Technologies of crime: The cyber-attacks on electronic gambling machines

被引:0
|
作者
McMullan, JL [1 ]
Perrier, DC [1 ]
机构
[1] St Marys Univ, Dept Sociol, Halifax, NS B3H 3C3, Canada
关键词
D O I
暂无
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
This paper examines the criminal technologies and criminal organization associated with gambling-related computer crimes that occurred in the video lottery terminal industry in the province of Nova Scotia. We emphasize the techniques of VLT crime, such as cracking protection codes, boot tracing, ghost programming and down-lining, as rationally geared to neutralizing social control. We analyze how the cyber-attacks were socially organized and we conclude by discussing the implications that our case study has for the field of computer crime.
引用
收藏
页码:159 / 186
页数:28
相关论文
共 50 条
  • [11] CYBER SECURITY IN THE AGE OF COVID-19: A TIMELINE AND ANALYSIS OF CYBER-CRIME AND CYBER-ATTACKS DURING THE PANDEMIC
    Upadhyay, Niteesh Kumar
    Rathee, Mahak
    MEDICINE LAW & SOCIETY, 2022, 15 (01): : 89 - 106
  • [12] Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
    Lallie, Harjinder Singh
    Shepherd, Lynsay A.
    Nurse, Jason R.C.
    Erola, Arnau
    Epiphaniou, Gregory
    Maple, Carsten
    Bellekens, Xavier
    Computers and Security, 2021, 105
  • [13] Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
    Lallie, Harjinder Singh
    Shepherd, Lynsay A.
    Nurse, Jason R. C.
    Erola, Arnau
    Epiphaniou, Gregory
    Maple, Carsten
    Bellekens, Xavier
    COMPUTERS & SECURITY, 2021, 105
  • [14] The Impact of US Cyber Policies on Cyber-Attacks Trend
    Kumar, Sumeet
    Benigni, Matthew
    Carley, Kathleen M.
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 181 - 186
  • [15] Impact Of Cyber-Attacks On Critical Infrastructure
    Thakur, Kutub
    Ali, Md Liakat
    Jiang, Ning
    Qiu, Meikang
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 183 - 186
  • [16] Cyber-Attacks in Modular Multilevel Converters
    Burgos-Mellado, Claudio
    Donoso, Felipe
    Dragicevic, Tomislav
    Cardenas-Dobson, Roberto
    Wheeler, Patrick
    Clare, Jon
    Watson, Alan
    IEEE TRANSACTIONS ON POWER ELECTRONICS, 2022, 37 (07) : 8488 - 8501
  • [17] Estimates of the macroeconomic costs of cyber-attacks
    Dieye, Rokhaya
    Bounfour, Ahmed
    Ozaygen, Altay
    Kammoun, Niaz
    RISK MANAGEMENT AND INSURANCE REVIEW, 2020, 23 (02) : 183 - 208
  • [18] Cyber-Attacks Against Transportation Infrastructure
    Gercke, Marco
    TRANSPORTATION SECURITY AGAINST TERRORISM, 2009, 54 : 151 - 161
  • [19] HARMer: Cyber-Attacks Automation and Evaluation
    Enoch, Simon Yusuf
    Huang, Zhibin
    Moon, Chun Yong
    Lee, Donghwan
    Ahn, Myung Kil
    Kim, Dong Seong
    IEEE ACCESS, 2020, 8 : 129397 - 129414
  • [20] Cyber-Attacks Based in Electromagnetic Effects
    Perotoni, M. B.
    Barreto, R. M.
    Manfrin, S. K.
    IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (06) : 2838 - 2845