Insight into hackers' reaction toward information security breach

Abstract This study provides insight into hackers’ reaction toward an information security breach perpetuated either with an ill or good intention. To our knowledge, limited research is available for promoting understanding of whether intent induces different perceived moral affect (i.e., a perpetrator should have feelings of regret, sorrow, guilt, and shame) which explains the effect of perceived intensity of emotional distress on responsibility judgment. Further, research is sparse on enhancing understanding of whether the nature of a perpetrator’s intent affects the moderating role of consideration of the consequences in the relationship between perceived moral affect and responsibility judgment. Increased understanding of the relationships among perceived moral affect, perceived intensity of emotional distress, consideration of the consequences, and responsibility judgment of an information security breach from the hackers’ perspective may shed light on their continued engagement in the act despite society’s disapproval. Analyzes of the responses of 166 hackers recruited at two major hacker conferences reveal that perceived moral affect mediates the effect of perceived intensity of emotional distress on responsibility judgment only in an ill intention breach, and consideration of the consequences strengthens the relationship between perceived moral affect and responsibility judgment only in a good intention breach.

[1]  J. Wright On intuitional stability: The clear, the strong, and the paradigmatic , 2010, Cognition.

[2]  Martin van Hees,et al.  An Anatomy of Moral Responsibility , 2012 .

[3]  Shanton Chang,et al.  A case analysis of securing organisations against information leakage through online social networking , 2018, Int. J. Inf. Manag..

[4]  Wolter Pieters,et al.  Vulnerabilities and responsibilities: dealing with monsters in computer security , 2009, J. Inf. Commun. Ethics Soc..

[5]  J. Haidt,et al.  The Moral Emotions , 2009 .

[6]  Larry N. Killough,et al.  The joint influence of client attributes and cognitive moral development on students’ ethical judgments , 2007 .

[7]  Tim Barnett,et al.  Issue contingencies and marketers' recognition of ethical issues, ethical judgments and behavioral intentions , 2004 .

[8]  M. Zeelenberg,et al.  What is moral about guilt? Acting "prosocially" at the disadvantage of others. , 2011, Journal of personality and social psychology.

[9]  M. Hauser Moral Minds: How Nature Designed Our Universal Sense of Right and Wrong , 2006 .

[10]  A. Galinsky,et al.  The Strategic Samaritan: How Effectiveness and Proximity Affect Corporate Responses to External Crises , 2012, Business Ethics Quarterly.

[11]  C. Navarrete,et al.  Virtual morality: emotion and action in a simulated three-dimensional "trolley problem". , 2012, Emotion.

[12]  Darryl Coulthard,et al.  Technophilia, Neo-Luddism, eDependency and the Judgement of Thamus , 2012, J. Inf. Commun. Ethics Soc..

[13]  Bertram Gawronski,et al.  Deontological and utilitarian inclinations in moral decision making: a process dissociation approach. , 2013, Journal of personality and social psychology.

[14]  E. Giebels,et al.  Emotional Reactions and Moral Judgment: The Effects of Morally Challenging Interactions in Military Operations , 2016 .

[15]  Masud Chand,et al.  Guilt, Shame, and Reparative Behavior: The Effect of Psychological Proximity , 2013 .

[16]  M. Ford,et al.  Moral Emotions Toward Others at Work and Implications for Employee Behavior: a Qualitative Analysis Using Critical Incidents , 2018 .

[17]  Fiery Cushman,et al.  Patterns of Moral Judgment Derive From Nonmoral Psychological Representations , 2011, Cogn. Sci..

[18]  Rebecca Saxe,et al.  When ignorance is no excuse: Different roles for intent across moral domains , 2011, Cognition.

[19]  Graeme G. Shanks,et al.  A case analysis of information systems and security incident responses , 2015, Int. J. Inf. Manag..

[20]  J. Graham,et al.  When Morality Opposes Justice: Conservatives Have Moral Intuitions that Liberals may not Recognize , 2007 .

[21]  Kurt Gray,et al.  Two Minds Vs. Two Philosophies: Mind Perception Defines Morality and Dissolves the Debate Between Deontology and Utilitarianism , 2012 .

