Breaking Bad in Cyberspace: Understanding why and how Black Hat
Hackers Manage their Nerves to Commit their Virtual Crimes
Mario Silic1 & Paul Benjamin Lowry2
# Springer Science+Business Media, LLC, part of Springer Nature 2019
Abstract
What is happening in hacker’s minds when they are committing criminal activities? How black hat hackers manage nerves, which
is about managing fear and underlying emotions, and which tactics they employ during their decision-making process before,
during and after committing a crime, is the question that could provide some initial insights on hacker’s trajectories, their switch
from black hat to white hat and ultimately about their behaviors and motivations. The main difficulty in answering this question
resides with the access to hacker’s data. To address this gap, we conducted interviews with 16 black hat hackers. Supported by the
general strain theory and routine activity theory, we identified five techniques that they use to manage their nerves: shunting,
minimization, plan B, thrill, and lens widening techniques. Each of these techniques help hackers to better manage their nerves
and consequently, learn how to better cope with the fear. During their psychological decision-making processes, hackers use these
five techniques to create a new mindset, behind which they hide, with the objective of minimizing and mitigating the inherent
risks they encounter during their criminal activities. The theoretical importance of nerve is the key to a better understanding of
black hat hacker’s illegal acts, their behaviors and ultimately their actions.
Keywords Black hat hacker . Security . Criminology nerve management . General strain theory . Routine activity theory (RAT)
1 Introduction
In 2016, black hat hackers, that we define as individuals with
extensive computer knowledge employed to get personal
gains or for other malicious reasons by conducting illegal
activities (Chandler 1996; Smith and Rupp 2002), were be-
hind major cyber security incidents (Cisco 2018; EY 2018).
This caused an average 20% loss of a company’s customer
base with a trend of the hacking becoming more business and
corporate oriented with unprecedented levels of sophistication
and impact (Cisco 2018). The resulting revenue loss opportu-
nities push companies to increase their security investments,
since it is unlikely that the magnitude and the impact of
cybercriminal attacks will decrease, given the current rate of
increase in internet traffic. Sony, Ashley Madison, JP Morgan
are examples of recent security incidents which reveal the
pervasiveness of this issue. To combat this trend, it is essential
to get a better understanding of cybercrime’s costs, benefits,
and attractiveness (Kshetri 2006). However, little is known
about the people behind these illegal cybercrime activities,
for three key reasons: (1) given its criminal nature, it is diffi-
cult to obtain reliable data (Benjamin et al. 2019; Mahmood
et al. 2010); (2) the fact that ex ...
PHISHING ATTACKS PROPOSAL 6
Phishing Attacks Proposal
Introduction and Problem Statement
Over the past years, one of the most challenging crimes that have been a serious threat to the internet security of all computer users has been identity theft. This is a lucrative crime whose roots spread across the world and are perpetrated by different individuals using sophisticated technology. Identity theft entails the act of stealing as well as utilizing the identity information of another person to commit crimes such as steal money, crucial personal information, or even destroy confidential data and information (Psannis & Gamagedara, 2017). One of the techniques that have been used to perpetrate identity theft is a phishing attack. A phishing attack refers to a type of crime associated with social engineering whose emergence, occurrence, and advancements are proving to be an enormous challenge for both key industry players as well as academic researchers (Lyashenko, 2015).
The main aim of carrying out phishing attacks is to steal crucial information that is sensitive to users such as online banking details, usernames, and even passwords. According to researchers, the number of phishing attacks is becoming a serious threat, and in other cases, phishing reports indicate that it is not only the organizations that are becoming victims of the phishing attacks but the number of attacks is on the rise, and the level of sophistication is also advancing day in day out (Doupe & Warner, 2018). Of importance is that the phishing attacks have evolved in terms of the approaches that are followed in penetrating computer users and violating their privacy.
Objectives
This research aims at studying the level of sophistication in which phishing attacks has advanced. In this regard, it seeks to determine how modern methods of phishing attacks are different from the traditional ones. Secondly, this research aims to explain the different current methods of carrying out phishing attacks. Thirdly, this research study aims at determining how these sophisticated methods of carrying out phishing attacks can be controlled.
Literature Review
Different researchers and professionals have explored the issue of modern phishing attacks and presented their work in the form of journals and articles of research. One amongst the journals is “Defending against phishing attacks: Taxonomy of methods, current issues, and future directions,” authored by Kostas Psannis, and Nalin Asanka Gamagedara (2017). In their research, they noted that phishing statistics indicate that there is a rise in the number of successful attacks that are being carried out against industries and critical institutions. Psannis and Gamagedara (2017) present this statistical information in the form of a pie chart showing the various domains that exist and how each one of them has been affected. Based on a report presented in the form of a pie chart by the team, domains that are worst hit by the crime includ ...
A criminological psychology based digital forensic investigative frameworkSameer Dasaka
It’s been more than 30 years since digital forensics came into existence and started to evolve. United States first started finding the importance of digital forensics to catch the criminals and started adopting multiple investigative frameworks and strategies to improvise the investigation process.
Apart from performing the technical investigations, it is also equally important to understand and address the thought process of the criminal when the crime was committed.
Every crime that has been committed is always done with a specific disastrous purpose in mind and to fulfil that purpose, the criminal finds multiple loopholes and builds his/her way to such an extent that the line between right and wrong gets negligible.
Understanding what made the criminal think to commit the crime is just as important in producing future preventative measures.
System Dynamics Based Insider Threats ModelingIJNSA Journal
Insider threat has been recognized as one of the most dangerous security threats and become a much more complex issue. Insider threat is resulted from the legitimate users abusing their privileges and cause tremendous damage or losses. Not always being friends, insiders can be main threats to the organization. Currently, there is no equivalent prevention solution for insider threat to an intrution prevention system or vulnerability scanner. From the survey of literature of insider threat studies, we conclude that the system dynamics (SD) is an effective tool to analyze the root causes of insider threat incidents and evaluate mitigation strategies from people, process, and technology perspectives. A generized case based SD model can be tailored and applied to analyze and evaluate specific insider threat incidents. We
present a well known insider threat incident of Taiwan and tailor the generized case based SD model to analyze it. The simulation results indicate that the risk of insider threats can be reduced and the probability of detecting insider threats can be increased.
Case Study On Social Engineering Techniques for Persuasion Full Text graphhoc
There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most of them even without security software. Hackers and crackers are experts in psychology to manipulate people into giving them access or the information necessary to get access. This paper discusses the inner working of such attacks. Case study of Spyware is provided. In this case study, we got 100% success using social engineering techniques for deception on Linux operating system, which is considered as the most secure operating system. Few basic principal of defend, for the individual as well as for the organization, are discussed here, which will prevent most of such attack if followed.
PHISHING ATTACKS PROPOSAL 6
Phishing Attacks Proposal
Introduction and Problem Statement
Over the past years, one of the most challenging crimes that have been a serious threat to the internet security of all computer users has been identity theft. This is a lucrative crime whose roots spread across the world and are perpetrated by different individuals using sophisticated technology. Identity theft entails the act of stealing as well as utilizing the identity information of another person to commit crimes such as steal money, crucial personal information, or even destroy confidential data and information (Psannis & Gamagedara, 2017). One of the techniques that have been used to perpetrate identity theft is a phishing attack. A phishing attack refers to a type of crime associated with social engineering whose emergence, occurrence, and advancements are proving to be an enormous challenge for both key industry players as well as academic researchers (Lyashenko, 2015).
The main aim of carrying out phishing attacks is to steal crucial information that is sensitive to users such as online banking details, usernames, and even passwords. According to researchers, the number of phishing attacks is becoming a serious threat, and in other cases, phishing reports indicate that it is not only the organizations that are becoming victims of the phishing attacks but the number of attacks is on the rise, and the level of sophistication is also advancing day in day out (Doupe & Warner, 2018). Of importance is that the phishing attacks have evolved in terms of the approaches that are followed in penetrating computer users and violating their privacy.
Objectives
This research aims at studying the level of sophistication in which phishing attacks has advanced. In this regard, it seeks to determine how modern methods of phishing attacks are different from the traditional ones. Secondly, this research aims to explain the different current methods of carrying out phishing attacks. Thirdly, this research study aims at determining how these sophisticated methods of carrying out phishing attacks can be controlled.
Literature Review
Different researchers and professionals have explored the issue of modern phishing attacks and presented their work in the form of journals and articles of research. One amongst the journals is “Defending against phishing attacks: Taxonomy of methods, current issues, and future directions,” authored by Kostas Psannis, and Nalin Asanka Gamagedara (2017). In their research, they noted that phishing statistics indicate that there is a rise in the number of successful attacks that are being carried out against industries and critical institutions. Psannis and Gamagedara (2017) present this statistical information in the form of a pie chart showing the various domains that exist and how each one of them has been affected. Based on a report presented in the form of a pie chart by the team, domains that are worst hit by the crime includ ...
A criminological psychology based digital forensic investigative frameworkSameer Dasaka
It’s been more than 30 years since digital forensics came into existence and started to evolve. United States first started finding the importance of digital forensics to catch the criminals and started adopting multiple investigative frameworks and strategies to improvise the investigation process.
Apart from performing the technical investigations, it is also equally important to understand and address the thought process of the criminal when the crime was committed.
Every crime that has been committed is always done with a specific disastrous purpose in mind and to fulfil that purpose, the criminal finds multiple loopholes and builds his/her way to such an extent that the line between right and wrong gets negligible.
Understanding what made the criminal think to commit the crime is just as important in producing future preventative measures.
