Summary: A Psychological Limitation Of Hackers

Great Essays
A Psychological Limitation of Self-Control
Interdisciplinary Rational
Hackers are people. While simplistic, this statement is the foremost factor for the need for an interdisciplinary approach to answer this question. People are complex. By extensions, many problems involving people are complex as well. Just as the human mind has been examined by academics within multiple disciplines; such as psychology and biology, it is reasonable to expect that discerning the motivational factors behind becoming a hacker would also require multiple disciplines. My research confirms this and, for the scope of this project, I have drawn from the strengths of the following disciplines: information technology, psychology, sociology, and economics. Each of
…show more content…
Sarah Gordon of Symantec, has been studying the topic of hackers for over twenty years. Her research helps protect information systems by providing a clear understanding of difficult concepts within the field. In one such research project, Dr. Gordon was asked to evaluate a penetration tool that was feared by policy makers to be the golden key to hackers. Dr. Gordon’s research, however, shows that misconception of how information tools work can lead to poor decisions (Gordon, 1995). Understanding how these policies can negatively impact how protection is implemented was critical to my research. These policies are often public and, therefore, available to hackers as well. In fact, Dr. Gordon also noted in her findings that “security experts [became] tempting targets for hackers” due to their possession of security tools and their influence on policy (Gordon, 1995). Moreover, not only are security experts targets, but the protections they implement serve as a mental challenge for …show more content…
Academics and experts within the field of information technology resolved the ‘how;’ however, psychological theories and data helped explain the connection between hacker development and adolescent behavior. There are gaps, however, in the psychological research on hacking. Academics and experts in the field of psychology can discern the connections between hacker and adolescent behavior. However, psychology academics and theorist cannot tell us the impact from a sociological

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Code 2600 Film Analysis

    • 391 Words
    • 2 Pages

    Technology is always constantly evolving and there are many people who play a big part in this. One of these people are known as hackers, they are usually viewed negatively in society, but despite that they have a huge part in the evolution of technology. Code 2600, directed and produced by Jeremy Zerechak is about the advancing world of technology and how ‘hackers’ are playing a big part in the advancement of technology as they push company’s to be constantly advancing and help technology become more secure. One of the prevalent themes in the documentary is that many individuals or groups that have a negative stereotype in society can play a positive role in the advancement of society. The documentary used many historical clips and news clips…

    • 391 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Marisa Bugarin Professor Bivona ENG 102 3:00-4:15 3/16/15 Annotated Bibliography Annotated Bibliography 1) Chemaly, Soraya. " A Million Peeping Toms: When Hacking Is Also A Hate Crime." Time. Com (2014): 1.…

    • 1953 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Some ‘hackers’ are just regular individuals trying to improve any computer systems or explore the wonders of the technological world. But unfortunately, most hackers are here to mortify others and take advantage of them. The pre-Christmas 2013 attack at Target…

    • 1031 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Having researched cybercrime and technology use among criminal populations for more than a decade, I know that both types of miscreants want to find ways into secure places – computers and networks, and homes and businesses. They have a range of options for how to get in. Software development is not a perfect process, and neither are people. We need to learn to recognize signs of hacks. Take suspicious emails for example; hackers often send…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    As seen with the case in which someone has to put a password to an Email account, confidentiality is a matter that is of great concern in many scenes of life . Cybersecurity is quite applicable as a tool that offers security when it comes to transfer of data though networks and between different people in one connection. For instance, cybersecurity is a tool used to ensure that the information shared among workers within an institution, through a connection of computers and computer systems, is not accessed by people who do not belong to this organization. In many cases, people will try to enter forcefully and access such confidential information without the consent of the organization. Cybersecurity helps such organizations in installing systems where access will be denied to non-members, and allowed to members since they make use of passwords and other security mechanisms installed within the computers and the connections .…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    To beat a hacker, you should be a person who thinks like a hacker” and “To master hacking, you should need to…

    • 587 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Anonymous: The Generation of Hacktivists “We are not hackers. We are not terrorists. We are not violent. We are citizens of the world who bear witness to tyranny, oppression and censorship.” “We resist those who seek to violate our rights as human beings.”…

    • 1851 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    The Cult Of The Dead Cow

    • 855 Words
    • 4 Pages

    The benefactors of the world’s next generation are sitting behind computer screens. Ready to create change worldwide, they are the activists of a new age; an age where technology is king among other platforms of information. Indifferent and disillusioned by careless claims made in the media, internet activist are revolutionizing the world through internet hacking. Internet activist known as Hacktivists, work to target injustice in politics and corrupt societal ideals. The world’s posterity relies upon Hacktivists groups, and the single click of a computer mouse.…

    • 855 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Knowing that hackers are highly intelligent people who derive pleasure in manipulating technology to do what they are not intended to, they can be very helpful in different industry where security important. As a typical hacker, you would want to know how technology work, and why they perform certain functions. Should you think like a “black hat”, “white hat”, or “grey hat” hacker? Honestly speaking, a typical hacker might be very good both in “black hat” and “white hat” techniques. The main difference between these people is what they want to achieve with their skills.…

    • 803 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    BEST PRACTICES WHEN BREACHES OCCUR Security includes the “CIA triagle” of confidentiality, integrity, and availability. So, anyone making an effort to protect the security of data, and subsequently databases, should have a goal of protecting all three facets.…

    • 1448 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    It is supremely useful to identify sources of the vulnerabilities. Ramarkrishnan and Sekar (2002) argue that vulnerabilities stem from interactions among several system components such as operating system, file system, sever processor, and content. There is ample evidence that IT systems are facing serious security challenges. The nature of the threat has evolved, and with it, the sources, the perpetrators, the intent, and the consequence (Yeh and Chang, 2007). From the fear of forced access to physical entities…

    • 4254 Words
    • 18 Pages
    Superior Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Introduction When it comes to digital crimes, various methods are used to commit such acts. These include: Hacking, malicious software as well as cyber stalking, to name a few takes place day in and day out. The names that are attached to these crimes in fact explains the what and now, the why has to be explained. In this body of work however, it will be discussed theories surrounding digital crimes. Space Transition Theory and Social Learning Theory will provide detail and insight as to the why factor: why was the crime committed, the rationale of the response, how it relates to crime in general.…

    • 795 Words
    • 4 Pages
    Improved Essays

Related Topics