146
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

Illegal Computer Hacking: An Assessment of Factors that Encourage and Deter the Behavior

Pages 33-52 | Published online: 10 Sep 2014
 

Abstract

This study examines illegal hacking behavior through the lens of general deterrence theory, social bond theory, and social learning theory. Data was gathered from a survey of 127 individuals who attended a hacker’s conference. The results suggest that the greater an individual’s commitment to conventional activities and the stronger the individual’s belief in following the norms of society, the less likely he or she will engage in illegal hacking behavior. Interaction with other computer hackers also significantly impacts illegal hacking behavior. One finding is that the severity of punishment does not deter hacking, while the certainty of punishment does.

Additional information

Notes on contributors

Randall Young

Randall Young is an assistant professor in the Accounting and Business Law Department at the University of the University of Texas - Pan American. He earned a Ph.D. in Business Computer Information Systems from the University of North Texas, a master’s of accountancy from Abilene Christian University and a BBA in Finance from the University of Texas at Arlington. His research interest include IT infrastructure, IT auditing and information security management. He has published in Information Resource Management Journal, Information Systems Management, and Journal of Organizational and End User Computing.

Lixuan Zhang

Lixuan Zhang is an assistant professor in the Hull School of Business at Augusta State University. She holds a MS in Management Information Systems and Master of Business Administration from University of Oklahoma and a Ph.D. in Business Computer Information Systems from University of North Texas. Her current research interests include IT personnel management, IT ethics and security and human computer interaction. She has published in Journal of Information Technology and Management, Information Systems Management, Journal of Organizational and End User Computing, and Information Resource Management Journal.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.