System Dynamics Based Insider Threats ModelingIJNSA Journal
Insider threat has been recognized as one of the most dangerous security threats and become a much more complex issue. Insider threat is resulted from the legitimate users abusing their privileges and cause tremendous damage or losses. Not always being friends, insiders can be main threats to the organization. Currently, there is no equivalent prevention solution for insider threat to an intrution prevention system or vulnerability scanner. From the survey of literature of insider threat studies, we conclude that the system dynamics (SD) is an effective tool to analyze the root causes of insider threat incidents and evaluate mitigation strategies from people, process, and technology perspectives. A generized case based SD model can be tailored and applied to analyze and evaluate specific insider threat incidents. We
present a well known insider threat incident of Taiwan and tailor the generized case based SD model to analyze it. The simulation results indicate that the risk of insider threats can be reduced and the probability of detecting insider threats can be increased.
Case Study On Social Engineering Techniques for Persuasion Full Text graphhoc
There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most of them even without security software. Hackers and crackers are experts in psychology to manipulate people into giving them access or the information necessary to get access. This paper discusses the inner working of such attacks. Case study of Spyware is provided. In this case study, we got 100% success using social engineering techniques for deception on Linux operating system, which is considered as the most secure operating system. Few basic principal of defend, for the individual as well as for the organization, are discussed here, which will prevent most of such attack if followed.
The paper emphasizes the human aspects of cyber incidents concerning protecting information and
technology assets by addressing behavioral analytics in cybersecurity for digital forensics applications.
The paper demonstrates the human vulnerabilities associated with information systems technologies and
components. This assessment is based on past literature assessments done in this area. This study also
includes analyses of various frameworks that have led to the adoption of behavioral analysis in digital
forensics. The study's findings indicate that behavioral evidence analysis should be included as part of the
digital forensics examination. The provision of standardized investigation methods and the inclusion of
human factors such as motives and behavioral tendencies are some of the factors attached to the use of
behavioral digital forensic frameworks. However, the study also appreciates the need for a more
generalizable digital forensic method.
The paper emphasizes the human aspects of cyber incidents concerning protecting information and
technology assets by addressing behavioral analytics in cybersecurity for digital forensics applications.
The paper demonstrates the human vulnerabilities associated with information systems technologies and
components. This assessment is based on past literature assessments done in this area. This study also
includes analyses of various frameworks that have led to the adoption of behavioral analysis in digital
forensics. The study's findings indicate that behavioral evidence analysis should be included as part of the
digital forensics examination. The provision of standardized investigation methods and the inclusion of
human factors such as motives and behavioral tendencies are some of the factors attached to the use of
behavioral digital forensic frameworks. However, the study also appreciates the need for a more
generalizable digital forensic method.
The paper emphasizes the human aspects of cyber incidents concerning protecting information and
technology assets by addressing behavioral analytics in cybersecurity for digital forensics applications.
The paper demonstrates the human vulnerabilities associated with information systems technologies and
components. This assessment is based on past literature assessments done in this area. This study also
includes analyses of various frameworks that have led to the adoption of behavioral analysis in digital
forensics. The study's findings indicate that behavioral evidence analysis should be included as part of the
digital forensics examination. The provision of standardized investigation methods and the inclusion of
human factors such as motives and behavioral tendencies are some of the factors attached to the use of
behavioral digital forensic frameworks. However, the study also appreciates the need for a more
generalizable digital forensic method.
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxtawnyataylor528
Kathryn E. Scarborough
Eastern Kentucky University
Marc Rogers
Purdue University
Kelli Frakes
Eastern Kentucky University
Cristina San Martin
Purdue University
KKaatthhrryynn EE.. SSccaarrbboorroouugghh, PPhh..DD.., professor at the Department of Safety, Security, and Emergency
Management at Eastern Kentucky University, earned her Ph.D. in criminal justice from Sam Houston State
University. She also has an MA in applied sociology with a certificate in women’s studies from Old
Dominion and Norfolk State Universities, and a BS in criminal justice from the University of Southern
Mississippi. Prior to her teaching at Eastern Kentucky University, she was a police officer in Portsmouth,
Virginia, a United States Navy Hospital Corpsman/Emergency Medical Technician, and a chemical depen-
dency technician. In addition to her faculty role, Dr. Scarborough is Director for Research, Evaluation and
Testing for the Justice and Safety Center. Her current teaching and research interests include criminal
investigation, law enforcement technology, cyber crime and security, and police administration.
In her role as director for research, testing and evaluation, she has oversight of more than
70 projects funded by the Department of Homeland Security, the National Institute of Justice/Office of
Science and Technology, the State of Kentucky, and the Department of Defense. She also serves as project
director or codirector of the following projects: National Study on Criminal Investigation, the Digital
Evidence Assessment of Local and State Law Enforcement Organizations, the Rural Cyber Crime
Response and Prevention Team project, Cyber PAAL, and the ASIS International Security Trends project.
MMaarrcc RRooggeerrss,, PPhh..DD.., CISSP, CCCI, is the Chair of the Cyber Forensics Program in the Department of
Computer and Information Technology at Purdue University. He is an associate professor and also a
research faculty member at the Center for Education and Research in Information Assurance and
Security (CERIAS). Dr. Rogers was a senior instructor for (ISC)2, the international body that certifies
information system security professionals (CISSP), is a member of the quality assurance board for
(ISC)2’s SCCP designation, and is Chair of the Law, Compliance and Investigation Domain of interna-
tional Common Body of Knowledge (CBK) committee. He is a former police detective who worked in
the area of fraud and computer crime investigations. Dr. Rogers sits on the editorial board for several
professional journals and is a member of various national and international committees focusing on dig-
ital forensic science and digital evidence. He is the author of numerous book chapters, and journal pub-
lications in the field of digital forensics and applied psychological analysis. His research interests
include applied cyber forensics, psychological digital crime scene analysis, and cyber terrorism.
Chapter 24
Digital Evidence
477
M24_SCHM8860_01_SE_C24.QXD 2/4/08 ...
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensJeremiah Grossman
The present study examined a selection of 76 ransomware splash screens collected from a variety of sources. These splash screens were analysed according to surface information, including aspects of visual appearance, the use of language, cultural icons, payment and payment types. The results from the current study showed that, whilst there was a wide variation in the construction of ransomware splash screens, there was a good degree of commonality, particularly in terms of the structure and use of key aspects of social engineering used to elicit payment from the victims. There was the emergence of a sub-set of ransomware that, in the context of this report, was termed ‘Cuckoo’ ransomware. This type of attack often purported to be from an official source requesting payment for alleged transgressions.
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...Hansa Edirisinghe
This report discuses the employment of ethical hacking through a disciplined, systematic analysis as a way of reviewing and strengthening the security of information systems. The preliminary objective of this study is therefore to understand the concept of Ethical Hacking. - By Hansa Edirisinghe
Required
topic : cyberlaw document
presentation document in word format
1. On the discussion forum, please post a 500-word summary of the results of your research paper
2. Respond to two classmates' postings. Minimum 100 words per posting.
Classmate discussion for reply 1
by
Harsh Patel
- Saturday, 20 July 2019, 9:38 PM
The research paper is a synopsis on cybercrime and the ethical implications related to this field. The elements impacting the cybercrime have various laws of action in several nations that frequently manage features of the issues and analysis in the gravity of the issues with different approaches are playing significant roles. Cybercrime attacks signify an emerging challenge, particularly in terms of developing nations. International cyber terrorism is concentrated on gaining private data to take benefit for complete control and thus, significant welfares (Malhotra, 2016). Cybercrime incorporates a completely criminal and illegal activity which is conveyed out by information technology and computers. The impacts of cyber-crime are broadly discoursed in the literature, seeing the circumstance that it is a topic of great current awareness.
Antonescu & Birău (2015) states that the financial consequence of cybercrime characterizes a highly penetrating concern in the view of globalized markets. Developing nations signify a very weak objective because of institutional and structural inequalities. Since the growing application of information technology, the chances of deceitful advances centered on cyber-crimes have developed even more important. Measuring the number of events, the damage instigated by cybercrime is enormously large, reaching great economic harm, of hundreds of billions of dollars a year in the event of the global market.
Sometimes, it is very challenging to perfectly assess the charge of cybercrime attacks measuring particular non-financial allegations. Additionally, the non-financial consequence of cybercrimes are slightly hard to proportionate based on a measurable technique, but certainly, it has a very strong influence with tremendously intense costs. Cyber-attack approaches have been enhanced radically over time, particularly in recent years (Antonescu & Birău, 2015). Criminals have also modified the developments of computer technology to further proceed with their illegal activities.
Specific precautionary measures need to be taken by all of us while using the internet, which will succor in stimulating this major risk Cyber Crime. There is a necessity to conduct research analysis of cyber-crimes to discover out the best technique to protect confidential data and take suitable action against the cyber-attack. Focussed training in the fields of computer crime and economic, and how they impact the specific industries with computer forensics, requests to continue to upsurge for law enforcement workforces. With the lack of understanding of how particular industries operate, it is hard to a.
Cyber Security and Terrorism Research Article2Cybe.docxrandyburney60861
Cyber Security and Terrorism Research Article
2
Cyber Security and Terrorism Research Article
Senior Capstone
Introduction
Homeland Security has a wide range of organizations that fills in as a way to deal with shielding the United States locally and universally. These offices incorporate however are not restricted to U.S. Customs and Border Patrol, Transportation Security Administration, United States Coast Guard, Cybersecurity and Infrastructure, and so forth. These offices serves the administration in tending to at least one stages. For instance, The Federal Emergency Management Agency, otherwise called FEMA, is an organization that serves numerous partners in mitigating, planning, responding, and recovering from catastrophic events.
On a bigger degree, Cybersecurity is a developing and learning field that is utilized in Cybersecurity and Infrastructure and different organizations to shield significant specialized data from fear monger assaults, for example, hacking. Its primary unit of examination is the administration where relieving is the stage being polished. This principle point is basic to the Homeland Security and Emergency Management's (HSEM) discipline. As of now, there is an issue of how does Cybersecurity adequately change the danger of psychological militant assaults, wherein there are sure and negative credits to its methods for assurance. Innovation, organize security, basic frameworks including PC frameworks, and so forth is the thing that makes up Cybersecurity.
