3,781
Views
52
CrossRef citations to date
0
Altmetric
THEMED ARTICLES: DATA COMMUNICATIONS & NETWORK SECURITY

Hacking into the Minds of Hackers

, &
Pages 281-287 | Published online: 10 Dec 2007

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (5)

DeJarvis Oliver & Adriane. B. Randolph. (2022) Hacker Definitions in Information Systems Research. Journal of Computer Information Systems 62:2, pages 397-409.
Read now
Erin Harbinson & Nicole Selzer. (2019) The risk and needs of cyber-dependent offenders sentenced in the United States. Journal of Crime and Justice 42:5, pages 582-598.
Read now
Andrei C. Holman & Simona A. Popusoi. (2018) Avoiding blame when violating traffic rules: the development and validation of the justifications of traffic violations scale. Psychology, Crime & Law 24:9, pages 873-894.
Read now
Benoît Dupont, Anne-Marie Côté, Claire Savine & David Décary-Hétu. (2016) The ecology of trust among hackers. Global Crime 17:2, pages 129-151.
Read now
John D'Arcy, Tejaswini Herath & MindyK. Shoss. (2014) Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective. Journal of Management Information Systems 31:2, pages 285-318.
Read now

Articles from other publishers (47)

Katie Maras, Abe Sweiry, Aase Villadsen & Emla Fitzsimons. (2024) Cyber offending predictors and pathways in middle adolescence: Evidence from the UK Millennium Cohort Study. Computers in Human Behavior 151, pages 108011.
Crossref
Judith E. Noordegraaf & Marleen Weulen Kranenbarg. (2023) Why do young people start and continue with ethical hacking? A qualitative study on individual and social aspects in the lives of ethical hackers. Criminology & Public Policy 22:4, pages 803-824.
Crossref
Delphine Dion, Laetitia Mimoun, Eda Anlamlier, Lagnajita Chatterjee & Lez Trujillo-Torres. (2023) Consumer hacks in the sharing economy. Journal of Business Research 167, pages 114172.
Crossref
Melissa Martineau, Elena Spiridon & Mary Aiken. (2023) A Comprehensive Framework for Cyber Behavioral Analysis Based on a Systematic Review of Cyber Profiling Literature. Forensic Sciences 3:3, pages 452-477.
Crossref
Anyerson S. Gómez-Tabare, César Nuñez, Andrés M. Grisales-Aguirre, Gastón Zapata-Lesmes & Olber E Arango-Tobón. (2023) Confirmatory Factor Analysis and Factorial Invariance of the Mechanisms of the Moral Disengagement Scale. Anuario de Psicología Jurídica, pages 000-000.
Crossref
Derrick Neufeld. (2023) Computer crime motives: Do we have it right?. Sociology Compass 17:4.
Crossref
Glenn D. Walters. (2023) The Person-Computer Interface in Delinquency Research: Proactive Criminal Thinking as a Moderator of the Hacking with Peers–Juvenile Offending Relationship. Journal of Police and Criminal Psychology.
Crossref
Marleen Weulen Kranenbarg, Jean-Louis van Gelder, Ard J. Barends & Reinout E. de Vries. (2023) Is there a cybercriminal personality? Comparing cyber offenders and offline offenders on HEXACO personality domains and their underlying facets. Computers in Human Behavior 140, pages 107576.
Crossref
Alan Reinstein & Philip M. J. Reckers. (2022) The Effects of Exposing CPAs to Rationalizations: Conscious and Unconscious Outcomes. Accounting Horizons 36:4, pages 219-239.
Crossref
Jie Jian, Siqi Chen, Xin Luo, Tien Lee & Xiaoming Yu. (2022) Organized Cyber-Racketeering: Exploring the Role of Internet Technology in Organized Cybercrime Syndicates Using a Grounded Theory Approach. IEEE Transactions on Engineering Management 69:6, pages 3726-3738.
Crossref
Kian Yeik Koay, Vivien K.G. Lim, Patrick Chin-Hooi Soh, Derek Lai Teik Ong, Jessica Sze Yin Ho & Pang Kiam Lim. (2022) Abusive supervision and cyberloafing: A moderated moderation model of moral disengagement and negative reciprocity beliefs. Information & Management 59:2, pages 103600.
Crossref
Mark Button, Dean Blackbourn, Lisa Sugiura, David Shepherd, Richard Kapend & Victoria Wang. (2021) From feeling like rape to a minor inconvenience: Victims’ accounts of the impact of computer misuse crime in the United Kingdom. Telematics and Informatics 64, pages 101675.
Crossref
Adam M. Bossler. (2021) Perceived Formal and Informal Sanctions in Deterring Cybercrime in a College Sample. Journal of Contemporary Criminal Justice 37:3, pages 452-470.
Crossref
Mario Silic & Paul Benjamin Lowry. (2019) Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes. Information Systems Frontiers 23:2, pages 329-341.
Crossref
Marleen Weulen Kranenbarg. 2021. Cybercrime in Context. Cybercrime in Context 195 216 .
Nicole Selzer & Sebastian Oelrich. 2021. Cybercrime in Context. Cybercrime in Context 175 194 .
John D’Arcy, Idris Adjerid, Corey M. Angst & Ante Glavas. (2020) Too Good to Be True: Firm Social Performance and the Risk of Data Breach. Information Systems Research 31:4, pages 1200-1223.
Crossref
Sarah Staggs, Samantha L. McMichael & Virginia S. Y. Kwan. (2020) Wishing to be like the character on screen: Media exposure and perception of hacking behavior. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 14:1.
