A Study of Performative Hactivist Subcultures and Threats to Businesses

Abstract Performative hactivism is the use of the Internet for expressing extreme political dissent online. It differs from cyber harassment in that performative hactivism is politically motivated. We found that there are contagion and other social effects among hactivists and that hactivism exhibits feature patterns that define them as subcultures. To conduct our research, we created a provocative Website and blog and then promoted it on the Internet. Using sentiment analyses and logistic regression, we identified features associated with performative hactivism. We then studied the blog remarks and used Website analytics to gain a better understanding of the implications for business security. The results from this work should help business and information security researchers (especially in social engineering), as well as business practice managers, strategists, and security analysts, to predict the lifecycles and impacts of hactivism on their operations and assist them in the creation of interventions.

[1]  Solomon E. Asch,et al.  THINKING ABOUT PERSONS , 1984 .

[2]  M. Deutsch,et al.  A study of normative and informational social influences upon individual judgement. , 1955, Journal of abnormal psychology.

[3]  Joel Brockner,et al.  Toward an explanation of cultural differences in in-group favoritism: The role of individual versus collective primacy. , 1998 .

[4]  J. Gerhart,et al.  Cells, Embryos and Evolution , 1997 .

[5]  V. Reyna A new intuitionism: Meaning, memory, and development in Fuzzy-Trace Theory. , 2012, Judgment and decision making.

[6]  Azy Barak,et al.  Emotional support and suicide prevention through the Internet: A field project report , 2007, Comput. Hum. Behav..

[7]  M. Gelfand,et al.  Converging measurement of horizontal and vertical individualism and collectivism , 1998 .

[8]  John S. Seiter,et al.  Persuasion: Social Inflence and Compliance Gaining , 2015 .

[9]  T. Holt Exploring the Intersections of Technology, Crime, and Terror , 2012 .

[10]  Denis McQuail,et al.  Communication models for the study of mass communications , 1981 .

[11]  D. R. Jones,et al.  Preferred pathways of behavioral contagion. , 1995, Journal of psychiatric research.

[12]  Mohd Aizaini Maarof,et al.  Danger Theory and Intelligent Data Processing , 2007 .

[13]  Oliver Christ,et al.  Explaining radical group behavior: Developing emotion and efficacy routes to normative and nonnormative collective action. , 2011, Journal of personality and social psychology.

[14]  T. Postmes,et al.  Social Movement Participation in the Digital Age , 2002 .

[15]  Felix C. Brodbeck,et al.  Cross-border transfer of knowledge: Cultural lessons from Project GLOBE , 2005 .

[16]  Brian P. Meier,et al.  Bring it on: angry facial expressions potentiate approach-motivated motor behavior. , 2010, Journal of personality and social psychology.

[17]  J. Brehm,et al.  Psychological Reactance: A Theory of Freedom and Control , 1981 .

[18]  Kenneth J. Gergen,et al.  Technologies of Representation in the Global Corporation: Power and Polyphony , 1996 .

[19]  H. Tajfel,et al.  An integrative theory of intergroup conflict. , 1979 .

[20]  E. Sampson Psychology and the American ideal. , 1977 .

[21]  Ervin Staub,et al.  Moral Exclusion, Personal Goal Theory, and Extreme Destructiveness , 1990 .

[22]  G. Hofstede Identifying Organizational Subcultures: An Empirical Approach , 1998 .

[23]  G. Hofstede The Cultural Relativity of Organizational Practices and Theories , 1983 .

[24]  Kasha Geels,et al.  The Contagion of Emotion, Perception, and Goal-directed Behavior through Symbolic Environments , 2011 .

[25]  W. Timothy Coombs,et al.  Assessing online issue threats: issue contagions and their effect on issue prioritisation , 2002 .

[26]  N. Frijda,et al.  Relations among emotion, appraisal, and emotional action readiness , 1989 .

[27]  Eun-Ju Lee,et al.  That's Not the Way It Is: How User-Generated Comments on the News Affect Perceived Media Bias , 2012, J. Comput. Mediat. Commun..

[28]  Morgan Lake,et al.  An exploratory study of culture and cyber harassment , 2011 .

[29]  A. Tversky,et al.  Extensional versus intuitive reasoning: the conjunction fallacy in probability judgment , 1983 .

[30]  Zoonky Lee,et al.  Social influence on technology acceptance behavior: self-identity theory perspective , 2006, DATB.

[31]  J. Umbeck MIGHT MAKES RIGHTS: A THEORY OF THE FORMATION AND INITIAL DISTRIBUTION OF PROPERTY RIGHTS , 1981 .

