ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Debating the Factors that Motivate Hackers

Updated on November 14, 2015

When hackers debuted in the 1960’s, as presented by Voiskounsk and Smyslova (2003), the hacker culture was based on an intense interest in computer hardware and software. The predominant motivation was a common quest for knowledge and society benefited from the activities of the hacking community. “Many people believe that the best software products ever created were composed by hackers” (p. 172). Some of these pursuits led to the establishment of companies; the names of which are today household words, for example Apple Computer and Microsoft Corporation.

The rise of the Internet as a global community that permits an unregulated exchange of ideas led a contingent of hackers down a path to mayhem rather than enlightenment. These hackers, or black hats as they are sometimes known, create exploits to break into systems they do not own, write viruses and other malware, and sometimes compromise or destroy data or hardware. This paper presents a debate on the motivating factors that lead individuals to become hackers and continue to hack once hooked. The discussion is a comparison of the views of Sarah Gordon as produced by a 2008 PBS Frontline interview with those of the author. Since the public considers virus writing to be a form of black-hat hacking, this debate focuses on black hat activities including virus writing.

Hacker Bridge, Munich
Hacker Bridge, Munich | Source

Cybercrime Defined

Public perceptions of hackers promote hackers as cybercriminals, which may be a realistic view in the case of black hat hackers but an understanding of cybercrime is necessary before discussing motivational factors that lead individuals to participate in such activities. Cybercrime, according to Nykodym, Ariss, and Kurtz (2008), includes any crime committed using a computer to commit the crime or aid in the commission of the crime. With the proliferation of the Internet and nearly global individual access to computers and the Internet, all types of criminals may now use computers as tools for criminal activity. However, the Internet as a medium provides certain advantages to cybercriminals Those advantages include the following:

  • promote a perception of anonymity
  • provide a global presence
  • facilitate the identification of victims
  • prevent discovery of the criminal

The reader should understand that access to the Internet has not led to the development of new types of crime but has provided new vectors to commit existing crime types in a global arena. For example, thieves committed identity theft long before the rise of the personal computer but access to the Internet replaced dumpster diving with Google searches.

Hacker Characteristics as Viewed by Sarah Gordon

To begin with, Gordon (2008) pointed out a distinction between hackers and virus writers, she claimed that the hacker community loathes virus writers believing that hacking selectively targets victims and requires a more sophisticated skill set than virus writing. On the other hand, most viruses indiscriminately affect systems using a sort of shot gun approach. However, hackers and virus writers share certain characteristics that may explain their motivational factors for indulging in these activities.

Bright and Maladjusted

Gordon (2008) presented the common conception that hackers are considered to be bright and maladjusted, with qualifications on the definitions of the terms. “Some people would argue that doing something illegal is not generally very bright” (para. 8). Gordon countered with the belief that most members of the hacker community do not participate in illegal activities and that obtaining the necessary knowledge to exploit a system requires some amount of intelligence.

Classifying individuals as maladjusted, according to Gordon (2008), requires a reference point to form the classification. Within the hacker community, normal activity would include activity that non-hackers would consider unethical so whether the hacker is maladjusted depends on the viewpoint of the individual making the classification. Hackers may believe they act in a normal manner within their community of association. However, the larger population of which the hacker community makes up a subset would consider hacking behavior maladjusted.

Bright and Maladjusted
Bright and Maladjusted | Source

Anonymity and Invincibility

Hackers and virus writers participate in an environment of perceived anonymity, which Gordon (2008) claimed, “breeds feelings of 'invincibility' in many cases” (para. 17). Hackers often leave behind no physical evidence. A bank robber personally faces the victims who may later identify the criminal. A hacker, on the other hand, may conduct activities from hundreds or thousands of miles from the victim with no physical contact. Successfully conducting a number of exploits without being caught increases the feeling of low risk and enhances the belief that future exploits may be undertaken without the fear of being caught.

The Author’s Analysis

Although the author agrees with the classifications presented by Gordon (2008), there are a number of motivational factors that she failed to present during the interview. Voiskounsk and Smyslova (2003) stated that sources maintained by the hacker community attributed illegal actions and motivations to crackers or bad guys who do not associate with the loosely organized hacker community. The coverage by the news media of certain high profile cases “led to the transformations of sophisticated computer specialists into computer pirates. These pirates are usually called hackers—the newest generation of them” (p. 172).

Intrinsic Motivation and Flow

Many scholars believe that money is not a primary motivator beyond a threshold that permits the individual to sustain a particular standard of living (Liccione, 2007). Driving motivation comes from within. This internal motivation derives much strength from feelings of accomplishment and involvement, which web-developers attempt to incorporate into their web designs to generate repeat visitors.

This mechanism, known as flow, may account for the motivation of many hackers to participate in hacking activities. Voiskounsk and Smyslova (2003) provided an explanation of the mechanisms involved by stating that flow involves successive actions that freely result from previous actions. Flow is a natural response to the environment during which time the individual controls his actions for which positive self-rewards add to the experience. The individual looses track of time as one-action flows freely to the next action and “there is a little distinction between self and environment, between stimulus and response, between past, present, and future” (p. 173).