Crossref
Marleen Weulen Kranenbarg. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 771 792 .
Alison J. Marganski. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 623 651 .
Shaen Corbet & Constantin Gurdgiev. (2019) What the hack: Systematic risk contagion from cyber events. International Review of Financial Analysis 65, pages 101386.
Crossref
David MaimonEric R. Louderback. (2019) Cyber-Dependent Crimes: An Interdisciplinary Review. Annual Review of Criminology 2:1, pages 191-216.
Crossref
Marleen Weulen Kranenbarg. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 1 22 .
Alison J. Marganski. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 1 29 .
Ahmed Falah, Lei Pan & Feifei Chen. (2018) A Quantitative Approach to Design Special Purpose Systems to Measure Hacking Skills. A Quantitative Approach to Design Special Purpose Systems to Measure Hacking Skills.
Tejaswini Herath, Myung-Seong Yim, John D’Arcy, Kichan Nam & H.R. Rao. (2018) Examining employee security violations: moral disengagement and its environmental influences. Information Technology & People 31:6, pages 1135-1162.
Crossref
Marleen Weulen Kranenbarg, Stijn Ruiter, Jean-Louis van Gelder & Wim Bernasco. (2018) Cyber-Offending and Traditional Offending over the Life-Course: an Empirical Comparison. Journal of Developmental and Life-Course Criminology 4:3, pages 343-364.
Crossref
David Maimon, Olga Babko-Malaya, Rebecca Cathey & Steve Hinton. (2017) Re-thinking Online Offenders’ SKRAM: Individual Traits and Situational Motivations as Additional Risk Factors for Predicting Cyber Attacks. Re-thinking Online Offenders’ SKRAM: Individual Traits and Situational Motivations as Additional Risk Factors for Predicting Cyber Attacks.
Graeme Horsman. (2017) Can we continue to effectively police digital crime?. Science & Justice 57:6, pages 448-454.
Crossref
Andreas Rieb, Tamara Gurschler & Ulrike Lechner. 2017. Privacy Technologies and Policy. Privacy Technologies and Policy 87 103 .
Xing Gao, Weijun Zhong & Shue Mei. (2013) Security investment and information sharing under an alternative security breach probability function. Information Systems Frontiers 17:2, pages 423-438.
Crossref
Zhengchuan Xu, Qing Hu & Chenghong Zhang. (2013) Why computer talents become computer hackers. Communications of the ACM 56:4, pages 64-74.
Crossref
Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, Qing Hu, Merrill Warkentin & Richard Baskerville. (2013) Future directions for behavioral information security research. Computers & Security 32, pages 90-101.
Crossref
Gráinne Kirwan & Andrew PowerGráinne Kirwan & Andrew Power. 2012. The Psychology of Cyber Crime. The Psychology of Cyber Crime 53 72 .
Robert G. Morris. 2012. Cyber Crime. Cyber Crime 457 473 .
Gráinne Kirwan & Andrew Power. 2012. Investigating Cyber Law and Cyber Ethics. Investigating Cyber Law and Cyber Ethics 21 36 .
Qing Hu, Chenghong Zhang & Zhengchuan Xu. (2012) Moral Beliefs, Self-Control, and Sports: Effective Antidotes to the Youth Computer Hacking Epidemic. Moral Beliefs, Self-Control, and Sports: Effective Antidotes to the Youth Computer Hacking Epidemic.
Gurvirender P.S. Tejay & Sean M. Zadig. (2012) Investigating the Effectiveness of IS Security Countermeasures towards Cyber Attacker Deterrence. Investigating the Effectiveness of IS Security Countermeasures towards Cyber Attacker Deterrence.
Priya Nair & T.J. Kamalanabhan. (2011) Predicting unwillingness to report ethical infractions of peers: A moderated mediation approach. IIMB Management Review 23:2, pages 81-90.
Crossref
Robert G. Morris. 2011. Corporate Hacking and Technology-Driven Crime. Corporate Hacking and Technology-Driven Crime 1 17 .
Priya Nair & T.J. Kamalanabhan. (2010) Performance pressure and peer reporting of infractions: a moderated mediation model. Journal of Indian Business Research 2:4, pages 216-229.
Crossref
Sean M. Zadig & Gurvirender Tejay. (2010) Securing IS assets through hacker deterrence: A case study. Securing IS assets through hacker deterrence: A case study.
Derrick J. Neufeld. (2010) Understanding Cybercrime. Understanding Cybercrime.
Gian Vittorio Caprara, Roberta Fida, Michele Vecchione, Carlo Tramontano & Claudio Barbaranelli. (2009) Assessing civic moral disengagement: Dimensionality and construct validity. Personality and Individual Differences 47:5, pages 504-509.
Crossref
Junmin Xu, Wei Thoo Yue, Alvin Leung & Qin Su. (2022) Focusing on the Fundamentals? An Investigation of Corporate Social Irresponsibility and the Risk of Data Breach. SSRN Electronic Journal.
Crossref
Joseph Wall & Timothy J. Fogarty. (2018) Robbing the Rich? 'Robin Hood' Fraud in the Securities Markets. SSRN Electronic Journal.
Crossref
Benoit Dupont. (2012) Skills and Trust: A Tour Inside the Hard Drives of Computer Hackers. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.