Why College Students Commit Computer Hacks: Insights from a Cross Culture Analysis

Computer hacking committed by young adults has become an epidemic that threatens the social and economic prosperity brought by information technology around the world. In this study, we extend previous studies on computer hackers with a cross cultural approach by comparing sources of influence on computer hacking in two countries: China and the United States. This comparative study yielded some significant insights about the contributing factors to the computer hacking phenomenon in these two countries. While some factors are consistent, others are distinctly different, across the two samples. We find that moral beliefs about computer hacking are the most consistent antidote against computer hacking intentions among the Chinese and the American college students. On the other hand, we find that playing computer games (team sports) significantly increases (decreases) the intention to computer hacking in the Chinese college students, but has no significant effect on the American college students. In addition, we find that hypotheses based on routine activity and selfcontrol theories are modestly supported by the two samples; however, each sample supports distinct dimensions of the two theories. Hofstede’s national cultural framework provides salient explanations to these differences in the two samples.

[1]  Tom Cross Academic freedom and the hacker ethic , 2006, Commun. ACM.

[2]  Nir Kshetri,et al.  The simple economics of cybercrimes , 2006, IEEE Security & Privacy Magazine.

[3]  Qing Hu,et al.  Moral Beliefs, Self-Control, and Sports: Effective Antidotes to the Youth Computer Hacking Epidemic , 2012, 2012 45th Hawaii International Conference on System Sciences.

[4]  R. Paternoster,et al.  Sanction threats and appeals to morality : Testing a rational choice model of corporate crime , 1996 .

[5]  Majid Yar,et al.  Computer Hacking: Just Another Case of Juvenile Delinquency? , 2005 .

[6]  G. Hofstede Culture′s Consequences: Comparing Values, Behaviors, Institutions and Organizations Across Nations , 2001 .

[7]  Alex R. Piquero,et al.  Specifying the direct and indirect effects of low self-control and situational factors in offenders' decision making: Toward a more complete model of rational offending , 1996 .

[8]  Harold G. Grasmick,et al.  Testing the Core Empirical Implications of Gottfredson and Hirschi's General Theory of Crime , 1993 .

[9]  Mun Y. Yi,et al.  Predicting the use of web-based information systems: self-efficacy, enjoyment, learning goal orientation, and the technology acceptance model , 2003, Int. J. Hum. Comput. Stud..

[10]  Robert Svensson,et al.  When does self-control matter? The interaction between morality and self-control in crime causation , 2010 .

[11]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[12]  Debora Halbert Discourses of Danger and the Computer Hacker , 1997, Inf. Soc..

[13]  Christopher J. Coyne,et al.  THE ECONOMICS OF COMPUTER HACKING , 2005 .

[14]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[15]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[16]  Marc Rogers,et al.  Self-reported Deviant Computer Behavior: A Big-5, Moral Choice, and Manipulative Exploitive Behavior Analysis , 2006 .

[17]  Lawrence E. Cohen,et al.  Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .

[18]  Robert Reiner,et al.  The Oxford Handbook of Criminology , 2012 .

[19]  Paul A. Taylor,et al.  Hackers: Crime in the Digital Sublime , 1999 .

[20]  R. W. Rogers,et al.  A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.

[21]  Ahl Sanders,et al.  Oxford Handbook of Criminology , 1997 .

[22]  Qing Hu,et al.  The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies , 2007, J. Assoc. Inf. Syst..

[23]  Adam M. Bossler,et al.  The General Theory of Crime and Computer Hacking: Low Self-control Hackers? , 2011 .

[24]  R. W. Rogers,et al.  Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change , 1983 .

[25]  Magid Igbaria,et al.  The effects of self-efficacy on computer usage , 1995 .

[26]  A. Bandura Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychology Review.

[27]  T. Holt,et al.  Low Self-Control, Deviant Peer Associations, and Juvenile Cyberdeviance , 2012 .

[28]  Tyler Moore,et al.  Security Economics and European Policy , 2008, WEIS.

[29]  I. Ajzen The theory of planned behavior , 1991 .

[30]  R. Bachman,et al.  The Rationality of Sexual Offending: Testing a Deterrence/Rational Choice Conception of Sexual Assault , 1992 .

[31]  Susan J. Harrington,et al.  The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions , 1996, MIS Q..

[32]  Bernadette H. Schell,et al.  The Hacking of America: Who's Doing It, Why, and How , 2002 .

[33]  H. Raghav Rao,et al.  Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..

[34]  Marilyn E. Gist,et al.  Self-Efficacy: A Theoretical Analysis of Its Determinants and Malleability , 1992 .

[35]  T. Holt,et al.  Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications , 2010 .

[36]  Deborah Compeau,et al.  Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..

[37]  Timothy Paul Cronan,et al.  Piracy, computer crime, and IS misuse at the university , 2006, Commun. ACM.

[38]  Yufei Yuan,et al.  Online game addiction among adolescents: motivation and prevention factors , 2012, Eur. J. Inf. Syst..

[39]  P. Wikström,et al.  The Explanation of Crime: Individuals, settings, and acts of crime: situational mechanisms and the explanation of crime , 2006 .

[40]  Qing Hu,et al.  Why computer talents become computer hackers , 2013, CACM.

[41]  Marcus K. Rogers,et al.  Self-reported computer criminal behavior: A psychological analysis , 2006, Digit. Investig..