A Profile of the Demographics, Psychological Predispositions, and Social/Behavioral Patterns of Computer Hacker Insiders and Outsiders

A Profile of the Demographics, Psychological Predispositions, and Social/Behavioral Patterns of Computer Hacker Insiders and Outsiders

Bernadette H. Schell, Thomas J. Holt
Copyright: © 2012 |Pages: 24
ISBN13: 9781613503232|ISBN10: 1613503237|EISBN13: 9781613503249
DOI: 10.4018/978-1-61350-323-2.ch705
Cite Chapter Cite Chapter

MLA

Schell, Bernadette H., and Thomas J. Holt. "A Profile of the Demographics, Psychological Predispositions, and Social/Behavioral Patterns of Computer Hacker Insiders and Outsiders." Cyber Crime: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, IGI Global, 2012, pp. 1461-1484. https://doi.org/10.4018/978-1-61350-323-2.ch705

APA

Schell, B. H. & Holt, T. J. (2012). A Profile of the Demographics, Psychological Predispositions, and Social/Behavioral Patterns of Computer Hacker Insiders and Outsiders. In I. Management Association (Ed.), Cyber Crime: Concepts, Methodologies, Tools and Applications (pp. 1461-1484). IGI Global. https://doi.org/10.4018/978-1-61350-323-2.ch705

Chicago

Schell, Bernadette H., and Thomas J. Holt. "A Profile of the Demographics, Psychological Predispositions, and Social/Behavioral Patterns of Computer Hacker Insiders and Outsiders." In Cyber Crime: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, 1461-1484. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-61350-323-2.ch705

Export Reference

Mendeley
Favorite

Abstract

This chapter looks at the literature—myths and realities—surrounding the demographics, psychological predispositions, and social/behavioral patterns of computer hackers, to better understand the harms that can be caused to targeted persons and property by online breaches. The authors suggest that a number of prevailing theories regarding those in the computer underground (CU)—such as those espoused by the psychosexual theorists—may be less accurate than theories based on gender role socialization, given recent empirical studies designed to better understand those in the CU and why they engage in hacking and cracking activities. The authors conclude the chapter by maintaining that online breaches and online concerns regarding privacy, security, and trust will require much more complex solutions than currently exist, and that teams of experts in psychology, criminology, law, and information technology security need to collaborate to bring about more effective real-world solutions for the virtual world.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.