Technologies of crime: The cyber-attacks on electronic gambling machines

被引:0
|
作者
McMullan, JL [1 ]
Perrier, DC [1 ]
机构
[1] St Marys Univ, Dept Sociol, Halifax, NS B3H 3C3, Canada
关键词
D O I
暂无
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
This paper examines the criminal technologies and criminal organization associated with gambling-related computer crimes that occurred in the video lottery terminal industry in the province of Nova Scotia. We emphasize the techniques of VLT crime, such as cracking protection codes, boot tracing, ghost programming and down-lining, as rationally geared to neutralizing social control. We analyze how the cyber-attacks were socially organized and we conclude by discussing the implications that our case study has for the field of computer crime.
引用
收藏
页码:159 / 186
页数:28
相关论文
共 50 条
  • [41] Analysis of cyber-attacks on smart grid applications
    Gunduz, M. Zekeriya
    Das, Resul
    2018 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND DATA PROCESSING (IDAP), 2018,
  • [42] Cyber-attacks, spillovers and contagion in the cryptocurrency markets
    Caporale, Guglielmo Maria
    Kang, Woo-Young
    Spagnolo, Fabio
    Spagnolo, Nicola
    JOURNAL OF INTERNATIONAL FINANCIAL MARKETS INSTITUTIONS & MONEY, 2021, 74
  • [43] Detection of Cyber-Attacks with Zone Dividing and PCA
    Morita, T.
    Yogo, S.
    Koike, M.
    Hamaguchi, T.
    Jung, S.
    Koshijima, I.
    Hashimoto, Y.
    17TH INTERNATIONAL CONFERENCE IN KNOWLEDGE BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS - KES2013, 2013, 22 : 727 - 736
  • [44] Detection of collaborative misbehaviour in distributed cyber-attacks
    Thoma, Marios
    Hadjicostis, Christoforos N.
    COMPUTER COMMUNICATIONS, 2021, 174 : 28 - 41
  • [45] Analysis of jamming and spoofing cyber-attacks on drones
    Aquilar Pey, Jeferson Nascimento
    Amvame Nze, Georges Daniel
    Albuquerque, Robson de Oliveira
    2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2022,
  • [46] The survivability of autonomous vessels from cyber-attacks
    Symes, Steve
    Blanco-Davis, Eddie
    Graham, Tony
    Wang, Jin
    Shaw, Edward
    JOURNAL OF MARINE ENGINEERING AND TECHNOLOGY, 2024,
  • [47] Cyber-Attacks - Trends, Patterns and Security Countermeasures
    Bendovschi, Andreea
    7TH INTERNATIONAL CONFERENCE ON FINANCIAL CRIMINOLOGY 2015, 7TH ICFC 2015, 2015, 28 : 24 - 31
  • [48] Defending Airports from UAS: A Survey on Cyber-Attacks and Counter-Drone Sensing Technologies
    Lykou, Georgia
    Moustakas, Dimitrios
    Gritzalis, Dimitris
    SENSORS, 2020, 20 (12) : 1 - 35
  • [49] Turkish national cyber-firewall to mitigate countrywide cyber-attacks
    Sari, Arif
    COMPUTERS & ELECTRICAL ENGINEERING, 2019, 73 : 128 - 144
  • [50] Present Cyber Threat Management (Methodologies to mitigate evolving cyber-attacks)
    Mawudor, Bright Gameli
    2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2013, : 115 - 121