Contents

Science, Delivered

Denifitely The Last Step to Become a Hacker - Haaga-Helia Assignment

Denifitely The Last Step to Become a Hacker - Haaga-Helia Assignment

Assignment 7

The questions for the assignment are here

Task W - Find Academic Sources

Source

Peer Review Sources

Good Academic Source

A good academic source should be published, has good reputation and is peer reviewed in academic journal.

Non-academic Sources

  • Newspaper articles
  • Manuals
  • White papers
  • Advertisements
  • Popular books

Task X - Hacker Types, Motivations and Strategies: A Comprehensive Framework

First of all, I’ve never heard of JUFO levels. This assignment opens my eyes on this topic and I have to say it’s pretty difficult to find a high-level JUFO journal/article on some specific topics but luckily, I’ve found an interesting one.

This article is published in Computers in Human Behavior Reports - Volume 5, March 2022 and this journal has JUFO level 1. It could be found via the following link:

Hacker types, motivations and strategies: A comprehensive framework

I’m interested in this article because it’s a Cyberpsychology topic. This is a very short article, therefore, my summary is based on the whole article.


According to the article, cybercrimes are on the rise globally, they can be transational and will continue to increase proportionally to the Internet users. These crimes can cause a huge damage and loss since cybercriminals' techniques have become more sophisticated over the years. Fortunately, cybercrimes are detected faster than before but there are limitations on detecting the culprits behind the crimes due to jurisdictions, physical borders etc. The authors argue that it’s essential to understand strongly the motivations, intentions, actions and their strategies to help decide on appropriate actions when systems and networks are under attacks.

Why do hackers hack? Historically, Beveren (2001) has a theory that lying tendency can cause a person to commit a crime and leads him to theorize that this tendency also leads a hacker to hack. Accordingly, there are four themes of hacking motivation:

  1. Compulsion to hack
  2. Curiosity
  3. Control and attraction to power
  4. Peer recognition and belonging to a group

Albert Bandura (1977)’s social learning theory states that criminal behaviors are picked up if an individual associates with criminals in groups. Social norms suggest that hacking as a form of pursuing higher cause justifies cybercriminals' illegal activities, therefore, encourages them to commit crimes.

From the discussed theories, the authors propose the following framework of an up-to-date typology of hackers that consists of 13 hacker types, 7 unique motivations and their strategies. This framework is developed after 11 classifications and typologies of hackers published over the last three decades.

Hacker Typologies

(I have summarized the authors' tables into 1 table like this. Please check the whole article for more details)

The authors conclude that this proposed framework will continue to be a work in progress since cybercrimes and cybercriminals evolve and motivation and strategies also expand.

Task Y - Alerts

Alert

Of course this will be updated in the future!