Summers, Timothy; Lyytinen, Kalle J.; Lingham, Tony; … - 2014
Internet-based technologies. Within the hacker community, there are “good” hackers called white hat hackers and “bad” hackers … exploit those information systems. Regardless of what type of hacker a person is, identifying system weaknesses requires … that requires exceptional technical and reasoning abilities. In this domain, a mental model can be thought of as a hacker …