A Sociology of Hackers

Illicit computer intruders, or hackers, are often thought of as pathological individuals rather than as members of a community. However, hackers exist within social groups that provide expertise, support, training, journals and conferences. This article outlines this community to establish the nature of hacking within ‘information societies’. To delineate a ‘sociology of hackers’, an introduction is provided to the nature of computer-mediated communication and the act of computer intrusion, the hack. Following this the hacking community is explored in three sections. First, a profile of the number of hackers and hacks is provided by exploring available demographics. Second, an outline of its culture is provided through a discussion of six different aspects of the hacking community. The six aspects are technology, secrecy, anonymity, membership fluidity, male dominance and motivations. Third, an exploration of the community's construction of a boundary, albeit fluid, between itself and its other, the computer security industry, is provided. This boundary is constructed through metaphors whose central role is to establish the ethical nature of hacking. Finally, a conclusion that rejects any pathologisation of hackers is offered.

[1]  A. Lent,et al.  Storming the Millennium: The New Politics of Change , 1999 .

[2]  M. Castells The Information Age: Economy, Society and Culture , 1999 .

[3]  P. Taylor Hackers : a case-study of the social shaping of computing , 1998 .

[4]  D. Sim The Rise of the Network Society (The Information Age: Economy, Society and Culture, Volume 1) , 1998 .

[5]  Dan S. Wallach,et al.  Web Spoofing: An Internet Con Game , 1997 .

[6]  Philip L. Shiman Credits for the Information Highway. (Book Reviews: Transforming Computer Technology. Information Processing for the Pentagon, 1962-1986.; Where Wizards Stay Up Late. The Origins of the Internet.) , 1996 .

[7]  Jonathan Littman The Fugitive Game: Online with Kevin Mitnick: The Inside Story of the Great Cyberchase , 1996 .

[8]  Cherny Werse Wired Women: Gender and New Realities in Cyberspace , 1996 .

[9]  Lynn Cherny,et al.  Wired Women: Gender and New Realities in Cyberspace , 1996 .

[10]  T. Jordan The Unity of Social Movements , 1995 .

[11]  M. Slatalla Masters of Deception: The Gang That Ruled Cyberspace , 1995 .

[12]  Linda M. Harasim,et al.  Book Reviews : Global Networks: Computers and International Communication Linda M. Harasim (Ed.) Publisher: MIT Press, Cambridge, MA 92142 Year of Publication: 1993 Length: 410 pages Price: $29.95 , 1994 .

[13]  Bernard Zajac The Hacker Crackdown—Law and disorder on the electronic frontier : Author:Bruce Sterling ISBN: 0-553-56370-X Publisher: Bantam Books Price: £16.99 (UK Hardback); $5.99 (US paperback) , 1994 .

[14]  Linda M. Harasim The Global Matrix of Minds , 1993 .

[15]  Bruce Sterling,et al.  The Hacker Crackdown: Law and Disorder on the Electronic Frontier , 1992 .

[16]  M. Diani The Concept of Social Movement , 1992 .

[17]  Clive Davidson,et al.  Cyberpunk: Outlaws and hackers on the computer frontier , 1992 .

[18]  Eugene H. Spafford,et al.  Are computer hacker break-ins ethical? , 1992, J. Syst. Softw..

[19]  Bryan Clough,et al.  Approaching zero: Data crime and the computer underworld , 1992 .

[20]  Peter J. Denning,et al.  Computers under attack: intruders, worms, and viruses , 1991 .

[21]  Ellen Spertus Why are there so few female computer scientists , 1991 .

[22]  Katie Hafner,et al.  Cyberpunk: Outlaws and Hackers on the Computer Frontier , 1991 .

[23]  C. Stoll The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .

[24]  John S. Quarterman,et al.  The Matrix: Computer Networks and Conferencing Systems Worldwide , 1989 .

[25]  V. Jupp Methods of criminological research , 1989 .

[26]  Vincent Mosco,et al.  The political economy of information , 1988 .

[27]  Suzanne K. Damarin,et al.  The second self: Computers and the human spirit , 1985 .

[28]  Steven Levy,et al.  Hackers: Heroes of the Computer Revolution , 1984 .

[29]  Sherry Turkle,et al.  The second self: computers and the human spirit , 1984 .