Adversarial knowledge-sharing in a coopetitive environment: a darknet hacker context

Obi Ogbanufe, Victor Benjamin, Dan J. Kim

Research output: Contribution to journalReview articlepeer-review

Abstract

As adversarial hacker exploits proliferate the media, researchers call for more studies examining their culture, behaviours, and defence mechanisms. This study aims to understand the nature of hackers through their knowledge-sharing behaviours in a coopetitive environment. This understanding may expose emerging threats and cybercriminal activities, which are beneficial to building information security defences. Also, extracting knowledge from darknet sources can help organisations anticipate, defend, and respond to cyber-attacks. Hence, we incorporate hacker forum data and perform a detailed analysis informed by foundational social capital theory. We explore hacker knowledge-sharing patterns with respect to the malicious knowledge shared. Further, we use nonlinear approaches to understand the dynamic relationships in an environment that is both cooperative and competitive. The findings seek to clarify how forms of social capital and coopetitive factors function differently to facilitate or impede knowledge sharing in a darknet context. Specifically, the findings indicate that the sharing of malicious knowledge is non-linear, and that knowledge control (i.e., reduced knowledge sharing) occurs with malicious knowledge as it relates to status and structural positioning.

Original languageEnglish (US)
Pages (from-to)164-180
Number of pages17
JournalEuropean Journal of Information Systems
Volume34
Issue number1
DOIs
StatePublished - 2025
Externally publishedYes

Keywords

  • Darknet
  • coopetition
  • hackers
  • knowledge-sharing
  • social network analysis
  • structural capital

ASJC Scopus subject areas

  • Management Information Systems
  • Information Systems
  • Library and Information Sciences
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Adversarial knowledge-sharing in a coopetitive environment: a darknet hacker context'. Together they form a unique fingerprint.

Cite this