Javascript must be enabled to continue!
Cyber Psychology: A qualitative study to deviate black hat hacker teenagers towards white hat hacker teenagers in Mauritius
View through CrossRef
This is a qualitative research paper with 10 teenage participants from 11 years old to 18 years old from Cyberstorm members in Mauritius. These teenagers had been noticed with black hat hacker’s mindset, behaviors and personality traits. But under observation and guidance during 6months, it was detected that their deviant behavior had been shifted from black hat hacker to white hat hacker.
Title: Cyber Psychology: A qualitative study to deviate black hat hacker teenagers towards white hat hacker teenagers in Mauritius
Description:
This is a qualitative research paper with 10 teenage participants from 11 years old to 18 years old from Cyberstorm members in Mauritius.
These teenagers had been noticed with black hat hacker’s mindset, behaviors and personality traits.
But under observation and guidance during 6months, it was detected that their deviant behavior had been shifted from black hat hacker to white hat hacker.
Related Results
On Flores Island, do "ape-men" still exist? https://www.sapiens.org/biology/flores-island-ape-men/
On Flores Island, do "ape-men" still exist? https://www.sapiens.org/biology/flores-island-ape-men/
<span style="font-size:11pt"><span style="background:#f9f9f4"><span style="line-height:normal"><span style="font-family:Calibri,sans-serif"><b><spa...
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract
Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
Cyber Espionage
Cyber Espionage
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized defi...
Analysis of the causes and governance of youth cyberviolence
Analysis of the causes and governance of youth cyberviolence
With the continuous development of network technology, the frequent outbreaks of cyber violence among young people have become a major challenge to network security. The manifestat...
The challenges of cybersecurity insurance development: The case of Latvia
The challenges of cybersecurity insurance development: The case of Latvia
Purpose. This paper aims to provide an overview of the current challenges of cybersecurity insurance, focusing on the identification of development constraints and opportunities an...
HISTORY ОF CHINESE PSYCHOLOGY: OVERVIEW
HISTORY ОF CHINESE PSYCHOLOGY: OVERVIEW
Background. Th is material will be very useful for Russian scientists, as it will allow them to evaluate the achievements of Chinese psychology. Th e authors of the article believe...
पाल्पाली सष्टाका उपन्यासमा साइबरपयाग {Cyberpag in Palpali Sashta's novel}
पाल्पाली सष्टाका उपन्यासमा साइबरपयाग {Cyberpag in Palpali Sashta's novel}
पाल्पाली सष्टाका उपन्यासमा साइबरपयाग {Cyberpag in Palpali Sashta's novel} प्रस्तुत लेख पाल्पाली स्रष्टाहरूद्वारा लेखिएका उपन्यासहरूमध्ये साइबरको प्रभावमा केन्द्रित रहेर लेखिएकाउपन्...

