZ7OuMv1KUvojXoIzq5porg53DF7u56-zx3z5_LCYTZe5xoyl3BbaaCKU5RUyVc0NhVBTYkpScaYMKpCpq5pZSgjtn6utqSFXjBUII4XxGNzsV7fBf-5MTHLtd6H_IMpCMIqwKDk5SnEoRMlIyXqK7ikdfIzBWLkNbqNCJxGUg2b5r1kOmuVBc9-72_dca33YqG8fmlom1fVKbVCtdlHi4xO_t7iEhg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2708896496</pqid></control><display><type>article</type><title>An Exploratory Analysis of the Characteristics of Ideologically Motivated Cyberattacks</title><source>International Bibliography of the Social Sciences (IBSS)</source><source>Taylor & Francis</source><source>Worldwide Political Science Abstracts</source><creator>Holt, Thomas J. ; Lee, Jin Ree ; Freilich, Joshua D. ; Chermak, Steven M. ; Bauer, Johannes M. ; Shillair, Ruth ; Ross, Arun</creator><creatorcontrib>Holt, Thomas J. ; Lee, Jin Ree ; Freilich, Joshua D. ; Chermak, Steven M. ; Bauer, Johannes M. ; Shillair, Ruth ; Ross, Arun</creatorcontrib><description>Web defacement is a form of hacking that involves altering the content of a website, resulting in repairs to the website code, loss of revenue, internal loss of productivity, and reputational damage. Limited research has examined the frequency of web defacements, the factors that distinguish them from other hacking motives, and the extent to which the correlates mirror research on physical acts of ideologically-motivated crime. The current study examined over 2.4 million web defacements hosted in the U.S. from 2012 to 2016 to assess aspects of routine activities theory associated with target selection and attack methods among ideologically-motivated defacements. A binary logistic regression analysis revealed that ideologically-motivated defacers were more likely to use unknown vulnerabilities; engage in repeated attacks; target top-level domains linked to foreign nations; domains ending in.edu; and homepages within websites. The findings of this study suggest that the target selection process of ideologically-motivated defacers are more purposive and designed to draw attention to their cause, resembling target preferences of individuals who engage in physical violence in support of an ideological agenda.</description><identifier>ISSN: 0954-6553</identifier><identifier>EISSN: 1556-1836</identifier><identifier>DOI: 10.1080/09546553.2020.1777987</identifier><language>eng</language><publisher>Abingdon: Routledge</publisher><subject>computer hacking ; Crime ; Cybercrime ; cyberterror ; Extremism ; Hacking ; Productivity ; Regression analysis ; Routine activities ; routine activities theory ; Target selection ; Websites</subject><ispartof>Terrorism and political violence, 2022-10, Vol.34 (7), p.1305-1320</ispartof><rights>2020 Taylor & Francis 2020</rights><rights>2020 Taylor & Francis</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c366t-f2cec48af7b1ebd7e500c54e94b76ae121edbd6f5445202dfed07a662131a33</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924,33222</link.rule.ids></links><search><creatorcontrib>Holt, Thomas J.</creatorcontrib><creatorcontrib>Lee, Jin Ree</creatorcontrib><creatorcontrib>Freilich, Joshua D.</creatorcontrib><creatorcontrib>Chermak, Steven M.</creatorcontrib><creatorcontrib>Bauer, Johannes M.</creatorcontrib><creatorcontrib>Shillair, Ruth</creatorcontrib><creatorcontrib>Ross, Arun</creatorcontrib><title>An Exploratory Analysis of the Characteristics of Ideologically Motivated Cyberattacks</title><title>Terrorism and political violence</title><description>Web defacement is a form of hacking that involves altering the content of a website, resulting in repairs to the website code, loss of revenue, internal loss of productivity, and reputational damage. Limited research has examined the frequency of web defacements, the factors that distinguish them from other hacking motives, and the extent to which the correlates mirror research on physical acts of ideologically-motivated crime. The current study examined over 2.4 million web defacements hosted in the U.S. from 2012 to 2016 to assess aspects of routine activities theory associated with target selection and attack methods among ideologically-motivated defacements. A binary logistic regression analysis revealed that ideologically-motivated defacers were more likely to use unknown vulnerabilities; engage in repeated attacks; target top-level domains linked to foreign nations; domains ending in.edu; and homepages within websites. The findings of this study suggest that the target selection process of ideologically-motivated defacers are more purposive and designed to draw attention to their cause, resembling target preferences of individuals who engage in physical violence in support of an ideological agenda.</description><subject>computer hacking</subject><subject>Crime</subject><subject>Cybercrime</subject><subject>cyberterror</subject><subject>Extremism</subject><subject>Hacking</subject><subject>Productivity</subject><subject>Regression analysis</subject><subject>Routine activities</subject><subject>routine activities theory</subject><subject>Target selection</subject><subject>Websites</subject><issn>0954-6553</issn><issn>1556-1836</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>7UB</sourceid><sourceid>8BJ</sourceid><recordid>eNp9kF1LwzAYhYMoOKc_QSh43Zk0n71zjKmDiReKtyFNE5fZNTPJ1P57Wzdvd_XC4TkH3geAawQnCAp4C0tKGKV4UsCijzjnpeAnYIQoZTkSmJ2C0cDkA3QOLmJcQ4goo-UIvE3bbP6zbXxQyYcum7aq6aKLmbdZWplstlJB6WSCi8npv3hRG9_4d6dV03TZk0_uSyVTZ7OuMv1KUvojXoIzq5porg53DF7u56-zx3z5_LCYTZe5xoyl3BbaaCKU5RUyVc0NhVBTYkpScaYMKpCpq5pZSgjtn6utqSFXjBUII4XxGNzsV7fBf-5MTHLtd6H_IMpCMIqwKDk5SnEoRMlIyXqK7ikdfIzBWLkNbqNCJxGUg2b5r1kOmuVBc9-72_dca33YqG8fmlom1fVKbVCtdlHi4xO_t7iEhg</recordid><startdate>20221003</startdate><enddate>20221003</enddate><creator>Holt, Thomas J.