In spite of the fact that there might be a comprehension of what fear based oppression is, there has not yet been an unequivocal meaning of psychological oppression. As per Wilson, a few definitions for digital fear mongering can result from the assailants expectation while others centers on the impacts of the assault itself (Wilson, 2007). A few assaults can bring about mischief causing the death toll or harm while different assaults may bring about troublesome PCs and dread equivalents to fear based oppression. There should be a control on the yield of what dread is truly delegated with regards to an assault. When an infection occurs on a PC, is the proprietor of that PC apprehensive? On the off chance that the proprietor is apprehensive does it add up to a similar sort of dread starting at an aggressor from an alternate nation causing the infection? This can be alluded to what was the reason for that infection in any case.
When managing Cybersecurity and fear based oppression, there should be a decent measure of assaults occurring on the double or sequentially to cause dread inside the organization or nation. Digital fear mongers are seen assaulting different organizations consecutive for an extensive stretch in result accomplishing their objectives or if nothing else making consideration them (Lewis, 2002). In the event that the fear based oppressor neglects to increase any profit by their assault on a lot of PC frameworks, at that point it would n.
Course ObjectiveAnalyze key psychological and sociological issues .docxmercylittle80626
Course Objective
Analyze key psychological and sociological issues related to hackers and the potential impact on individual organizations and society as a whole.
The class discusses ethical and nonethical hacker personalities and motivations, and profiling tools used by law enforcement in combating cyber threats.
Topic 1: Hacker Motivation and Threat Mitigation
Explain what psychological factors can often motivate hackers (eg, addiction, crime, greed, status, etc….), and give examples where these motivations were a factor in a cyberattack.
What can organizations do to be more proactive in identifying and mitigating hacker threats?
Background:
1. Crime and Punishment: The Psychology of Hacking in the New Millennium [2003 - older but, I believe, still relevant and a solid short introduction]
2. Understanding a Hacker’s Mind: A Psychological Insight into the Hijacking of Identities [2004 - RSA. Also still useful]
3. The Risk Propensity and Rationality of Computer Hackers [2010 ]
Topic 2: Ethical and Nonethical Hackers
As the cybersecurity field expands, the larger community discourse leads to changes in terminology. While some of our course materials may differentiate between the terms "hackers" and "crackers" as threat actors, we will use the terms "ethical hackers" and "nonethical hackers" to make the same differentiation.
How do the profiles for ethical and nonethical hackers differ? Should these psychological attributes make a difference as to the amount of, or nature of the punishment meted out to those who are caught? Why or why not?
Describe how certain factors can also motivate ethical hackers, or those who defend against cyberattacks (sometimes called cyber warriors or cyber patriots)? (eg, revenge, patriotism, fear of government abuse, pride, respect for the law, ownership, anger, retaliation….)
Background: Hacking for the Homeland: Patriotic Hackers vs. Hacktivists [2013 - abstract only.
One page per topic with references on seprate page (4 pages total)
.
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docxbriancrawford30935
PROTECTING THE NATION’S CYBER SYSTEMS 9
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE THREAT TO THE NATION’S CYBER SYSTEMS
A Master Thesis
Submitted to the Faculty
Of
American Public University
By
Daniella Rowell
In Partial Fulfillment of the
Requirements for the degree
Of
Master of Arts
February 2016
American Public University
Charles Town, WV
Introduction and purpose statement
Technology is an intrinsic tool of change in the world today. It has had a very huge impact on how things are done given that it seeks to enhance life in way or another. A new global threat known as cybercrime was introduced in the wake of technological advancements. Cybercrime is basically defined as any unlawful act whereby the perpetrator uses a computer or network in its perpetration or the computer or network is a target. The 21st Century has seen immense changes in how criminals are committing crime as they rely more on computers than ever (Brenner, 2010). Whereas some commit cyber-crimes due to the thrill involved, others are motivated by economic goals such as deriving profits. Consequently, cybercrime is a core issue that needs to be tackled as it has a wide array of motivations, targets and it commission is ever changing.
Comment by Chris: No comma between the author and year in Turabian formatting. The comma goes between the year and page number. Comment by Chris: Is this your purpose statement? You need to clearly state your purpose statement.
“The purpose of this thesis is to…….”
This study seeks to address underlying issues within our society that in one way or another contributes to cyber-crime. These factors range from government policies, societal and personal factors such as a jealous spouse hacking his or her partners account, ideological motivated cybercrime and structural cause whereby more information is stored online hence increase cyber criminals reward. The U.S government for examples lacks an official definition of cybercrime. As a result, this term is used interchangeably to refer to other internet and/or technology related malicious acts. Federal law enforcement agencies on the other hand give cybercrime a legal definition based on their jurisdiction and crimes they are charged with investigating (Kirwan, 2013). Furthermore, there is no national strategy solely focused on fighting cybercrime. Instead, it’s integrated in strategies aimed at fighting other crimes such as Transnational Organized crime among others. Consequently, there is need to communicate a vivid definition of cybercrime to persons vested with authority of carrying out prevention strategies. Cyber criminals form networks which increases difficulty of elimination.
Cyber criminals have made a lot of effort in trying to increase the profitability of their activities. Both small and large businesses are at risk of being victims of cybercrime. One estimate has placed cybercrime as a very costly affair for victims in a research done in twenty four countr.
Intelligence analysis is a key part of national security and making strategic decisions. But advances in AI are having a big impact on this field. This essay looks at the many ways that artificial intelligence (AI) changes intelligence analysis, focusing on the good and bad things that this trend has caused. We look at how tools for artificial intelligence (AI) such as machine learning, natural language processing (NLP), and predictive analytics are making the intelligence community better. AI can handle huge amounts of data better than humans can, which lets us look at complicated global events faster and more accurately. This boost in capabilities lets policy and security decisions be made faster and better.However, the difficulties that artificial intelligence brings to the field of intelligence analysis are also discussed. Concerns about bias in AI algorithms, the ease with which they can be manipulated, and the consequences of placing too much faith in computers are examined. We talk about why it is important to strike a balance between AI help and human judgment and why humans' intuition and experience are irreplaceable in situations that require nuanced analysis. The paper also explores the potential role of AI in counterintelligence and the dynamic nature of intelligence threats.
In the end, we offer suggestions for the ethical application of AI in intelligence gathering. This includes promoting openness in the use of AI, the need for constant human oversight, and the significance of cross-national cooperation in addressing ethical and safety concerns. This paper seeks to advance our knowledge of the revolutionary effects of AI on intelligence analysis and to outline a path toward the responsible and fruitful application of this technology in the intelligence community.
• Hypothesis 1 (H1): The ethical and security challenges posed by the use of AI in intelligence analysis, such as privacy concerns, data security, and counterintelligence threats, can be effectively managed through comprehensive policy frameworks, ethical guidelines, and international cooperation.
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...CSCJournals
Phishing is a growing threat to Internet users and causes billions of dollars in damage every year. While there are a number of research articles that study the tactics, techniques and procedures employed by phishers in the literature, in this paper, we present a theoretical yet practical model to study this menacing threat in a formal manner. While it is common folklore knowledge that a successful phishing attack entails creating messages that are indistinguishable from the natural, expected messages by the intended victim, this concept has not been formalized. Our model attempts to capture a phishing attack in terms of this indistinguishability between the natural and phishing message probability distributions. We view the actions performed by a phisher as an attempt to create messages that are indistinguishable to the victim from that of “normal” messages. To the best of our knowledge, this is the first study that places phishing on a concrete theoretical framework and offers a new perspective to analyze this threat. We propose metrics to analyze the success probability of a phishing attack taking into account the input used by a phisher and the work involved in creating deceptive email messages. Finally, we study and apply our model to a new class of phishing attacks called collaborative spear phishing that is gaining momentum. Recent examples include Operation Woolen-Goldfish in 2015, Rocket Kitten in 2014 and Epsilon email breach in 2011. We point out fundamental flaws in the current email-based marketing business model which enables such targeted spear phishing collaborative attacks. In this sense, our study is very timely and presents new and emerging trends in phishing.
Topic that identifies characteristics of Native American Culture and.docxVannaSchrader3
Topic that identifies characteristics of Native American Culture and how it influences/contributes to contemporary cultures and/or what factors have changed perspective regarding Native American cultural practices.
resources cited, at least 3 of any format.
Cover Page.
Minimun 4 page (excluding reference and cover).
MLA formet with proper work cited on the last page
12/ Times/ Double Spacing.
.
Topic Stem Cell ResearchAPA Format I need these topics. don.docxVannaSchrader3
Topic: Stem Cell Research
APA Format
I need these topics. don't add other contents
Table of contents:
1. Overview of stem cell research -
1 Page
2. Embryonic Stem Cells -
2 Pages
3. Adult Stem Cells -
2 Pages
4. Legal issues - 1 Page
5. Conclusion- It should be a strong conclusion
References:
Use 3 Journal Articles or newspaper articles and 2 Internet site. for example .edu, .org, .gov.
another 2 references from the academically approved books.
see for more info and references in the document
.
More Related Content
Similar to Breaking Bad in Cyberspace Understanding why and how Black Ha
The paper emphasizes the human aspects of cyber incidents concerning protecting information and
technology assets by addressing behavioral analytics in cybersecurity for digital forensics applications.
