Debating Motivating Factors for Hackers There is no shortage of potential motivators for hackers; however, motivations can be distinguished based on the different roles hackers take on. In the following reading, this researcher will present an evaluation of Sarah Gordon's interview regarding various perspectives regarding the psychological differences between cybercriminals and traditional real-world criminals. Additionally, a comparison between hackers and virus writers and the various roles of hackers will be discussed. Lu, Polgar, Luo, and Cao (2010) hypothesized that cybersecurity is not so much about the technological aspect, but rather about the mental and social science activities of individuals using information technology. The authors support this view by stating that computers only channel the transgressions of the individuals who exploit them. Xu, Hu, and Zhang (2013) attributed the surge in hackers to the popularity of the Internet and the prevalence of computer systems. The authors argue that a notable portion of the hacker community consists of intelligent, college-aged individuals who start hacking out of curiosity and end up exploiting their talent to commit cybercrimes (Xu et al., 2013). Originally, hacking did not have a negative connotation. Derived around the late 1950s, the expression hacker referred to an exceptionally skilled programmer and convergent thinker capable of formulating innovative solutions to overcome the constraints of primitive computing systems (Bachmann, 2010; Lu et al., 2010) . hacker motivation and intent is what distinguishes white hats, black hats, and gray hats from each other. Xu et al. (2013) explained that white ...... half of the document ......rnal of Cyber Criminology, 4(1), 643-656.Gordon, S. (2008). Studying the psychology of virus writers and hackers: An interview with Sarah Gordon. PBS: On the Front Lines. http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/psycho.htmlHolt, T. J., Strumsky, D., Smirnova, O., & Kilger, M. (2012). Examining the social networks of malware authors and hackers. International Journal of Cyber Criminology, 6(1), 891-903.Lu, Y., Polgar, M., Luo, X., & Cao, Y.Y. (2010). Social network analysis of a criminal hacker community. Journal of Computer Information Systems, 51(2), 31-41. Turgeman-Goldschmidt, O. (2008). Meanings that hackers attribute to their being hackers. International Journal of Cybercriminology, 2(2), 382-396.Xu, Z., Hu, Q., & Zhang, C. (2013). Why IT talents become computer hackers. Communications of the ACM, 56(4), 64-74. doi:10.1145/2436256.2436272
tags