[22]  C. Barbaranelli,et al.  Understanding the Interplay Among Regulatory Self-Efficacy, Moral Disengagement, and Academic Cheating Behaviour During Vocational Education: A Three-Wave Study , 2018 .

[23]  Joshua D. Greene,et al.  A Dissociation Between Moral Judgments and Justifications , 2007 .

[24]  M. Hauser,et al.  The Role of Conscious Reasoning and Intuition in Moral Judgment , 2006, Psychological science.

[25]  Rex B. Kline,et al.  Principles and Practice of Structural Equation Modeling , 1998 .

[26]  Barbara M. Byrne,et al.  Structural equation modeling with EQS : basic concepts, applications, and programming , 2000 .

[27]  Bryan K. Church,et al.  Experimental Evidence Relating to the Person-Situation Interactionist Model of Ethical Decision Making , 2005, Business Ethics Quarterly.

[28]  Paul van Schaik,et al.  Risk perceptions of cyber-security and precautionary behaviour , 2017, Comput. Hum. Behav..

[29]  Jody L. Davis,et al.  Third-Party Forgiveness: (Not) Forgiving Your Close Other's Betrayer , 2008, Personality & social psychology bulletin.

[30]  F. Cushman,et al.  Bad actions or bad outcomes? Differentiating affective contributions to the moral condemnation of harm. , 2014, Emotion.

[31]  D. A. Kenny,et al.  The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.

[32]  J. Tangney,et al.  Moral affect: the good, the bad, and the ugly. , 1991, Journal of personality and social psychology.

[33]  F. Cushman Crime and punishment: Distinguishing the roles of causal and intentional analyses in moral judgment , 2008, Cognition.

[34]  Tanya J. McGill,et al.  Old risks, new challenges: exploring differences in security between home computer and mobile device use , 2017, Behav. Inf. Technol..

[35]  C. Batson,et al.  Perspective Taking: Imagining How Another Feels Versus Imaging How You Would Feel , 1997 .

[36]  K. Bhal,et al.  Exploring Cognitive Moral Logics Using Grounded Theory: The Case of Software Piracy , 2008 .

[37]  P. Castro,et al.  Exploring the predictors and the role of trust and concern in the context of data disclosure to governmental institutions , 2017, Behav. Inf. Technol..

[38]  T. Jones Ethical Decision Making by Individuals in Organizations: An Issue-Contingent Model , 1991 .

[39]  D. Abrams,et al.  A New Social-Cognitive Developmental Perspective on Prejudice , 2010, Perspectives on psychological science : a journal of the Association for Psychological Science.

[40]  Alex Shaw,et al.  Manipulating Morality: Third-Party Intentions Alter Moral Judgments by Changing Causal Reasoning , 2015, Cogn. Sci..

[41]  Adam B. Moore,et al.  Individual differences in sensitivity to reward and punishment predict moral judgment , 2011 .

[42]  Bernhard F. Frey,et al.  The Impact of Moral Intensity on Decision Making in a Business Context , 2000 .

[43]  Elsa Loissel,et al.  A non-mentalistic cause-based heuristic in human social evaluations , 2013, Cognition.

[44]  R. Janoff-Bulman,et al.  Surveying the Moral Landscape , 2013, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.

[45]  Jana Schaich Borg,et al.  Consequences, Action, and Intention as Factors in Moral Judgments: An fMRI Investigation , 2006, Journal of Cognitive Neuroscience.

[46]  Mare D. Hauser,et al.  When moral intuitions are immune to the law: A case study of euthanasia and the act-omission distinction in the Nederlands , 2009 .

[47]  Tom L. Roberts,et al.  Examining the Relationship of Organizational Insiders' Psychological Capital with Information Security Threat and Coping Appraisals , 2017, Comput. Hum. Behav..

[48]  R. Baumeister,et al.  The need to belong: desire for interpersonal attachments as a fundamental human motivation. , 1995, Psychological bulletin.

[49]  Neil F. Doherty,et al.  Reinforcing the security of corporate information resources: A critical review of the role of the acceptable use policy , 2011, Int. J. Inf. Manag..

[50]  Jon D. Elhai,et al.  Anxiety about internet hacking: Results from a community sample , 2016, Comput. Hum. Behav..