[32]  Shinobu Suzuki,et al.  Cultural transmission in international organizations : Impact of interpersonal communication patterns in intergroup contexts , 1997 .

[33]  H. Tajfel Social Psychology of Intergroup Relations , 1982 .

[34]  Noam Chomsky Human Language and Other Semiotic Systems , 1979 .

[35]  Bernardo A. Huberman,et al.  Predicting the Future with Social Media , 2010, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.

[36]  Donald M. Taylor,et al.  The relationship of perceptions and emotions to behavior in the face of collective inequality , 1990 .

[37]  Ira J. Roseman,et al.  Beat them or ban them: the characteristics and social functions of anger and contempt. , 2007, Journal of personality and social psychology.

[38]  K. Weick The social psychology of organizing , 1969 .

[39]  R. Gibson,et al.  The Internet and Politics: Citizens, Voters and Activists , 2006 .

[40]  Steven Furnell,et al.  Cybercrime: Vandalizing the Information Society , 2003, ICWE.

[41]  Marc D. Street Groupthink , 1997 .

[42]  Varun Grover,et al.  Cocreating IT Value: New Capabilities and Metrics for Multifirm Environments , 2012, MIS Q..

[43]  T. Pettigrew,et al.  Relative deprivation theory: An overview and conceptual critique , 1984 .

[44]  N. Hoffart Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory , 2000 .

[45]  D. Hosmer,et al.  A comparison of goodness-of-fit tests for the logistic regression model. , 1997, Statistics in medicine.

[46]  Michael Workman,et al.  Rash impulsivity, vengefulness, virtual-self and amplification of ethical relativism on cyber-smearing against corporations , 2012, Comput. Hum. Behav..

[47]  L. James,et al.  rwg: An assessment of within-group interrater agreement. , 1993 .

[48]  D. Murphey,et al.  The World Is Flat: A Brief History of the Twenty-First Century , 2006 .

[49]  Michael Workman,et al.  A behaviorist perspective on corporate harassment online: Validation of a theoretical model of psychological motives , 2010, Comput. Secur..

[50]  Donald H. Kluemper,et al.  Linking workplace incivility to citizenship performance: The combined effects of affective commitment and conscientiousness , 2012 .

[51]  G. L. Bon,et al.  Scientific Literature: The Crowd. A Study of the Popular Mind , 1897 .

[52]  Susan T. Dumais,et al.  Mark my words!: linguistic style accommodation in social media , 2011, WWW.

[53]  R. Burt Social Contagion and Innovation: Cohesion versus Structural Equivalence , 1987, American Journal of Sociology.

[54]  Paraskevi Fragopoulou,et al.  SafeLine: reporting illegal internet content , 2010, Inf. Manag. Comput. Secur..

[55]  Y. I. Kim [General systems theory]. , 1989, Taehan kanho. The Korean nurse.

[56]  Katharina Schmid,et al.  The Social Psychology of intergroup relations , 2009 .

[57]  R. Lewontin ‘The Selfish Gene’ , 1977, Nature.

[58]  Christine B. Williams,et al.  Web 2.0 and Politics: The 2008 U.S. Presidential Election and an E-Politics Research Agenda , 2010, MIS Q..

[59]  Bo Pang,et al.  A Sentimental Education: Sentiment Analysis Using Subjectivity Summarization Based on Minimum Cuts , 2004, ACL.

[60]  A. Bandura Social Foundations of Thought and Action: A Social Cognitive Theory , 1985 .

[61]  Peter Ferdinand,et al.  The Internet, democracy and democratization , 2000 .

[62]  Simon Lindgren,et al.  Ragnar Lundström of # WikiLeaks on Twitter Pirate culture and hacktivist mobilization : The cultural and social protocols , 2011 .

[63]  Laura M. Koehly,et al.  Formal and Emergent Predictors of Coworkers' Perceptual Congruence on an Organization's Social Structure , 1998 .

[64]  Anthony R. Hendrickson,et al.  Cross-national Differences in Computer-Use Ethics: A Nine-country Study , 1999 .

[65]  Fritz Heider,et al.  Social perception and phenomenal causality. , 1944 .

[66]  Serge Guimond,et al.  Relative deprivation theory and the Quebec nationalist movement: The cognition–emotion distinction and the personal–group deprivation issue. , 1983 .

[67]  K. Gergen Social Psychology as History , 1973 .

[68]  Robert J. House,et al.  In the Eye of the Beholder: Cross Cultural Lessons in Leadership from Project GLOBE , 2006 .

[69]  Ran R. Hassin,et al.  Goal contagion: perceiving is for pursuing. , 2004, Journal of personality and social psychology.

[70]  E. A. Locke The Case for Inductive Theory Building† , 2007 .