A Profile of the Demographics, Psychological Predispositions, and Social/Behavioral Patterns of Computer Hacker Insiders and Outsiders

This chapter looks at the literature—myths and realities—surrounding the demographics, psychological predispositions, and social/behavioral patterns of computer hackers, to better understand the harms that can be caused to targeted persons and property by online breaches. The authors suggest that a number of prevailing theories regarding those in the computer underground (CU)—such as those espoused by the psychosexual theorists—may be less accurate than theories based on gender role socialization, given recent empirical studies designed to better understand those in the CU and why they engage in hacking and cracking activities. The authors conclude the chapter by maintaining that online breaches and online concerns regarding privacy, security, and trust will require much more complex solutions than currently exist, and that teams of experts in psychology, criminology, law, and information technology security need to collaborate to bring about more effective real-world solutions for the virtual world.

[1]  Rajesh Kumar Tiwari,et al.  Microsoft Excel File: A Steganographic Carrier File , 2011, Int. J. Digit. Crime Forensics.

[2]  Svein Yngvar Willassen A Model Based Approach to Timestamp Evidence Interpretation , 2009, Int. J. Digit. Crime Forensics.

[3]  William Aspray,et al.  A Critical Review of the Research on Women's Participation in Postsecondary Computing Education , 2008 .

[4]  T. Holt subcultural evolution? examining the influence of on- and off-line experiences on deviant subcultures , 2007 .

[5]  Bernadette H. Schell,et al.  Webster's New World Hacker Dictionary (Webster's New World) , 2006 .

[6]  Scott Flinn,et al.  User Perceptions of Privacy and Security on the Web , 2005, PST.

[7]  Rolf Haenni,et al.  Credential Networks: a General Model for Distributed Trust and Authenticity Management , 2005, PST.

[8]  Eric Rescorla,et al.  Is finding security holes a good idea? , 2005, IEEE Security & Privacy.

[9]  Ioannis Lambadaris,et al.  Current Trends and Advances in Information Assurance Metrics , 2004, Conference on Privacy, Security and Trust.

[10]  Ali Grami,et al.  Future Trends in Mobile Commerce: Service Offerings, Technological Advances and Security Challenges , 2004, PST.

[11]  Steven Furnell,et al.  Cybercrime: Vandalizing the Information Society , 2003, ICWE.

[12]  Douglas Thomas Hacker Culture , 2002 .

[13]  Bernadette H. Schell,et al.  The Hacking of America: Who's Doing It, Why, and How , 2002 .

[14]  M. Fitzgerald,et al.  Diagnosis and differential diagnosis of Asperger syndrome , 2001 .

[15]  D. Wall Cybercrimes and the Internet , 2001 .

[16]  S. Brenner Is There Such a Thing as 'Virtual Crime'? , 2001 .

[17]  B. Schell,et al.  Stalking, Harassment, and Murder in the Workplace: Guidelines for Protection and Prevention , 2000 .

[18]  T. Jordan,et al.  A Sociology of Hackers , 1998 .

[19]  B. Schell A Self-Diagnostic Approach to Understanding Organizational and Personal Stressors: The C-O-P-E Model for Stress Reduction , 1997 .

[20]  K. Young,et al.  Psychology of Computer Use: XL. Addictive Use of the Internet: A Case That Breaks the Stereotype , 1996, Psychological reports.

[21]  J. Wajcman Feminism Confronts Technology , 1991 .

[22]  Gordon R Meyer,et al.  The Social Organization of the Computer Underground , 1989 .

[23]  Steven Levy,et al.  Hackers: Heroes of the Computer Revolution , 1984 .

[24]  International Journal of Digital Crime and Forensics , 2022 .