This intrinsic motivation leads hackers to hack for the pleasure they experience while hacking. This group of hackers conforms to the old-world view of hackers, which claims that hackers are motivated by a desire to increase their knowledge. Spammer-X (2004) provided one extreme example of flow leading to obsession, which follows:

By 15 I was fully immersed in everything the Internet had to offer. My father, seeing my love for computers, had bought me my own and had a second phone line installed for Internet usage. With that, I doubt my parents really saw me from age 15 until about 17. My days were spent solely online. I left the house only if it was absolutely necessary, unwilling to venture too far away from my virtual world. Ten to twelve hours a day I spent typing away, and began learning programming languages starting with Visual Basic, C, ASM, and later C++. (p.4).

This theory of flow does not explain the main motivation for all hackers. The expectation of money drives many black hats. A news article (as cited by Kshetri, 2009) “quoted a Russian hacker: ‘There is more of a financial incentive now for hackers and crackers as well as for virus writers to write for money and not just for glory or some political motive’” (p. 142).

Increasing Positive Outcomes

The relative ease of committing hacker related offenses combined with the significant financial rewards associated with committing those offenses provide what Kshetri (2009) referred to as “positive economic feedback” (p.141). This self-reinforcing system of feedback combined with the comparatively low success rate for successful prosecution of hackers leads to increasing positive outcomes. These outcomes then propel the hacker on to commit more offenses.

The teenage experiences of one prominent hacker were chronicled in a book written by that hacker, titled Inside the SPAM Cartel: Trade Secrets from the Dark Side. Spammer-X (2004) stated as the anonymous author of that book, that his high school buddies would often prompt him to take down the school’s Internet access at times when that access was necessary for students to complete assignments. Spammer-X delighted his buddies by fulfilling their requests to perform these denial of service attacks, which led to high levels of praise and propelled SpammerX on to even more invasive exploits; winding up as a spammer in adult life.

What are the most important motivational factors for hackers?

See results

Expectancy and Equity Theories of Motivation

The equity theory of motivation, as summarized by Vecchio (1981), holds that an individual’s level of motivation toward completing a given task relates to the amount of reward the individual could receive in return for the task’s completion. The expectancy theory of motivation relates an individual’s tendency toward attempting tasks viewed with the potential to maximize positive outcomes. These two theories also relate to individuals within the black hat community.

The draw of easy money reaches out to individuals who experience difficulties in the traditional workforce. The high reward achieved from hacking activities compared to the relatively low amount of required effort necessary for those activities has led many technically oriented people down the hacker path in times or areas of economic down turn. “In Russia and Eastern Europe, students good in mathematics, physics, and computer science are having difficulty to find jobs. Evidence indicates that parents and teachers encourage certain computer crimes such as software piracy thereby providing social legitimacy to cybercrimes” (Kshetri, 2009, p. 143).

Conclusion

The interview with Sara Gordon in 2008 provided certain characteristics for hackers, which could lead to an understanding of the motivational factors that lead hackers to participate in less than legitimate activities. However, the author felt that the position taken by Gordon (2008) fell short of providing specific motivational examples. The author also felt that the interview demonstrated that Gordon (2008) refused to provide specific character classifications for hackers, a high degree of qualifying answers seemed precede the responses. For instance, when asked if hackers were maladjusted, the response was “Maladjusted? Sometimes. Again, depends on how you define maladjusted” (para. 9).

The author presented certain motivational factors that the interview seemed to lack. Included in these motivational factors were intrinsic motivation and flow, increasing positive outcomes, and the equity and expectancy theories of motivation. Each of these motivational characteristics apply to traditional careers but take on an added dimension when referring to hackers; what motivates traditional workers also motivates hackers.

Among the hacking motivational factors, the relationship of the equity and expectancy theories of motivation may be most disturbing. These two motivational factors link hacking to economic need and demonstrate that hacking activity may increase during tough economic times. They may also partially explain why so many cybercrime exploits originate from Eastern Europe.

  • Kshetri, N. (2009). Positive Externality, Increasing Returns, and the Rise in Cybercrimes. Communications of the ACM , 141-144.
  • Liccione, W. (2007). A framework for compensation plans with incentive value. Performance Improvement , 46 (2), 16-21.
  • Nykodym, N., Ariss, S., & Kurtz, K. (2008). Computer addiction and cyber crime. Journal of Leadership, Accountability and Ethics , 78-85.
  • Spammer-X. (2004). Chapter 1: Inside the head of a spammer. Inside the SPAM Cartel: Trade Secrets from the Dark Side [Electronic Version].
  • Vecchio, R. P. (1981). An Individual-Differences Interpretation of the Conflicting Predictions
  • Generated by Equity Theory and Expectancy Theory. Journal of Applied Psychology , 66 (4), 470-481.
  • Voiskounsky, A. E., & Smyslova, O. V. (2003). Flow-Based Model of Computer Hackers' Motivation. Cyberpsychology & Behavior, 6(2), 171-180. doi:10.1089/109493103321640365

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)