A Comparison of the Inhibitors of Hacking vs. Shoplifting

A Comparison of the Inhibitors of Hacking vs. Shoplifting

Lixuan Zhang (Augusta State University, USA), Randall Young (The University of Texas-Pan American, USA) and Victor Prybutok (University of North Texas, USA)
DOI: 10.4018/978-1-60566-136-0.ch005
OnDemand PDF Download:
$37.50

Abstract

The means by which the U.S. justice system attempts to control illegal hacking are practiced under the assumption that hacking is like any other illegal crime. This chapter evaluates this assumption by comparing illegal hacking to shoplifting. Three inhibitors of two illegal behaviors are examined: informal sanction, punishment severity, and punishment certainty. A survey of 136 undergraduate students attending a university and 54 illegal hackers attending the DefCon conference in 2003 was conducted. The results show that both groups perceive a higher level of punishment severity but a lower level of informal sanction for hacking than for shoplifting. Our findings show that hackers perceive a lower level of punishment certainty for hacking than for shoplifting, but students perceive a higher level of punishment certainty for hacking than for shoplifting. The results add to the stream of information security research and provide significant implications for law makers and educators aiming to combat hacking.
Chapter Preview
Top

Introduction

Interest in hacking has increased in popularity due to high-profile media coverage of system breaches. In June 2005, the information belonging to 40 million credit card holders was hacked through a credit card processor (Bradner, 2005). In 2006, about 18,000 personal records in the U.S. Department of Veterans’ Affairs had been compromised. A recent analysis of compromised electronic data records shows that about 1.9 billion records were reported compromised between 1980 and 2006. This means that for every U.S. adult, nine records have been compromised in aggregate. About 32% of the 1.9 billion comprised records were related to hackers (Erickson and Howard, 2007). Companies are reluctant to publicize that they have experienced information security breaches because of the negative impact such incidents have on their public image leading to loss of market value. Cavusoglu, Mishra and Raghunathan (2004) estimate the loss in market value for organizations to be 2.1% within two days of reporting an Internet security breach which represents an average loss of 1.65 billion.

The rise of computer and Internet use has coincided with an increase in ability of users to commit computer abuses (Parker, 2007) along with an increase in the number of unethical, yet attractive situations faced by computer users (Gattiker and Kelley, 1999). Recently, Freestone and Mitchell (2004) examined the Internet ethics of Generation Y. They found that hacking is considered less wrong than other illegal Internet activities such as “selling counterfeit goods over the Internet.” We recognize that illegal hacking activities encompass a wide array of violations of varying degrees of seriousness. For this study, we are not interested in any specific type of illegal hacking but rather illegal hacking activities in general.

Hacking is one of the technologically-enabled crimes (Parker, 2007). Originally the term hacker was a complimentary term that referred to the innovative programmers at MIT who wanted to explore mainframe computing and were motivated by intellectual curiosity and challenges (Chandler, 1996). However, the term became derogatory as computer intruders pursued purposefully destructive actions that caused serious damage for both corporations and individuals. American Heritage Dictionary (2000) defines a hacker as “one who uses programming skills to gain illegal access to a computer network or file”.

Hacking is a relatively new crime and, as such, is potentially perceived differently from other crimes. Most recently, there has been demand for research which will aid in developing an understanding of how computer crimes differ from more traditional crimes (Rogers, 2001). Due to cost-effectiveness concerns, the chief avenue utilized by the United States government to deter illegal behavior is to increase the severity of punishment (Kahan, 1997). This approach is also used to deter illegal hacking behavior. However, this approach to control illegal hacking is practiced with the assumption that the factors affecting illegal hacking are similar to the factors that influence other types of crime. We set out to evaluate this assumption by comparing illegal hacking activities to shoplifting. The decision to use shoplifting for comparison to illegal hacking was motivated by three reasons:

Complete Chapter List

Search this Book:
Reset
Table of Contents
Preface
Steve Clarke
Chapter 1
Jeremy Fowler
Although the discipline of information systems (IS) development is well established, IS failure and abandonment remains widespread. As a result, a... Sample PDF
Information Systems Success and Failure—Two Sides of One Coin, or Different in Nature? An Exploratory Study
$37.50
Chapter 2
Jeanette Eriksson, Yvonne Dittrich
This chapter reports on a case study performed in cooperation with a telecommunication provider. The telecom business changes rapidly as new... Sample PDF
Achieving Sustainable Tailorable Software Systems by Collaboration Between End-Users and Developers
$37.50
Chapter 3
Marvin D. Troutt, Douglas A. Druckenmiller, William Acar
This chapter uses some special usability and ethical issues that arise from experience with what can be called captive end-user systems (CEUS).... Sample PDF
Usability, Testing, and Ethical Issues in Captive End-User Systems
$37.50
Chapter 4
Jonathan P. Caulkins, Erica Layne Morrison, Timothy Weidemann
Spreadsheets are commonly used and commonly flawed, but it is not clear how often spreadsheet errors lead to bad decisions. We interviewed 45... Sample PDF
Do Spreadsheet Errors Lead to Bad Decisions? Perspectives of Executives and Senior Managers
$37.50
Chapter 5
Lixuan Zhang, Randall Young, Victor Prybutok
The means by which the U.S. justice system attempts to control illegal hacking are practiced under the assumption that hacking is like any other... Sample PDF
A Comparison of the Inhibitors of Hacking vs. Shoplifting
$37.50
Chapter 6
Dewi Rooslani Tojib
he last decade has seen the proliferation of business-to-employee (B2E) portals as integrated, efficient, and user-friendly technology platform to... Sample PDF
Developing Success Measure for Staff Portal Implementation
$37.50
Chapter 7
Peter Baloh
Improving how knowledge is leveraged in organizations for improved business performance is currently considered as a major organizational change.... Sample PDF
Contingencies in the KMS Design: A Tentative Design Model
$37.50
Chapter 8
Beryl Burns
We report the findings of a field study of the enactment of ICT supported knowledge work in a Human Resources contact centre, illustrating the... Sample PDF
Users as Developers: A Field Study of Call Centre Knowledge Work
$37.50
Chapter 9
Raymond R. Panko
This chapter describes two experiments that examined overconfidence in spreadsheet development. Overconfidence has been seen widely in spreadsheet... Sample PDF
Two Experiments in Reducing Overconfidence in Spreadsheet Development
$37.50
Chapter 10
Steven John Simon, David Paper
Voice recognition technology-enabled devices possess extraordinary growth potential, yet some research indicates that organizations and consumers... Sample PDF
User Acceptance of Voice Recognition Technology: An Empirical Extension of the Technology Acceptance Model
$37.50
Chapter 11
Peter P. Mykytyn
Colleges of business have dealt with teaching computer literacy and advanced computer application concepts for many years, often with much... Sample PDF
Educating Our Students in Computer Application Concepts: A Case for Problem-Based Learning
$37.50
Chapter 12
Elaine H. Ferneley
End user development (EUD) of system applications is typically undertaken by end users for their own, or closely aligned colleagues, business needs.... Sample PDF
Covert End User Development: A Study of Success
$37.50
Chapter 13
Steven Hornik, Richard D. Johnson, Yu Wu
Central to the design of successful virtual learning initiatives is the matching of technology to the needs of the training environment. The... Sample PDF
When Technology Does Not Support Learning: Conflicts Between Epistemological Beliefs and Technology Support in Virtual Learning Environments
$37.50
Chapter 14
Tom Butler
The study’s objective is to arrive at a theoretical model and framework to guide research into the implementation of KMS, while also seeking to... Sample PDF
A Theoretical Model and Framework for Understanding Knowledge Management System Implementation
$37.50
Chapter 15
Jun Xu, Mohammed Quaddus
This chapter develops a model of adoption and continued use of knowledge management systems (KMSs), which is primarily built on Rogers’ (1995)... Sample PDF
Exploring the Factors Influencing End Users' Acceptance of Knowledge Management Systems: Development of a Research Model of Adoption and Continued Use
$37.50
Chapter 16
Wei-Na Lee
In today’s global environment, a myriad of communication mechanisms enable cultures around the world to interact with one another and form complex... Sample PDF
Classifying Web Users: A Cultural Value-Based Approach
$37.50
Chapter 17
Annette Hallin, Kristina Lundevall
This chapter presents the mCity Project, a project owned by the City of Stockholm, aiming at creating user-friendly mobile services in collaboration... Sample PDF
mCity: User Focused Development of Mobile Services Within the City of Stockholm
$37.50
Chapter 18
Cristina Hava Muntean, Gabriel-Miro Muntean
Lately, user quality of experience (QoE) during their interaction with a system is a significant factor in the assessment of most systems. However... Sample PDF
End-User Quality of Experience-Aware Personalized E-Learning
$37.50
Chapter 19
High-Tech Meets End-User  (pages 302-320)
Marc Steen
One challenge within the high-tech sector is to develop products that end users will actually need and will be able to use. One way of trying to... Sample PDF
High-Tech Meets End-User
$37.50
About the Contributors