[51]  Michael E. Whitman,et al.  In defense of the realm: understanding the threats to information security , 2004, Int. J. Inf. Manag..

[52]  Robert J. Harvey,et al.  An Analysis of the Factor Structure of Jones’ Moral Intensity Construct , 2006 .

[53]  Joshua D. Greene The secret joke of Kant's soul. , 2008 .

[54]  Hock-Hai Teo,et al.  An integrative study of information systems security effectiveness , 2003, Int. J. Inf. Manag..

[55]  Jonathan D. Cohen,et al.  An fMRI Investigation of Emotional Engagement in Moral Judgment , 2001, Science.

[56]  Jeroen Vaes,et al.  The Emotional Side of Prejudice: The Attribution of Secondary Emotions to Ingroups and Outgroups , 2000 .

[57]  Daniel M. Bartels,et al.  Principled moral sentiment and the flexibility of moral judgment and decision making , 2008, Cognition.

[58]  R. S. Miller,et al.  Are shame, guilt, and embarrassment distinct emotions? , 1996, Journal of personality and social psychology.

[59]  Detmar W. Straub,et al.  The amplification effects of procedural justice on a threat control model of information systems security behaviours , 2009, Behav. Inf. Technol..

[60]  Kenneth L. Kraft,et al.  Moral Intensity and Ethical Decision-Making of Marketing Professionals , 1996 .

[61]  Victor R. Prybutok,et al.  Sharing and storage behavior via cloud computing: Security and privacy in research and practice , 2018, Comput. Hum. Behav..

[62]  Wu He,et al.  Investigating the impact of cybersecurity policy awareness on employees' cybersecurity behavior , 2019, Int. J. Inf. Manag..

[63]  A. Bandura Social cognitive theory: an agentic perspective. , 1999, Annual review of psychology.

[64]  Emmanuel M. Pothos,et al.  Contemporary morality: Moral judgments in digital contexts , 2017, Comput. Hum. Behav..

[65]  J. Smetana,et al.  Origins and Development of Morality , 2015 .

[66]  C. Robertson,et al.  Stakeholder Perceptions of Offshoring and Outsourcing: The Role of Embedded Issues , 2010 .

[67]  Vladlena Benson,et al.  Information disclosure of social media users: Does control over personal information, user awareness and security notices matter? , 2015, Inf. Technol. People.

[68]  Adam M. Grant,et al.  A little thanks goes a long way: Explaining why gratitude expressions motivate prosocial behavior. , 2010, Journal of personality and social psychology.

[69]  Stanislav Mamonov,et al.  The impact of information security threat awareness on privacy-protective behaviors , 2018, Comput. Hum. Behav..

[70]  Tyler J. VanderWeele,et al.  Conceptual issues concerning mediation, interventions and composition , 2009 .

[71]  Cleotilde Gonzalez,et al.  Effects of cyber security knowledge on attack detection , 2015, Comput. Hum. Behav..

[72]  Empathy neglect: reconciling the spotlight effect and the correspondence bias. , 2002 .

[73]  Dacher Keltner,et al.  Emotions as Moral Amplifiers: An Appraisal Tendency Approach to the Influences of Distinct Emotions upon Moral Judgment , 2011 .

[74]  Peter S. Menell Rise of the API Copyright Dead?: An Updated Epitaph for Copyright Protection of Network and Functional Features of Computer Software , 2017 .

[75]  Yaman Roumani,et al.  Examining the relationship between firm's financial records and security vulnerabilities , 2016, Int. J. Inf. Manag..

[76]  D. Keltner,et al.  Affective and physiological responses to the suffering of others: compassion and vagal activity. , 2015, Journal of personality and social psychology.

[77]  R. Harvey,et al.  The Effect of Moral Intensity on Ethical Judgment , 2007 .

[78]  Justin W. Martin,et al.  Why we forgive what can’t be controlled , 2016, Cognition.

[79]  J. Haidt The New Synthesis in Moral Psychology , 2007, Science.

[80]  T. Brown,et al.  Confirmatory Factor Analysis for Applied Research , 2006 .

[81]  L. Jean Camp,et al.  Cars, Condoms, and Facebook , 2013, ISC.