The paper demonstrates the human vulnerabilities associated with information systems technologies and
components. This assessment is based on past literature assessments done in this area. This study also
includes analyses of various frameworks that have led to the adoption of behavioral analysis in digital
forensics. The study's findings indicate that behavioral evidence analysis should be included as part of the
digital forensics examination. The provision of standardized investigation methods and the inclusion of
human factors such as motives and behavioral tendencies are some of the factors attached to the use of
behavioral digital forensic frameworks. However, the study also appreciates the need for a more
generalizable digital forensic method.
The paper emphasizes the human aspects of cyber incidents concerning protecting information and
technology assets by addressing behavioral analytics in cybersecurity for digital forensics applications.
The paper demonstrates the human vulnerabilities associated with information systems technologies and
components. This assessment is based on past literature assessments done in this area. This study also
includes analyses of various frameworks that have led to the adoption of behavioral analysis in digital
forensics. The study's findings indicate that behavioral evidence analysis should be included as part of the
digital forensics examination. The provision of standardized investigation methods and the inclusion of
human factors such as motives and behavioral tendencies are some of the factors attached to the use of
behavioral digital forensic frameworks. However, the study also appreciates the need for a more
generalizable digital forensic method.
The paper emphasizes the human aspects of cyber incidents concerning protecting information and
technology assets by addressing behavioral analytics in cybersecurity for digital forensics applications.
The paper demonstrates the human vulnerabilities associated with information systems technologies and
components. This assessment is based on past literature assessments done in this area. This study also
includes analyses of various frameworks that have led to the adoption of behavioral analysis in digital
forensics. The study's findings indicate that behavioral evidence analysis should be included as part of the
digital forensics examination. The provision of standardized investigation methods and the inclusion of
human factors such as motives and behavioral tendencies are some of the factors attached to the use of
behavioral digital forensic frameworks. However, the study also appreciates the need for a more
generalizable digital forensic method.
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxtawnyataylor528
Kathryn E. Scarborough
Eastern Kentucky University
Marc Rogers
Purdue University
Kelli Frakes
Eastern Kentucky University
Cristina San Martin
Purdue University
KKaatthhrryynn EE.. SSccaarrbboorroouugghh, PPhh..DD.., professor at the Department of Safety, Security, and Emergency
Management at Eastern Kentucky University, earned her Ph.D. in criminal justice from Sam Houston State
University. She also has an MA in applied sociology with a certificate in women’s studies from Old
Dominion and Norfolk State Universities, and a BS in criminal justice from the University of Southern
Mississippi. Prior to her teaching at Eastern Kentucky University, she was a police officer in Portsmouth,
Virginia, a United States Navy Hospital Corpsman/Emergency Medical Technician, and a chemical depen-
dency technician. In addition to her faculty role, Dr. Scarborough is Director for Research, Evaluation and
Testing for the Justice and Safety Center. Her current teaching and research interests include criminal
investigation, law enforcement technology, cyber crime and security, and police administration.
In her role as director for research, testing and evaluation, she has oversight of more than
70 projects funded by the Department of Homeland Security, the National Institute of Justice/Office of
Science and Technology, the State of Kentucky, and the Department of Defense. She also serves as project
director or codirector of the following projects: National Study on Criminal Investigation, the Digital
Evidence Assessment of Local and State Law Enforcement Organizations, the Rural Cyber Crime
Response and Prevention Team project, Cyber PAAL, and the ASIS International Security Trends project.
MMaarrcc RRooggeerrss,, PPhh..DD.., CISSP, CCCI, is the Chair of the Cyber Forensics Program in the Department of
Computer and Information Technology at Purdue University. He is an associate professor and also a
research faculty member at the Center for Education and Research in Information Assurance and
Security (CERIAS). Dr. Rogers was a senior instructor for (ISC)2, the international body that certifies
information system security professionals (CISSP), is a member of the quality assurance board for
(ISC)2’s SCCP designation, and is Chair of the Law, Compliance and Investigation Domain of interna-
tional Common Body of Knowledge (CBK) committee. He is a former police detective who worked in
the area of fraud and computer crime investigations. Dr. Rogers sits on the editorial board for several
professional journals and is a member of various national and international committees focusing on dig-
ital forensic science and digital evidence. He is the author of numerous book chapters, and journal pub-
lications in the field of digital forensics and applied psychological analysis. His research interests
include applied cyber forensics, psychological digital crime scene analysis, and cyber terrorism.
Chapter 24
Digital Evidence
477
M24_SCHM8860_01_SE_C24.QXD 2/4/08 ...
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensJeremiah Grossman
The present study examined a selection of 76 ransomware splash screens collected from a variety of sources. These splash screens were analysed according to surface information, including aspects of visual appearance, the use of language, cultural icons, payment and payment types. The results from the current study showed that, whilst there was a wide variation in the construction of ransomware splash screens, there was a good degree of commonality, particularly in terms of the structure and use of key aspects of social engineering used to elicit payment from the victims. There was the emergence of a sub-set of ransomware that, in the context of this report, was termed ‘Cuckoo’ ransomware. This type of attack often purported to be from an official source requesting payment for alleged transgressions.
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...Hansa Edirisinghe
This report discuses the employment of ethical hacking through a disciplined, systematic analysis as a way of reviewing and strengthening the security of information systems. The preliminary objective of this study is therefore to understand the concept of Ethical Hacking. - By Hansa Edirisinghe
Required
topic : cyberlaw document
presentation document in word format
1. On the discussion forum, please post a 500-word summary of the results of your research paper
2. Respond to two classmates' postings. Minimum 100 words per posting.
Classmate discussion for reply 1
by
Harsh Patel
- Saturday, 20 July 2019, 9:38 PM
The research paper is a synopsis on cybercrime and the ethical implications related to this field. The elements impacting the cybercrime have various laws of action in several nations that frequently manage features of the issues and analysis in the gravity of the issues with different approaches are playing significant roles. Cybercrime attacks signify an emerging challenge, particularly in terms of developing nations. International cyber terrorism is concentrated on gaining private data to take benefit for complete control and thus, significant welfares (Malhotra, 2016). Cybercrime incorporates a completely criminal and illegal activity which is conveyed out by information technology and computers. The impacts of cyber-crime are broadly discoursed in the literature, seeing the circumstance that it is a topic of great current awareness.
Antonescu & Birău (2015) states that the financial consequence of cybercrime characterizes a highly penetrating concern in the view of globalized markets. Developing nations signify a very weak objective because of institutional and structural inequalities. Since the growing application of information technology, the chances of deceitful advances centered on cyber-crimes have developed even more important. Measuring the number of events, the damage instigated by cybercrime is enormously large, reaching great economic harm, of hundreds of billions of dollars a year in the event of the global market.
Sometimes, it is very challenging to perfectly assess the charge of cybercrime attacks measuring particular non-financial allegations. Additionally, the non-financial consequence of cybercrimes are slightly hard to proportionate based on a measurable technique, but certainly, it has a very strong influence with tremendously intense costs. Cyber-attack approaches have been enhanced radically over time, particularly in recent years (Antonescu & Birău, 2015). Criminals have also modified the developments of computer technology to further proceed with their illegal activities.
Specific precautionary measures need to be taken by all of us while using the internet, which will succor in stimulating this major risk Cyber Crime. There is a necessity to conduct research analysis of cyber-crimes to discover out the best technique to protect confidential data and take suitable action against the cyber-attack. Focussed training in the fields of computer crime and economic, and how they impact the specific industries with computer forensics, requests to continue to upsurge for law enforcement workforces. With the lack of understanding of how particular industries operate, it is hard to a.
Cyber Security and Terrorism Research Article2Cybe.docxrandyburney60861
Cyber Security and Terrorism Research Article
2
Cyber Security and Terrorism Research Article
Senior Capstone
Introduction
Homeland Security has a wide range of organizations that fills in as a way to deal with shielding the United States locally and universally. These offices incorporate however are not restricted to U.S. Customs and Border Patrol, Transportation Security Administration, United States Coast Guard, Cybersecurity and Infrastructure, and so forth. These offices serves the administration in tending to at least one stages. For instance, The Federal Emergency Management Agency, otherwise called FEMA, is an organization that serves numerous partners in mitigating, planning, responding, and recovering from catastrophic events.
On a bigger degree, Cybersecurity is a developing and learning field that is utilized in Cybersecurity and Infrastructure and different organizations to shield significant specialized data from fear monger assaults, for example, hacking. Its primary unit of examination is the administration where relieving is the stage being polished. This principle point is basic to the Homeland Security and Emergency Management's (HSEM) discipline. As of now, there is an issue of how does Cybersecurity adequately change the danger of psychological militant assaults, wherein there are sure and negative credits to its methods for assurance. Innovation, organize security, basic frameworks including PC frameworks, and so forth is the thing that makes up Cybersecurity.
In spite of the fact that there might be a comprehension of what fear based oppression is, there has not yet been an unequivocal meaning of psychological oppression. As per Wilson, a few definitions for digital fear mongering can result from the assailants expectation while others centers on the impacts of the assault itself (Wilson, 2007). A few assaults can bring about mischief causing the death toll or harm while different assaults may bring about troublesome PCs and dread equivalents to fear based oppression. There should be a control on the yield of what dread is truly delegated with regards to an assault. When an infection occurs on a PC, is the proprietor of that PC apprehensive? On the off chance that the proprietor is apprehensive does it add up to a similar sort of dread starting at an aggressor from an alternate nation causing the infection? This can be alluded to what was the reason for that infection in any case.
When managing Cybersecurity and fear based oppression, there should be a decent measure of assaults occurring on the double or sequentially to cause dread inside the organization or nation. Digital fear mongers are seen assaulting different organizations consecutive for an extensive stretch in result accomplishing their objectives or if nothing else making consideration them (Lewis, 2002). In the event that the fear based oppressor neglects to increase any profit by their assault on a lot of PC frameworks, at that point it would n.
Course ObjectiveAnalyze key psychological and sociological issues .docxmercylittle80626
Course Objective
Analyze key psychological and sociological issues related to hackers and the potential impact on individual organizations and society as a whole.
