Science, Delivered
Denifitely The Last Step to Become a Hacker - Haaga-Helia Assignment
Denifitely The Last Step to Become a Hacker - Haaga-Helia Assignment
Assignment 7
The questions for the assignment are here
Task W - Find Academic Sources
Source
Peer Review Sources
- Google Scholar for articles
- JUFO level > 0 for journals
- Connected Papers for related articles
Good Academic Source
A good academic source should be published, has good reputation and is peer reviewed in academic journal.
Non-academic Sources
- Newspaper articles
- Manuals
- White papers
- Advertisements
- Popular books
Task X - Hacker Types, Motivations and Strategies: A Comprehensive Framework
First of all, I’ve never heard of JUFO levels. This assignment opens my eyes on this topic and I have to say it’s pretty difficult to find a high-level JUFO journal/article on some specific topics but luckily, I’ve found an interesting one.
This article is published in Computers in Human Behavior Reports - Volume 5, March 2022 and this journal has JUFO level 1. It could be found via the following link:
Hacker types, motivations and strategies: A comprehensive framework
I’m interested in this article because it’s a Cyberpsychology topic. This is a very short article, therefore, my summary is based on the whole article.
According to the article, cybercrimes are on the rise globally, they can be transational and will continue to increase proportionally to the Internet users. These crimes can cause a huge damage and loss since cybercriminals' techniques have become more sophisticated over the years. Fortunately, cybercrimes are detected faster than before but there are limitations on detecting the culprits behind the crimes due to jurisdictions, physical borders etc. The authors argue that it’s essential to understand strongly the motivations, intentions, actions and their strategies to help decide on appropriate actions when systems and networks are under attacks.
Why do hackers hack? Historically, Beveren (2001) has a theory that lying tendency can cause a person to commit a crime and leads him to theorize that this tendency also leads a hacker to hack. Accordingly, there are four themes of hacking motivation:
- Compulsion to hack
- Curiosity
- Control and attraction to power
- Peer recognition and belonging to a group
Albert Bandura (1977)’s social learning theory states that criminal behaviors are picked up if an individual associates with criminals in groups. Social norms suggest that hacking as a form of pursuing higher cause justifies cybercriminals' illegal activities, therefore, encourages them to commit crimes.
From the discussed theories, the authors propose the following framework of an up-to-date typology of hackers that consists of 13 hacker types, 7 unique motivations and their strategies. This framework is developed after 11 classifications and typologies of hackers published over the last three decades.
(I have summarized the authors' tables into 1 table like this. Please check the whole article for more details)
The authors conclude that this proposed framework will continue to be a work in progress since cybercrimes and cybercriminals evolve and motivation and strategies also expand.
Task Y - Alerts
Of course this will be updated in the future!