A Profile of the Demographics, Psychological Predispositions, and Social/Behavioral Patterns of Computer Hacker Insiders and Outsiders

2009 ◽  
pp. 190-213
Author(s):  
Bernadette H. Schell ◽  
Thomas J. Holt

This chapter looks at the literature—myths and realities—surrounding the demographics, psychological predispositions, and social/behavioral patterns of computer hackers, to better understand the harms that can be caused to targeted persons and property by online breaches. The authors suggest that a number of prevailing theories regarding those in the computer underground (CU)—such as those espoused by the psychosexual theorists—may be less accurate than theories based on gender role socialization, given recent empirical studies designed to better understand those in the CU and why they engage in hacking and cracking activities. The authors conclude the chapter by maintaining that online breaches and online concerns regarding privacy, security, and trust will require much more complex solutions than currently exist, and that teams of experts in psychology, criminology, law, and information technology security need to collaborate to bring about more effective real-world solutions for the virtual world.

Cyber Crime ◽  
2013 ◽  
pp. 1461-1484
Author(s):  
Bernadette H. Schell ◽  
Thomas J. Holt

This chapter looks at the literature—myths and realities—surrounding the demographics, psychological predispositions, and social/behavioral patterns of computer hackers, to better understand the harms that can be caused to targeted persons and property by online breaches. The authors suggest that a number of prevailing theories regarding those in the computer underground (CU)—such as those espoused by the psychosexual theorists—may be less accurate than theories based on gender role socialization, given recent empirical studies designed to better understand those in the CU and why they engage in hacking and cracking activities. The authors conclude the chapter by maintaining that online breaches and online concerns regarding privacy, security, and trust will require much more complex solutions than currently exist, and that teams of experts in psychology, criminology, law, and information technology security need to collaborate to bring about more effective real-world solutions for the virtual world.


Author(s):  
Brenda Toner ◽  
Taryn Tang ◽  
Alisha Ali ◽  
Donna Akman ◽  
Noreen Stuckless ◽  
...  

2002 ◽  
Vol 32 (6) ◽  
pp. 1101-1111 ◽  
Author(s):  
Deborah M. Saucier ◽  
Donald R. McCreary ◽  
Juliana K.J. Saxberg

Sex Roles ◽  
1977 ◽  
Vol 3 (3) ◽  
pp. 241-255 ◽  
Author(s):  
Carol O. Klecka ◽  
Dana V. Hiller

1987 ◽  
Vol 11 (2) ◽  
pp. 135-172 ◽  
Author(s):  
Jacquelynne S. Eccles

Occupational sex segregation continues to exist and the occupational career paths of women and men continue to differ. This article proposes a model to explain these persistent, gender-role linked trends, summarizes evidence to support the proposed mediating psychological mechanisms, and discusses the social experiences that shape gender differences on these mediators. In addition, the article reviews the economic and psychological costs often associated with the traditional female choices and proposes interventions aimed at achieving a more gender—fair social system that does not devalue traditionally female domains. The proposed model links occupational choices to expectations for success and subjective task value, which, in turn, are linked to gender-role socialization, self schemas, and anticipated role and task demands. The importance of subjective task value is stressed, as is the need to study women's achievement-related choices from the women's perspective.


Sign in / Sign up

Export Citation Format

Share Document