The class discusses ethical and nonethical hacker personalities and motivations, and profiling tools used by law enforcement in combating cyber threats.
Topic 1: Hacker Motivation and Threat Mitigation
Explain what psychological factors can often motivate hackers (eg, addiction, crime, greed, status, etc….), and give examples where these motivations were a factor in a cyberattack.
What can organizations do to be more proactive in identifying and mitigating hacker threats?
Background:
1. Crime and Punishment: The Psychology of Hacking in the New Millennium [2003 - older but, I believe, still relevant and a solid short introduction]
2. Understanding a Hacker’s Mind: A Psychological Insight into the Hijacking of Identities [2004 - RSA. Also still useful]
3. The Risk Propensity and Rationality of Computer Hackers [2010 ]
Topic 2: Ethical and Nonethical Hackers
As the cybersecurity field expands, the larger community discourse leads to changes in terminology. While some of our course materials may differentiate between the terms "hackers" and "crackers" as threat actors, we will use the terms "ethical hackers" and "nonethical hackers" to make the same differentiation.
How do the profiles for ethical and nonethical hackers differ? Should these psychological attributes make a difference as to the amount of, or nature of the punishment meted out to those who are caught? Why or why not?
Describe how certain factors can also motivate ethical hackers, or those who defend against cyberattacks (sometimes called cyber warriors or cyber patriots)? (eg, revenge, patriotism, fear of government abuse, pride, respect for the law, ownership, anger, retaliation….)
Background: Hacking for the Homeland: Patriotic Hackers vs. Hacktivists [2013 - abstract only.
One page per topic with references on seprate page (4 pages total)
.
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docxbriancrawford30935
PROTECTING THE NATION’S CYBER SYSTEMS 9
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE THREAT TO THE NATION’S CYBER SYSTEMS
A Master Thesis
Submitted to the Faculty
Of
American Public University
By
Daniella Rowell
In Partial Fulfillment of the
Requirements for the degree
Of
Master of Arts
February 2016
American Public University
Charles Town, WV
Introduction and purpose statement
Technology is an intrinsic tool of change in the world today. It has had a very huge impact on how things are done given that it seeks to enhance life in way or another. A new global threat known as cybercrime was introduced in the wake of technological advancements. Cybercrime is basically defined as any unlawful act whereby the perpetrator uses a computer or network in its perpetration or the computer or network is a target. The 21st Century has seen immense changes in how criminals are committing crime as they rely more on computers than ever (Brenner, 2010). Whereas some commit cyber-crimes due to the thrill involved, others are motivated by economic goals such as deriving profits. Consequently, cybercrime is a core issue that needs to be tackled as it has a wide array of motivations, targets and it commission is ever changing.
Comment by Chris: No comma between the author and year in Turabian formatting. The comma goes between the year and page number. Comment by Chris: Is this your purpose statement? You need to clearly state your purpose statement.
“The purpose of this thesis is to…….”
This study seeks to address underlying issues within our society that in one way or another contributes to cyber-crime. These factors range from government policies, societal and personal factors such as a jealous spouse hacking his or her partners account, ideological motivated cybercrime and structural cause whereby more information is stored online hence increase cyber criminals reward. The U.S government for examples lacks an official definition of cybercrime. As a result, this term is used interchangeably to refer to other internet and/or technology related malicious acts. Federal law enforcement agencies on the other hand give cybercrime a legal definition based on their jurisdiction and crimes they are charged with investigating (Kirwan, 2013). Furthermore, there is no national strategy solely focused on fighting cybercrime. Instead, it’s integrated in strategies aimed at fighting other crimes such as Transnational Organized crime among others. Consequently, there is need to communicate a vivid definition of cybercrime to persons vested with authority of carrying out prevention strategies. Cyber criminals form networks which increases difficulty of elimination.
Cyber criminals have made a lot of effort in trying to increase the profitability of their activities. Both small and large businesses are at risk of being victims of cybercrime. One estimate has placed cybercrime as a very costly affair for victims in a research done in twenty four countr.
Intelligence analysis is a key part of national security and making strategic decisions. But advances in AI are having a big impact on this field. This essay looks at the many ways that artificial intelligence (AI) changes intelligence analysis, focusing on the good and bad things that this trend has caused. We look at how tools for artificial intelligence (AI) such as machine learning, natural language processing (NLP), and predictive analytics are making the intelligence community better. AI can handle huge amounts of data better than humans can, which lets us look at complicated global events faster and more accurately. This boost in capabilities lets policy and security decisions be made faster and better.However, the difficulties that artificial intelligence brings to the field of intelligence analysis are also discussed. Concerns about bias in AI algorithms, the ease with which they can be manipulated, and the consequences of placing too much faith in computers are examined. We talk about why it is important to strike a balance between AI help and human judgment and why humans' intuition and experience are irreplaceable in situations that require nuanced analysis. The paper also explores the potential role of AI in counterintelligence and the dynamic nature of intelligence threats.
In the end, we offer suggestions for the ethical application of AI in intelligence gathering. This includes promoting openness in the use of AI, the need for constant human oversight, and the significance of cross-national cooperation in addressing ethical and safety concerns. This paper seeks to advance our knowledge of the revolutionary effects of AI on intelligence analysis and to outline a path toward the responsible and fruitful application of this technology in the intelligence community.
• Hypothesis 1 (H1): The ethical and security challenges posed by the use of AI in intelligence analysis, such as privacy concerns, data security, and counterintelligence threats, can be effectively managed through comprehensive policy frameworks, ethical guidelines, and international cooperation.
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...CSCJournals
Phishing is a growing threat to Internet users and causes billions of dollars in damage every year. While there are a number of research articles that study the tactics, techniques and procedures employed by phishers in the literature, in this paper, we present a theoretical yet practical model to study this menacing threat in a formal manner. While it is common folklore knowledge that a successful phishing attack entails creating messages that are indistinguishable from the natural, expected messages by the intended victim, this concept has not been formalized. Our model attempts to capture a phishing attack in terms of this indistinguishability between the natural and phishing message probability distributions. We view the actions performed by a phisher as an attempt to create messages that are indistinguishable to the victim from that of “normal” messages. To the best of our knowledge, this is the first study that places phishing on a concrete theoretical framework and offers a new perspective to analyze this threat. We propose metrics to analyze the success probability of a phishing attack taking into account the input used by a phisher and the work involved in creating deceptive email messages. Finally, we study and apply our model to a new class of phishing attacks called collaborative spear phishing that is gaining momentum. Recent examples include Operation Woolen-Goldfish in 2015, Rocket Kitten in 2014 and Epsilon email breach in 2011. We point out fundamental flaws in the current email-based marketing business model which enables such targeted spear phishing collaborative attacks. In this sense, our study is very timely and presents new and emerging trends in phishing.
Similar to Breaking Bad in Cyberspace Understanding why and how Black Ha (20)
Topic that identifies characteristics of Native American Culture and.docxVannaSchrader3
Topic that identifies characteristics of Native American Culture and how it influences/contributes to contemporary cultures and/or what factors have changed perspective regarding Native American cultural practices.
resources cited, at least 3 of any format.
Cover Page.
Minimun 4 page (excluding reference and cover).
MLA formet with proper work cited on the last page
12/ Times/ Double Spacing.
.
Topic Stem Cell ResearchAPA Format I need these topics. don.docxVannaSchrader3
Topic: Stem Cell Research
APA Format
I need these topics. don't add other contents
Table of contents:
1. Overview of stem cell research -
1 Page
2. Embryonic Stem Cells -
2 Pages
3. Adult Stem Cells -
2 Pages
4. Legal issues - 1 Page
5. Conclusion- It should be a strong conclusion
References:
Use 3 Journal Articles or newspaper articles and 2 Internet site. for example .edu, .org, .gov.
another 2 references from the academically approved books.
see for more info and references in the document
.
Topic Styles of PolicingYou are a patrol officer in a middle- to .docxVannaSchrader3
Topic: Styles of Policing
You are a patrol officer in a middle- to lower-class community, which is a suburb of a much larger metropolitan city. During the past 6 months, you have noticed an increase in what might be the beginning of gang activity in your community. You have begun to see gang-style graffiti painted on walls, buildings, and street signs. You have noticed that more young adults are gathering on street corners and appear to be dressing in clothing often associated with gang involvement. While no gang violence has occurred yet, you suspect it is not far away.
As discussed in your text, there are three distinct styles of policing. They are the watchman style, the legalistic style, and the service style.
In a single posting, describe in detail how you would address this growing problem using
each
of the policing styles listed above. Explain which approach is best, using research to substantiate your postings, citing your sources following APA format
.
Topic the legalization of same sex adoptionThese same sex adopti.docxVannaSchrader3
Topic: the legalization of same sex adoption
These: same sex adoption should be legalized and be accepted by the public
attrachments: draft and suggestions from the professor
Develop this 8 pages draft to be a 15 pages final paper
APA style, double spaced, use 10 peer-review journals as sources
.
TOPIC The Truth About Caffeine3 pages,give some statistics of neg.docxVannaSchrader3
TOPIC/ The Truth About Caffeine
3 pages,give some statistics of negative effects of caffeine
the guides to follow:
topic:
Specific Purpose:to inform ....
Introduction:(discovering +history)
Body:
I like here to give some general info about caffeine and explain the negetive effects.
conclusion:
.
Topic Media Example (article)1) as usual, do an analysis of the.docxVannaSchrader3
Topic: Media Example (article)
1) as usual, do an analysis of the logic of the article on Religion which you choose:What is the : claim, premises, whether the argument in the article is valid or sound.
