What do you think about hackers?
Furnell, Steven. Cybercrime: vandalizing the information society. Boston, MA: Addison-Wesley, 2002. 316p. ISBN 0-201-72159-7. $29.99
Our daily life is filled with information technologies that we use to improve quality of our life. Mobile telephones, Internet, e-mail are becoming essential for communication occurring in modern society. Every common man knows words like "hacker" and "virus", mostly in the context of loss of information, sophisticated theft of money, breached security, etc.
The book Cybercrime: vandalizing the information society allows us look at the problem of cybernetic crime from a more disengaging position. The author states in the preface that the book is intended as an introduction to the topic of crimes that occur in the Internet.
In the best tradition of most books on information society, this one opens with the description of the development of information society and the spread of the Internet from the very beginning.
The very first chapters introduces the reader to the types of the crimes that occur in the Internet, gives some new and very picturesque examples. The definition of the word "hacker", the examples of stereotypes and self-images, description of culture, the code of ethics, the portraits of illustrious hackers - these are some topics that are analysed in the first half of the book. In the following chapters the author gives a deeper view of the tools and skills that are used in hacking. In one of the chapters he characterises 'malware'* viruses and malware incidents; and foresees possible future directions of malware activities in detail.
The most valuable chapters are 6 and 7 that observe the social, political and commercial impacts of the activities of hackers. In these chapters the author presents the survey of public attitudes, examines the consequences of malware activities to e-commerce, legislative problems, the usage of malware as means of reaching the aims of information warfare or cyberterrorism.
At the end S. Furnell presents some short recommendations and advises the reader to consider the issues of authorisation and usage of passwords, think about the anti-virus measures, etc.
A glossary of terms, a list of addresses of hacker-related sites, on-line news sites and security sites with some explanations, a list of literature (notes on sources) are the closing parts of the book.
Cybercrime could be characterised as popular science literature that is intended to provide basic knowledge on the topic. As the author states in the preface, the book is not intended to give the background knowledge for hacking but to provide basic understanding of hacking as a social derivative.
The book gives perfect notion about hackers as the members of a subculture in modern society, tries to specify the causes and reasons of development of negative stereotypes of hackers. The author draws attention to the impact of malware activities when the activity of hackers induces IT specialists to investigate the unnoticed imperfection of systems, encourages the development of IT security programs. Of course, the arguments that are provided in the textbook will force reader to look at the problem in a different way and maybe change opinion about the hackers as a social group that intends to make damage, to cause losses of information, steal financial resources from banks and pay the bills with other people's money using the advanced technology.
The text is written distinctly and clearly, examples are illustrative and significant, the summaries in the end of each chapter draw attention to the main aspects discussed in it. Of course, when somebody just reads Cybercrime there is no need for any repetition but the author intends the text to serve some educational purpose too, and wants to be sure that the reader understands the material correctly. He provides the possibility to read the main theses in the preface, in the text, in the summaries and the introductory sentences that serve as the exposition of each chapter.
If you use your computer not only as a typewriter and would like to have clearer understanding of the origin of all malware and criminal activity that occur on the Internet this book is for you. Enjoy the reading.