TY - JOUR
T1 - Forty years of movie hacking
T2 - Considering the potential implications of the popular media representation of computer hackers from 1968 to 2008
AU - Gordon, Damian
PY - 2010
Y1 - 2010
N2 - Increasingly movies are being produced which feature plots that incorporate elements of computer security and hacking, and cumulatively these movies are creating a public perception as to the nature of computer security. This research examines movies that feature hackers (and hacking) to identify if any common themes emerge from these movies in their representation of these issues. To achieve this, first a corpus of hacking movies is created, and then using a qualitative data analysis technique, guidelines are developed which distinguish those movies that actually have the potential to create a perception with the general public. The resultant dataset is analysed and the salient details are compared to the reality of hacking. This research has implications in a range of fields, including in the education of computer students, organisation computer security and in the behaviour of the general public when using computers.
AB - Increasingly movies are being produced which feature plots that incorporate elements of computer security and hacking, and cumulatively these movies are creating a public perception as to the nature of computer security. This research examines movies that feature hackers (and hacking) to identify if any common themes emerge from these movies in their representation of these issues. To achieve this, first a corpus of hacking movies is created, and then using a qualitative data analysis technique, guidelines are developed which distinguish those movies that actually have the potential to create a perception with the general public. The resultant dataset is analysed and the salient details are compared to the reality of hacking. This research has implications in a range of fields, including in the education of computer students, organisation computer security and in the behaviour of the general public when using computers.
KW - Computer security breaches
KW - Crackers and hackers
KW - Filmic representations
KW - Jungian archetypes
UR - http://www.scopus.com/inward/record.url?scp=84878855078&partnerID=8YFLogxK
U2 - 10.1504/IJITST.2010.031472
DO - 10.1504/IJITST.2010.031472
M3 - Article
AN - SCOPUS:84878855078
SN - 1748-569X
VL - 2
SP - 59
EP - 87
JO - International Journal of Internet Technology and Secured Transactions
JF - International Journal of Internet Technology and Secured Transactions
IS - 1-2
ER -