2) THEN, construct FOUR valid Formal Logic argument, using information from the article. One of each of the following forms must be included:
a) Modus Ponens
b) Modus Tollens
c) Chain Argument
d) Disjunctive Argument
please link me to the essay
Pages:
1, Double spaced
.
Topic Servant LeadershipThread In our reading we explored th.docxVannaSchrader3
Topic: Servant Leadership
Thread:
In our reading we explored the concept of servant leadership. Blanchard and Hodges present Jesus Christ as the ultimate example of the servant leader, and with good cause. But consider other servant leaders found in Scripture, too, and then answer the following questions: What biblical leader would you select as another good example of a servant leader? Why? How did this leader reflect principles from both Northouse’s description and Blanchard & Hodge’s description of a servant leader?
300-500 word discussion board with APA in text citation using at least three professional sources. class text leadership theory and practice by peter g. northhouse and lead like jesus by ken blanchard and phil hodges
.
Topic Organization of Law Enforcement AgenciesDo you agree or d.docxVannaSchrader3
Topic:
Organization of Law Enforcement Agencies
Do you agree or disagree with the paramilitary style of organization of most law enforcement agencies? Defend your position. You must use current APA style. You must cite 1 scholarly-quality internet-based source/reference and 1 biblical source/reference to support your answer. Both sources must offer a specific connection to the discussion topic.
.
Topic Parents Should have a license to have childrenaprox. 500 wo.docxVannaSchrader3
Topic: Parents Should have a license to have children
aprox. 500 words
Focus on these three points
1. Childrens safety, health and happines
2. What makes a responsible parent
3.What determines a competent parent from an incompetent parent
-Include a citation page if using statistical data
.
Topic PATIENT DATA PRIVACYPerformance Improvement plan Proper an.docxVannaSchrader3
Topic: PATIENT DATA PRIVACY
Performance Improvement plan: Proper and Intense training of employees
Success of the Performance Improvement Plan
A. If this initiative is successful, what would be the financial implications for the healthcare organization?
B. How would the existing information management systems contribute to the success of your proposal?
C. What organizational processes will permit continued viability of the performance improvement initiative, if it is successful?
D. Analyze interdepartmental communication that would be necessary for continued engagement in the proposed initiative.
1.5-2 pages. APA format with references please
thank you
.
Topic Kelly’s Personal ConstructsQuestionPrompt Analyze th.docxVannaSchrader3
Topic:
Kelly’s Personal Constructs
Question/Prompt:
Analyze the 4 common elements in most human disturbance according to Kelly (threat, fear, anxiety, and guilt). Compare each of these constructs with what Scripture says regarding these particular elements.
Answer must be 300+ words and contain 2 references.
.
Topic Fingerprints.Study fingerprinting in the textbook and res.docxVannaSchrader3
Topic: Fingerprints.
Study fingerprinting in the textbook and research and discuss the topic including
–but not limited to–
fingerprint history, types and different methods used to develop and preserve prints.
In addition, research and discuss Integrated Automated Fingerprint Identification System (IAFIS).
Due Sunday
.
Topic is Domestic Violence, Both men and women being the abus.docxVannaSchrader3
Topic is:
Domestic Viole
nce
, Both men and women being the abuser
Ask a question: Identify an issue of concern or personal curiosity relating to your profession.
Identify two bodies of knowledge: Which two disciplines will be used to help answer the question?
Example: History and Sociology
Conduct a literature review: What research has been done to help answer this question?
Hint #1: Make notes in the center column (see below) as resources are identified and read.
Hint #2: Compile an annotated bibliography as you find information as this will help you keep your sources organized and references correct.
Bringing It Together: Discuss the question extensively using information from the middle column above.
Conclusion: End the discussion with a conclusion—answer the question! Please note, there are two parts to the conclusion:
Part #1: Answer your question and discuss how (if) your personal views have changed based on what you’ve learned.
Part #2: Discuss how you plan to build on this knowledge going forward.
.
Topic is regional integration .First You need to find article and re.docxVannaSchrader3
Topic is regional integration .First You need to find article and resources which is related with this topic. you should write three pages about this article, resources and topic
I told assignment's structure in link that is why please check the link(file)
my native language is not English that is why if you use more simple words in assignment, it will be better
.
Topic Human Trafficking in relation to US Border and Coastal securi.docxVannaSchrader3
Topic: Human Trafficking in relation to US Border and Coastal security.
You are to prepare your paper in a word document (Times New Roman, Font 12-double space) using APA style format ("Resources" and APA info attached below). Your research paper should be
10-12 pages of content excluding your title page and reference page
. A minimum of 1
0 outside references required.
.
Topic is AutonomyShort papers should use double spacing, 12-point .docxVannaSchrader3
Topic is Autonomy
Short papers should use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to a discipline-appropriate citation method. Page-length requirements: 1–2 pages,
APA format and properly cited.
Will be cheched for originality through Turn it in.
.
Topic Genetic connection of hypertension to cardiovascular disease .docxVannaSchrader3
Topic: Genetic connection of hypertension to cardiovascular disease in african americans?
Needs to be specific and to address better current health disparities in specific population groups as well as the prevention of selected public health issue. Clearly and properly present the material by using relevant scientific information, statistical data, and research-based evidence from identified credible external sources.
Length: The written component of this assignment should be a minimum of 8 double-spaced pages.
References: At least
eight
references
must be included from
scholarly sources
. Quoted materialsshould not exceed 10% of the total paper (since the focus of these assignments is critical thinking). Use your own words and build on the ideas of others. Materials copied verbatim from external sources must be enclosed in quotation marks. In-text reference citations are required as well as a list of references at the end of the assignment. (APA format is required.)
Organization: Subheadings should be used to organize your paper according to the questions.
Format: APA format is required for this assignment.
I have attached the annotated bibliography with sources to be used as well as an outline for reference on how to structure the paper.
.
topic Errors (medication or patient injury)in particular stra.docxVannaSchrader3
topic: Errors (medication or patient injury)
in particular strategies for reducing medication errors
Guidelines:
Guideli
n
es
f
o
r Top
i
c
S
ea
r
c
h
St
r
a
t
egy
P
aper
T
h
e
T
o
p
ic
S
e
a
rch
S
tra
t
e
g
y
P
a
p
e
r ist
h
efi
r
st
o
f
three
r
e
l
at
e
d assi
g
n
me
n
tswhich are due in Unit 3. T
h
e
pu
r
p
o
se
o
ft
h
is i
n
itial
p
a
p
e
r is
t
o
b
r
i
e
fly
d
e
scri
b
e
y
o
u
r
s
e
arch
s
tra
te
g
i
e
sw
h
e
ni
d
e
n
tif
y
i
n
gt
w
oar
t
iclest
h
at
p
e
r
t
aintoan
ev
i
d
e
n
c
e
-
b
as
e
d
p
ra
c
ticet
op
ic
o
f i
n
t
e
r
e
s
t
.
C
O
U
RS
E
O
U
TC
O
M
E
S
T
h
i
sa
ss
i
gn
m
entena
b
l
es
th
e
s
tud
e
nt
t
o
m
eetthe
f
o
l
l
o
w
i
ng
c
o
u
rs
eo
u
t
c
o
m
e
s
.
CO
1
:
E
xa
m
i
n
et
h
es
o
u
r
ces
o
f k
n
o
w
l
e
dg
et
h
at
c
o
n
tri
bu
te
t
o
p
r
o
f
e
ss
i
o
n
al
nu
rsi
n
g
p
ractic
e
.(
P
O
#
7
)
CO
2
:
App
ly
r
e
s
e
a
r
ch
p
ri
n
c
i
p
l
e
s
t
ot
h
ei
n
t
e
r
p
r
e
tat
i
o
n
o
f t
h
e
c
o
n
t
e
n
t
o
f
pub
lis
h
e
d
r
e
s
e
archst
ud
i
e
s.(
P
Os
#
4
and#
8
)
D
U
E
D
A
TE
Re
f
erto
the
c
ou
rs
e
c
a
l
en
d
ar
f
ordue
d
ate.
T
he
c
o
l
l
eg
e
’
s
L
ate
A
ss
i
gn
m
entp
o
li
c
y
a
pp
li
estot
h
i
sa
c
t
iv
i
t
y
.
P
OI
N
T
S
P
OSSI
B
L
E
T
h
is assi
gnm
e
n
tis
w
o
r
t
h
1
5
0
p
o
i
n
t
s
.T
h
e
c
o
lle
g
e
’s
L
a
t
e
A
ssi
gnm
e
n
t
p
o
licya
pp
li
e
stot
h
is a
c
ti
v
i
t
y
.
R
EQ
U
IRE
M
E
N
T
S
Y
o
u
will be assigned a group in unit 2 (located in the team collaboration tab) to formulate an
ev
i
d
e
n
c
e
-
b
as
e
d
p
ra
c
ticet
op
ic
o
f i
n
t
e
r
e
s
t
that will be used to complete the unit 3 and unit 5 independent assignments, as well as the group PowerPoint presentation in unit 7.
T
hepaperw
i
l
l
i
n
c
l
u
de
t
he
f
o
l
l
o
w
i
ng.
a.
C
l
i
n
i
c
a
l
Q
u
e
s
t
i
on
a.
De
scr
i
bep
r
o
b
l
em
b.
Si
g
n
i
f
i
c
an
c
eof p
r
o
b
l
em
i
n
t
e
r
m
sof out
c
o
m
esor
s
tat
i
s
t
ic
s
c.
Y
our
P
IC
O
Tque
s
t
i
on
i
n
s
u
ppo
r
tof t
h
eg
r
o
up
t
op
i
c
d.
P
u
r
po
s
eof
y
o
urp
a
per
b.
Le
v
e
l
sof
E
v
i
d
e
n
c
e
a.
T
y
peof que
s
t
i
ona
s
k
ed
b.
