Mathews Journal of Forensic Research

2692-8442

Previous Issues Volume 1, Issue 1 - 2018

Mini Review Full-Text  PDF  

Converting the Culprits/Reducing International Cyber Security Vulnerability: Garnering Hacker Allegiance Within and Across Borders

Georgie Ann Weatherby*

Department of Sociology & Criminology, Gonzaga University, Spokane, WA 99258-0065 U. S. A.

Corresponding Author: Georgie Ann Weatherby, Department of Sociology & Criminology, Gonzaga University, Spokane, WA 99258-0065 U. S. A, E-Mail: [email protected]

Received Date:  21 Sep 2018  
Accepted Date:  10 Oct 2018  
Published Date: 15 Oct 2018

Copyright © 2018 Weatherby GA

Citation: Weatherby GA. (2018). Converting the Culprits/Reducing International Cyber Security Vulnerability: Garnering Hacker Allegiance Within and Across Borders. Mathews J Foren. 1(1): 006.

 

ABSTRACT

Cybercrimes are increasingly an international threat. Perpetrators cross borders, whether tangible or invisible, often seamlessly and without regard for security measures. Modern nations and third world countries alike are known targets, and can be held hostage by perceptive technocrats. For instance, the United States has a small number of electric grids which, if paralyzed simultaneously, could entirely block access to power, placing lives in peril (airspace would be compromised, even hospitals with back-up generators would not function at full-strength, food and supplies could not be transported, and communication by all means would be halted). Such destruction would be even easier in island countries and on less developed continents. The question to ponder is this: How do we harness these electronic abilities, turning potential evil into progress for the greater good, to counter cyber-attacks? Answers will be discussed, as ways of pinpointing internal and international weaknesses and turning enemies into advocates for the states in question. Further, in order to combat cyber security threats, how can those with the means to commit these crimes be coaxed to join forces with the governments and corporations in question? How do we identify them, and lure them to our side? Broken Windows Theory will be applied to the opportunity to corrupt cyberspace, and Social Exchange Theory and Rational Choice Theory will be employed to analyze potential reciprocity rewards structures.


Creative Commons License

© 2015 Mathews Open Access Journals. All Rights Reserved.

Open Access by Mathews Open Access Journals is licensed under a
Creative Commons Attribution 4.0 International License.
Based On a Work at Mathewsopenaccess.com