Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Cyber Psychology: A qualitative study to deviate black hat hacker teenagers towards white hat hacker teenagers in Mauritius

View through CrossRef
This is a qualitative research paper with 10 teenage participants from 11 years old to 18 years old from Cyberstorm members in Mauritius. These teenagers had been noticed with black hat hacker’s mindset, behaviors and personality traits. But under observation and guidance during 6months, it was detected that their deviant behavior had been shifted from black hat hacker to white hat hacker.
Title: Cyber Psychology: A qualitative study to deviate black hat hacker teenagers towards white hat hacker teenagers in Mauritius
Description:
This is a qualitative research paper with 10 teenage participants from 11 years old to 18 years old from Cyberstorm members in Mauritius.
These teenagers had been noticed with black hat hacker’s mindset, behaviors and personality traits.
But under observation and guidance during 6months, it was detected that their deviant behavior had been shifted from black hat hacker to white hat hacker.

Related Results

On Flores Island, do "ape-men" still exist? https://www.sapiens.org/biology/flores-island-ape-men/
On Flores Island, do "ape-men" still exist? https://www.sapiens.org/biology/flores-island-ape-men/
<span style="font-size:11pt"><span style="background:#f9f9f4"><span style="line-height:normal"><span style="font-family:Calibri,sans-serif"><b><spa...
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
The Evolution of Cyber Resilience Frameworks in Network Security: A Conceptual Analysis provides a comprehensive overview of the development and application of cyber resilience fra...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
Who Cares for Black Women in Health and Health Care
Who Cares for Black Women in Health and Health Care
Black women are often at the center of health disparities research. Black women face sociological, psychological, environmental, and political barriers to health and health care th...
EFEKTIFITAS CYBER EXTENSION PADA PENYULUH AGAMA DI KOTA SEMARANG
EFEKTIFITAS CYBER EXTENSION PADA PENYULUH AGAMA DI KOTA SEMARANG
Abstrak Artikel ini menyajikan hasil pelaksanaan cyber extension yang dilaksanakan oleh penyuluh agama Kota Semarang, serta efektifitas dari pelaksanaannya. Cyber extension ...
Cyber Espionage
Cyber Espionage
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized defi...
Analysis of the causes and governance of youth cyberviolence
Analysis of the causes and governance of youth cyberviolence
With the continuous development of network technology, the frequent outbreaks of cyber violence among young people have become a major challenge to network security. The manifestat...

Back to Top