B
e
s
t
e
v
i
den
c
e
f
oundto
a
n
s
werque
s
t
i
o
n
c.
S
ea
rc
h
S
t
r
a
t
e
g
y
a.
S
ea
rc
h
t
e
r
m
s
b.
Data
b
a
s
esu
s
ed
(y
ou
m
a
yu
s
e
G
oo
g
l
e
S
c
h
o
l
ar
i
n ad
d
i
t
i
onto
t
he
li
b
r
a
r
y
d
at
a
ba
s
e
s;
s
ta
r
tw
i
th the
L
i
b
r
a
r
y
)
c.
Re
f
i
ne
m
entde
c
i
si
ons
m
ade
d.
Iden
t
i
f
i
c
at
i
onof two
m
o
s
t
r
e
l
e
v
a
n
ta
r
t
i
c
l
es
d.
F
o
r
m
at
a.
Co
rr
e
c
tg
r
a
m
m
arand
s
pe
l
l
i
ng
b.
U
s
eof hea
d
i
n
gs
f
orea
c
h
s
e
c
t
i
on
c.
U
s
eof
A
P
A
f
o
r
m
at
(
sixthed
i
t
i
on)
d.
P
a
g
e
l
en
g
th:three to fourp
a
ges
P
RE
P
A
RIN
G
T
H
E
P
AP
E
R
1.
Pl
e
a
s
e
m
a
k
e
s
u
r
e
y
o
udo
n
otd
u
p
l
i
c
atea
r
t
i
cl
es
w
i
t
h
i
n
y
ourg
r
o
u
p.
2.
P
a
p
er
s
ho
u
l
d
i
n
cl
udea
t
i
t
l
epa
g
e
a
nda
r
e
f
e
r
en
c
e
p
a
g
e.
D
IRE
CT
I
O
N
S
AN
D
A
S
SIG
N
M
E
N
T
C
R
I
T
ERIA
A
s
s
i
g
nme
n
t
C
r
i
t
e
r
i
a
P
o
i
n
t
s
%
De
s
c
r
i
p
t
i
on
Cli
n
ic
a
lQ
ue
s
t
i
o
n
45
30
1
..
Topic differences between folk guitar and classic guitar.Minimu.docxVannaSchrader3
Topic: differences between folk guitar and classic guitar.
Minimum of 1500 words. Double-spaced. Cite ALL sources appropriately. Use MLA or APA (or any other accepted publication) for citation standards.
This is a research paper. Do not plagiarize materials. Use quotes and cite other people's work whenever it is appropriate. Do your best to be creative and original with your writing style rather than "regurgitate" information to me. You may be as creative as you like (graphics, photos, audio) as long as your paper is concise, has proper flow and informs me of something about the guitar.
.
Topic Death Investigations. Review homicide investigation as de.docxVannaSchrader3
Topic: Death Investigations.
Review homicide investigation as described in the textbook and through research including
–but not limited to–
types of wrongful deaths, the preliminary investigation, dying declaration, estimating time of death, gunshot wounds, autoerotic death investigation, and suicide investigation.
Submit to the Dropbox before midnight
Sunday
.
.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Unit 8 - Information and Communication Technology (Paper I).pdf
Breaking Bad in Cyberspace Understanding why and how Black Ha
1. Breaking Bad in Cyberspace: Understanding why and how Black
Hat
Hackers Manage their Nerves to Commit their Virtual Crimes
Mario Silic1 & Paul Benjamin Lowry2
# Springer Science+Business Media, LLC, part of Springer
Nature 2019
Abstract
What is happening in hacker’s minds when they are committing
criminal activities? How black hat hackers manage nerves,
which
is about managing fear and underlying emotions, and which
tactics they employ during their decision-making process
before,
during and after committing a crime, is the question that could
provide some initial insights on hacker’s trajectories, their
switch
from black hat to white hat and ultimately about their behaviors
and motivations. The main difficulty in answering this question
resides with the access to hacker’s data. To address this gap, we
conducted interviews with 16 black hat hackers. Supported by
the
general strain theory and routine activity theory, we identified
five techniques that they use to manage their nerves: shunting,
minimization, plan B, thrill, and lens widening techniques. Each
of these techniques help hackers to better manage their nerves
and consequently, learn how to better cope with the fear. During
their psychological decision-making processes, hackers use
these
five techniques to create a new mindset, behind which they
2. hide, with the objective of minimizing and mitigating the
inherent
risks they encounter during their criminal activities. The
theoretical importance of nerve is the key to a better
understanding of
black hat hacker’s illegal acts, their behaviors and ultimately
their actions.
Keywords Black hat hacker . Security . Criminology nerve
management . General strain theory . Routine activity theory
(RAT)
1 Introduction
In 2016, black hat hackers, that we define as individuals with
extensive computer knowledge employed to get personal
gains or for other malicious reasons by conducting illegal
activities (Chandler 1996; Smith and Rupp 2002), were be-
hind major cyber security incidents (Cisco 2018; EY 2018).
This caused an average 20% loss of a company’s customer
base with a trend of the hacking becoming more business and
corporate oriented with unprecedented levels of sophistication
and impact (Cisco 2018). The resulting revenue loss opportu-
nities push companies to increase their security investments,
since it is unlikely that the magnitude and the impact of
cybercriminal attacks will decrease, given the current rate of
increase in internet traffic. Sony, Ashley Madison, JP Morgan
are examples of recent security incidents which reveal the
pervasiveness of this issue. To combat this trend, it is essential
to get a better understanding of cybercrime’s costs, benefits,
and attractiveness (Kshetri 2006). However, little is known
about the people behind these illegal cybercrime activities,
for three key reasons: (1) given its criminal nature, it is diffi -
cult to obtain reliable data (Benjamin et al. 2019; Mahmood
et al. 2010); (2) the fact that existing studies are anecdotal and
3. rely on descriptive accounts and reporting (Crossler et al.
2013); and (3) the lack of a solid theoretical foundation to
support the empirical evidence (Crossler et al. 2013;
Mahmood et al. 2010). A key weakness in the IS security
literature is that it focuses too much on policy compliance
and non-malicious behaviors; by contrast, there is a clear need
for more research on the “black hat” dimension of cyber se-
curity (Benjamin et al. 2019; Mahmood et al. 2010), with a
focus on the malicious and deviant (i.e., criminal) behavior
that threaten organizations (Crossler et al. 2013; Lowry et al.
2017; Willison and Lowry 2018; Willison et al. 2018).
Different theories, ranging from the differential association
theory (Blackburn 1993), theory of operant conditioning
(Skinner 1972), social learning theory (Bandura and Walters
1977; Lowry et al. 2016), to deterrence theory (Gibbs 1975;
* Mario Silic
[email protected]
Paul Benjamin Lowry
[email protected]
1 University of St. Gallen, Mueller-Friedberg-Str. 8, 9000 St.
Gallen, Switzerland
2 Pamplin College of Business, Virginia Tech, Blacksburg, VA,
USA
Information Systems Frontiers
https://doi.org/10.1007/s10796-019-09949-3
http://crossmark.crossref.org/dialog/?doi=10.1007/s10796-019-
09949-3&domain=pdf
mailto:[email protected]
Willison et al. 2018), have all been relatively effective in
4. explaining deviant behaviors and criminal continuation.
However, because hacking is an unconventional criminal ac-
tivity (Davis and Hutchison 1997), there is no single theory
that well explains hacker1 behavior. Interestingly, the role of
emotion, stemming from the general strain theory (Agnew
1992), was found to be one of the central factors in driving
deviant behavior that is fostered by anger and frustration.
Although this theory was widely applied in traditional street
crimes (Baron 2004), it is not clear what role emotion may
play in the hacking context. In particular, we are interested in
how black hat hackers process their fear and subsequently
manage their nerves when committing a virtual crime.
Clarifying this theoretical issue would be of high importance
in better understanding the hacking criminal behavior.
Notably, we would extend existing theoretical understandings
of hacker-offending decision-making processes.
That is, we are particularly interested in understanding how
black hat hackers manage fear and their nerves. Nerve man-
agement is about the ability to manage fear and underlying
emotions. Nerve management is essential, since it drives the
decision-making process during the criminal act (Cornish
et al. 2008). Unlike other criminal activities (e.g., car thieves),
where offenders develop various tactics (e.g., self-medication,
shunting, fatalism) for committing crime (Jacobs and
Cherbonneau 2017), black hat hackers, likely employ differ -
ent tactics to create and manage their nerves because they are
in a highly unique criminal context that is virtual and percep-
tually hidden in a computer system,.
The importance of better understanding these tactics is es-
sential in better understanding black hat hacking, and ulti-
mately how to thwart it. Indeed, in the hacking decision-
making processes, calm nerves should facilitate better control
of the crime situation, minimizing risks and possible sanction
threats. It is particularly compelling to consider how black hat
5. hackers manage their nerve, given that face the possibility of
severe sanctions if they are caught (e.g., arrest, prosecution,
loss of employment, and fines). According to Holt and Bossler
(2014, p. 33): “The increasingly rapid adoption of technology
at all ages in industrialized nations requires research identify-
ing how the use of computers and the Internet affect adoles-
cent development through adulthood and involvement in both
on- and off-line offending” (p. 33). We argue that better un-
derstanding how emotional dimension, and more precisely a
hacker’s nerves, is managed could provide new insights into
hacker trajectories and their psychological functioning. It is
evident that nerve management could be an important unex-
plored dimension that could provide theoretical explanations
of hacker’s emotional states they have to cope with when
confronted to crime situations.
