Forty years of movie hacking: considering the potential implications of the popular media representation of computer hackers from 1968 to 2008 Online publication date: Fri, 05-Feb-2010
by Damian Gordon
International Journal of Internet Technology and Secured Transactions (IJITST), Vol. 2, No. 1/2, 2010
Abstract: Increasingly movies are being produced which feature plots that incorporate elements of computer security and hacking, and cumulatively these movies are creating a public perception as to the nature of computer security. This research examines movies that feature hackers (and hacking) to identify if any common themes emerge from these movies in their representation of these issues. To achieve this, first a corpus of hacking movies is created, and then using a qualitative data analysis technique, guidelines are developed which distinguish those movies that actually have the potential to create a perception with the general public. The resultant dataset is analysed and the salient details are compared to the reality of hacking. This research has implications in a range of fields, including in the education of computer students, organisation computer security and in the behaviour of the general public when using computers.
Online publication date: Fri, 05-Feb-2010
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Internet Technology and Secured Transactions (IJITST):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email firstname.lastname@example.org