</creator><creator>Lee, Jin Ree</creator><creator>Freilich, Joshua D.</creator><creator>Chermak, Steven M.</creator><creator>Bauer, Johannes M.</creator><creator>Shillair, Ruth</creator><creator>Ross, Arun</creator><general>Routledge</general><general>Taylor & Francis Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7UB</scope><scope>8BJ</scope><scope>FQK</scope><scope>JBE</scope></search><sort><creationdate>20221003</creationdate><title>An Exploratory Analysis of the Characteristics of Ideologically Motivated Cyberattacks</title><author>Holt, Thomas J. ; Lee, Jin Ree ; Freilich, Joshua D. ; Chermak, Steven M. ; Bauer, Johannes M. ; Shillair, Ruth ; Ross, Arun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c366t-f2cec48af7b1ebd7e500c54e94b76ae121edbd6f5445202dfed07a662131a33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>computer hacking</topic><topic>Crime</topic><topic>Cybercrime</topic><topic>cyberterror</topic><topic>Extremism</topic><topic>Hacking</topic><topic>Productivity</topic><topic>Regression analysis</topic><topic>Routine activities</topic><topic>routine activities theory</topic><topic>Target selection</topic><topic>Websites</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Holt, Thomas J.</creatorcontrib><creatorcontrib>Lee, Jin Ree</creatorcontrib><creatorcontrib>Freilich, Joshua D.</creatorcontrib><creatorcontrib>Chermak, Steven M.</creatorcontrib><creatorcontrib>Bauer, Johannes M.</creatorcontrib><creatorcontrib>Shillair, Ruth</creatorcontrib><creatorcontrib>Ross, Arun</creatorcontrib><collection>CrossRef</collection><collection>Worldwide Political Science Abstracts</collection><collection>International Bibliography of the Social Sciences (IBSS)</collection><collection>International Bibliography of the Social Sciences</collection><collection>International Bibliography of the Social Sciences</collection><jtitle>Terrorism and political violence</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Holt, Thomas J.</au><au>Lee, Jin Ree</au><au>Freilich, Joshua D.</au><au>Chermak, Steven M.</au><au>Bauer, Johannes M.</au><au>Shillair, Ruth</au><au>Ross, Arun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An Exploratory Analysis of the Characteristics of Ideologically Motivated Cyberattacks</atitle><jtitle>Terrorism and political violence</jtitle><date>2022-10-03</date><risdate>2022</risdate><volume>34</volume><issue>7</issue><spage>1305</spage><epage>1320</epage><pages>1305-1320</pages><issn>0954-6553</issn><eissn>1556-1836</eissn><abstract>Web defacement is a form of hacking that involves altering the content of a website, resulting in repairs to the website code, loss of revenue, internal loss of productivity, and reputational damage. Limited research has examined the frequency of web defacements, the factors that distinguish them from other hacking motives, and the extent to which the correlates mirror research on physical acts of ideologically-motivated crime. The current study examined over 2.4 million web defacements hosted in the U.S. from 2012 to 2016 to assess aspects of routine activities theory associated with target selection and attack methods among ideologically-motivated defacements. A binary logistic regression analysis revealed that ideologically-motivated defacers were more likely to use unknown vulnerabilities; engage in repeated attacks; target top-level domains linked to foreign nations; domains ending in.edu; and homepages within websites. The findings of this study suggest that the target selection process of ideologically-motivated defacers are more purposive and designed to draw attention to their cause, resembling target preferences of individuals who engage in physical violence in support of an ideological agenda.</abstract><cop>Abingdon</cop><pub>Routledge</pub><doi>10.1080/09546553.2020.1777987</doi><tpages>16</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0954-6553 |
ispartof | Terrorism and political violence, 2022-10, Vol.34 (7), p.1305-1320 |
issn | 0954-6553 1556-1836 |
language | eng |
recordid | cdi_proquest_journals_2865138974 |
source | International Bibliography of the Social Sciences (IBSS); Taylor & Francis; Worldwide Political Science Abstracts |
subjects | computer hacking Crime Cybercrime cyberterror Extremism Hacking Productivity Regression analysis Routine activities routine activities theory Target selection Websites |
title | An Exploratory Analysis of the Characteristics of Ideologically Motivated Cyberattacks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T08%3A40%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20Exploratory%20Analysis%20of%20the%20Characteristics%20of%20Ideologically%20Motivated%20Cyberattacks&rft.jtitle=Terrorism%20and%20political%20violence&rft.au=Holt,%20Thomas%20J.&rft.date=2022-10-03&rft.volume=34&rft.issue=7&rft.spage=1305&rft.epage=1320&rft.pages=1305-1320&rft.issn=0954-6553&rft.eissn=1556-1836&rft_id=info:doi/10.1080/09546553.2020.1777987&rft_dat=%3Cproquest_cross%3E2865138974%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c366t-f2cec48af7b1ebd7e500c54e94b76ae121edbd6f5445202dfed07a662131a33%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2708896496&rft_id=info:pmid/&rfr_iscdi=true |