Reference Hub4
Inhibitors of Two Illegal Behaviors: Hacking and Shoplifting

Inhibitors of Two Illegal Behaviors: Hacking and Shoplifting

Lixuan Zhang, Randall Young, Victor Prybutok
Copyright: © 2007 |Volume: 19 |Issue: 3 |Pages: 19
ISSN: 1546-2234|EISSN: 1546-5012|ISSN: 1546-2234|EISBN13: 9781615200832|EISSN: 1546-5012|DOI: 10.4018/joeuc.2007070102
Cite Article Cite Article

MLA

Zhang, Lixuan, et al. "Inhibitors of Two Illegal Behaviors: Hacking and Shoplifting." JOEUC vol.19, no.3 2007: pp.24-42. http://doi.org/10.4018/joeuc.2007070102

APA

Zhang, L., Young, R., & Prybutok, V. (2007). Inhibitors of Two Illegal Behaviors: Hacking and Shoplifting. Journal of Organizational and End User Computing (JOEUC), 19(3), 24-42. http://doi.org/10.4018/joeuc.2007070102

Chicago

Zhang, Lixuan, Randall Young, and Victor Prybutok. "Inhibitors of Two Illegal Behaviors: Hacking and Shoplifting," Journal of Organizational and End User Computing (JOEUC) 19, no.3: 24-42. http://doi.org/10.4018/joeuc.2007070102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The means by which the United States justice system attempts to control illegal hacking are practiced under the assumption that illegal hacking is like any other illegal crime. This article evaluates this assumption by comparing illegal hacking to shoplifting. Three inhibitors of two illegal behaviors are examined: informal sanction, punishment severity, and punishment certainty. A survey of 136 undergraduate students attending a university and 54 illegal hackers attending the Defcon conference in 2003 was conducted. The results show that both groups perceive a higher level of punishment severity but a lower level of informal sanction for hacking than for shoplifting. The findings show that hackers perceive a lower level of punishment certainty for hacking than for shoplifting but that students perceive a higher level of punishment certainty for hacking than for shoplifting. The results add to the stream of information security research and provide significant implications for law makers and educators aiming to combat hacking.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.