Entry
Reader's guide
Entries A-Z
Subject index
Hacking
Hacking is defined as any access to a computer, computer system, or computer network without the permission of either the rightful owner or the person in charge of them. According to the British National Crime Agency Cyber Crime Assessment 2016 report, cybercrime accounted for 53% of all crimes in 2015. It is expected that cybercrime will continue to develop and evolve into a highly lucrative and well-organized enterprise. Cybercriminals, whether state-sponsored or not, are even beginning to devote funds to research and development. In other words, cybercrime has become an industry. Criminals are increasingly moving online. Terrorist groups are also beginning to exploit cybercrime to fund their mandates.
A recent form of cybercrime is ransomware, a form of malware that holds people’s data files hostage until ...
- Criminal and Ethical Facets
- Economic Facets
- Adware
- Agriculture and the Internet
- Alibaba
- Amazon
- Back Offices, Call Centers, and the Internet
- Bitcoin
- Blockchain
- Broadband Internet Affordability
- Crowdfunding
- Cryptocurrencies
- eBay
- e-Commerce: Business-to-Business
- e-Commerce: Business-to-Consumer
- e-Commerce: Business-to-Government
- Economic Development and the Internet
- Energy Use and the Internet
- e-Tailing
- Fiber Optics and the Internet
- Internet Advertising
- Internet Banking
- Internet Recruiting
- Internet Taxation
- Location-Based Services
- Manufacturing and the Internet
- MercadoLibre
- PayPal
- Rural Areas and the Internet
- Sharing Economy and the Internet
- Smart Cities
- Smart Energy Systems
- Smart Grids
- Telework
- Tourism and the Internet
- Transportation and the Internet
- Virtual Teams
- Webinars
- Internet History and Governance
- Declaration of the Independence of Cyberspace
- ARPANET
- BITNET
- Cyclades
- Deep Packet Inspection
- Electronic Frontier Foundation
- Gopher
- Internet Architecture Board
- Internet Assigned Numbers Authority
- Internet Corporation for Assigned Names and Numbers
- Internet Engineering Task Force
- Internet Governance
- Internet Origins and History
- Internet Society
- Internet Standards
- NSFNET
- Usenet
- WELL, The
- World Wide Web
- World Wide Web Consortium
- Political and Legal Facets
- Anonymous
- Biometrics
- Clicktivism
- Cyberespionage
- Cybersecurity
- Cyberwarfare
- Distributed Denial-of-Service Attack
- e-Government
- Elections and the Internet
- Electronic Signatures
- Geoblocking
- Great Firewall
- Internet Activism
- Internet Censorship
- Internet Law
- Internet Surveillance
- m-Government
- Military Internet
- National Security Agency Surveillance
- Net Neutrality
- Right to Be Forgotten
- Right to Internet Access
- Slacktivism
- Social Movements and the Internet
- Stuxnet
- WikiLeaks
- Social, Behavioral, and Psychological Facets
- Augmented Reality
- Baidu
- Blind People and the Internet
- Blogs
- Chat Rooms
- Children, Adolescents, and the Internet
- Citizen Science
- Crowdsourcing
- Cybercafés
- Cyberoptimism and Cyberpessimism
- Cyberwellness
- Diasporas and the Internet
- Digital Divides, Disability and
- Digital Divides, Ethnicity and
- Digital Divides, Gender and
- Digital Divides, Geography of
- Digital Divides, Global
- Digital Divides, Language and
- Digital Earth
- Digital Humanities
- Digital Natives
- Education and the Internet: Colleges and Universities
- Education and the Internet: Elementary and Secondary Schools
- e-Health
- Elderly People and the Internet
- Electronic Literature
- Emojis and Emoticons
- Ethnographic Research and the Internet
- Google Earth
- Health Care and the Internet
- Internet Addiction
- Internet Dating
- Internet Gambling
- Internet Gaming
- Internet Mapping
- Internet Memes
- Internet Movie Database
- Internet Nonusers
- Internet Pornography
- Internet Privacy
- Internet Slang
- Internet Telephony
- iPhones
- Journalism and the Internet
- Libraries and the Internet
- Massive Open Online Courses
- Microblogs
- Mobile Internet
- Municipal Broadband
- Music and the Internet
- Myspace
- Neogeography
- Netflix
- Netiquette
- Netizen
- One Laptop per Child
- Online Social Networks
- Photo Sharing Applications
- Podcasting
- Project Loon
- Religion and the Internet
- Sexting
- Skype
- Smartphone Apps
- Smartphones
- Social Media
- Sports and the Internet
- Telecenters
- Telemedicine
- Television and the Internet
- Tencent
- Texting
- Tor
- Video Games and the Internet
- Virtual Reality
- Wearable Technologies
- Web 2.0
- Wi-Fi
- Wikipedia
- Yahoo
- YouTube
- Technical Facets
- AI Safety
- Algorithmic Selection on the Internet
- Broadband Internet
- CAPTCHA
- Cloud Computing
- Cookies
- Cyberinfrastructure
- Cyberspace
- Cybersquatting
- Deep Web
- Digital Steganography
- Digital Watermarking
- Domain Name
- Domain Name System
- Electronic Mailing Lists
- Ethernet
- File Sharing
- File Transfer Protocol
- Firewalls
- Freenet
- Geoweb
- Hashtag
- Hyperlink
- Hypertext Markup Language
- Hypertext Transfer Protocol
- Internet Backbone Networks
- Internet Connectivity
- Internet Data Centers
- Internet GIS
- Internet of Things
- Internet Routing
- Internet Service Providers
- IP Addresses
- Local Area Networks
- Packet Switching
- Peer-to-Peer Networks
- Satellite Internet
- Search Engine
- Semantic Web
- TCP/IP
- Traceroute
- Uniform Resource Locator
- Virtual Private Networks
- Volunteered Geographic Information
- Web Browsers
- Web Design
- Web GIS
- Web Mining
- Web Programming
- Webometrics
- Website and Webpage
- Wide Area Networks
- Loading...