In this context, our study relies on the qualitative approach
based on grounded theory (Corbin and Strauss 2008), which is
particularly useful in dynamic environments (Strauss and
Corbin 1994), such as the hacking context (Turgeman-
Goldschmidt 2005). Indeed, according to Turgeman-
Goldschmidt (2005, p. 10) “the best way to reach the true
meaning of the criminal behavior of hackers requires using
qualitative research methods in general and the grounded the-
ory in particular because computer crime has yet to be exten-
sively explored from the offenders’ points of view (i.e., their
perceptions, attitudes, behaviors, etc.)” (p. 10). By applying
the grounded theory approach we can discover relevant cate-
gories and relationships among them (Strauss and Corbin
1994) to reveal the justification for the black hat hacker’s
motivations and psychological states that drive and shape their
nerve management. We argue that the theoretical importance
of nerve management is the key to a better understanding of
the black hat hacker’s illegal acts, behaviors and actions. It is
crucial to understand how black hat hackers manage their
nerves and which factors influence their decision-making pro-
6. cess before and after committing a crime. The answer to this
question could provide some initial insights on hacker’s tra-
jectories, their switch from black hat to white hat and their
behaviors and motivations.
In the following sections, we present the theoretical foun-
dations for this study, followed by the research methodology.
We then discuss our findings and conclude the study.
2 Theoretical Background
Our research applies grounded theory approach which should
provide us relevant explanations, interpretations and implica-
tions. To apply and interpret our grounded theory develop-
ment, we are supported by the theoretical foundations of gen-
eral strain theory (Agnew 1992) and routine activity theory
(RAT) (Cohen and Felson 1979).
2.1 Development of Crime
Based on its origins in the 1960’s, the word “hack” meant
improving programming flaws of mainframe computers by a
group of MIT students. Fixing bugs and improving program-
ming mistakes by doing small “hacks” was performed by an
individual (i.e., hacker). This person was considered to have a
higher level of computer knowledge and was able to alter
programs or systems (Yar 2005). In 1963, one of the first
incidents of malicious hacking was reported (telephone
hackers) by MIT’s student newspaper (Lichstein 1963).
Hackers are now generally divided into two main groups:
white hat and black hat hackers. These two groups have dif-
ferent motivations, objectives and rules. While white hat
hackers are usually considered positively. They seek to
1 Throughout the text, for concision, we use the term, ‘hacker’
to refer to the
7. ‘black hat hacker.’
Inf Syst Front
acquire new knowledge and to provide information about vul -
nerabilities, weaknesses and threats that they have identified
in computer systems. By contrast, the black hat hackers at-
tempt to achieve financial gain from their knowledge by
blackmailing, sabotaging or engaging in other criminal activ-
ities (Schell and Dodge 2002). Previous studies that focused
on the motivation behind hacking activities provided different
explanations for their acts, such as justice (Rogers 2006), en-
joyment and curiosity (Turgeman-Goldschmidt 2005), moral-
ity and connectedness (Teske 1997), among others.
Regardless of the specific motivation to commit an illegal
action, every hacker usually balances benefits and costs, be-
fore deciding whether or not to commit the crime (Probasco
and Davis 1995). These intangible psychological costs relate
to the amount of mental energy required to commit the crime.
Fear of apprehension of punishment remains an important
decision-making criteria before the crime is committed
(Kshetri 2006).
Most individuals who commit crimes and act unethically
believe that there is nothing wrong in what they are doing
(Kallman and Grillo 1998). They do not perceive their actions
as being really illegal, unethical or inappropriate. It is clear that
for most black hat hackers, committing a cyber-crime does not
increase their guilt level, as is the case for more conventional
crimes (Phukan 2002). This is because it is not always easy to
identify the victim, as well as different socio-cultural back-
grounds where the cost of their acts is weighed against the
context in which they operate (Deci and Ryan 2010).
8. To date, little empirical evidence has been provided to fur -
ther explain the black hat hacker’s motivations (Crossler et al.
2013; Holt and Bossler 2014; Holt et al. 2012; Mahmood et al.
2010; Schell and Holt 2009). This has contributed to the dif-
ficulty in getting the data (Benjamin et al. 2019). The majority
of previous studies primarily focused on discussing hackers
motivation, rather than providing empirical evidence (e.g.,
Cross 2006; Schell and Dodge 2002). Other studies that tried
to understand the complex hacker’s phenomenon, mostly fo-
cused on the student population (e.g., Hu et al. 2011;
Rogers 2006). However, we believe students are a par-
ticularly poor sample frame from which to represent the
complex psychological motivations behind black hat
hackers’ highly criminal. Moreover, the other flaw in
these studies is they did not analyze the actual context in
which hackers operate, such as hackers forums or Internet
Relay Chats (e.g., Benjamin et al. 2015; Benjamin et al.
2019; Benjamin et al. 2016). Importantly, the few studies that
used known hackers as informants (e.g., Holt 2009; Hu et al.
2011; Schell and Holt 2009; Young et al. 2007), revealed that
hackers perceive a low level of potential sanction. They also
believe that they will not be caught easily. This signals that the
likelihood of punishment is low (Young et al. 2007). These
findings indicate that hackers are able to manage their nerves
in the face of great potential risks they engage in.
An assessment of cybercrime research by Holt and Bossler
(2014, p. 33), has showed three kind findings that we build on:
(1) that there is a considerable increase in scientific contribu-
tion on various forms of cybercrime; (2) that traditional crim-
inological theories generally hold in the online context; but,
also (3) that there are still important new avenues for research
to explore, and especially to further examine “breadth of
existing and recent criminological theory to expand our
knowledge of cybercrimes.” Notably, existing knowledge on
hacker’s motivations, ranging from political or religious rea-
9. sons (Holt 2009) to money, entertainment, ego, cause, en-
trance to a social group, and status (The-Honeynet-Project
2004), is relatively well researched. However, little to no re -
search on hacker’s demographics, psychological predisposi-
tions, and social/behavioral patterns exists (Schell and Holt
2009). We position our research within the psychological
boundaries in which emotional states and fear management
are taking roots. This positioning is guided by the theoretical
input that we detail in the following section.
There are several theories, originating from the criminolo-
gy field, that fit well into the hacking context, such as self-
control theory (Gottfredson and Hirschi 1990), RAT (Cohen
and Felson 1979), situational action theory (Wikström 2004,
2006), or even theories borrowed from economics (Kshetri
2006; Leeson and Coyne 2005). However, due to the different
context in which they operate, compared to other crime con-
texts where physical violence is usually present, we argue that
there is a need to apply different theoretical insights to support
the underlying premises. Hackers do not always operate
rationally—especially in terms of operating through costs,
benefits, and sanctions—as economic theories would suggest
(Yar 2005). Something else is driving them and allows them to
suspend threat of sanctions that most people would perceive.
A lack of empirical studies to validate the applicability of
certain theories in the hacking milieu and with known hackers,
suggests that different theoretical premises should be incorpo-
rated into the theoretical foundation, when studying hacker’s
behaviors. We address this mystery.
To guide the interpretation of our grounded theory re-
search, we rely on the general strain theory (Agnew 1992)
and RAT (Cohen and Felson 1979). General strain theory
argues that negative emotions can lead to anger and frustra-
tion, where individuals experiencing strains or stressors en-
gage in crime to escape from those stressors. These negative
10. emotions are particularly important in the hacking context as
they could be a source of inspiration for illegal behavior.
Several specific strains are advanced in the theory such as
the failure to achieve positively valued goals (e.g., money)
or the presentation of negatively valued stimuli (e.g., political
motives such as injustice related to different causes) (Patchin
and Hinduja 2011). The first strain is about unmet expecta-
tions of individuals that leads to disappointment. The second
strain is a response to the negatively valued stimuli in which
Inf Syst Front
individuals look for avoidance, leading to negative and illegal
activities such as hacking. Finally, these negative emotions
call for a way to relieve one’s internal pressure. According
to Patchin and Hinduja (2011) when people cannot achieve
their goals then strain will be experienced, which can then
cause them to turn to crime. Typically, this path to the criminal
behavior can be seen among black hat hackers where failure to
achieve positively valued goals, such as financial remunera-
tion, leads to the criminal behavior.
RAT suggests that crime commitment is the result of an
opportunity, highlighting “the convergence of motivated of-
fender, suitable target, and the lack of a capable guardian at
a particular place and time as the core elements necessary for
a crime to occur” (Groff 2008, p.99). Motivated offenders are
individuals or groups that have the ability and motivation to
commit a crime for various reasons. Guardianship refers to
the ability to intervene into a crime (i.e., the hacking activity)
and consequently, prevent it. Importantly, in our virtual
cybercrime context, the concept of physical proximity is re-
moved (Yar 2005). Consequently, the applicability of RAT to
cybercrime is even more relevant because victims are placed
11. in the “virtual proximity” to motivated offenders. That is,
opportunity for black hat behavior is increased because it is
easier for motivated offenders to find victims because they do
not have to be physically proximate. Typically, the risk is
greatly increased in online situations in which individuals
demonstrate higher amounts of time spent online, higher use
of internet banking or online purchases, and have overall more
risky online behavior. Furthermore, RAT provides an expla-
nation that in absence of capable guardianship, the costs of
committing the crime are relatively low, which then increases
the benefits. Capable guardians are usually translated into lack
of security measures such as lack of antivirus, low malware
protection, or inadequate network security in the organization-
al context (Reyns 2013). In all these situations, higher victim-
ization can be expected as a consequence of a lack of actions
on the victim’s side. Consequently, the costs for hackers to
perform illegal activities are relatively low as they have to
invest much less of resources to conduct hacking.
Thus, it is one thing to be angry and have a general moti-
vation for criminal hacking—a necessary but insufficient start
from general strain theory—but a potential hacker needs a
suitable target for which they can believe they can reasonable
hack to express their anger—it cannot be just any target.
Meanwhile, the “capable guardian” component of hacking is
especially crucial in calculating the risks and uncertainties. As
illustration, suppose a hacker is angry by the US government’s
policies and activities in the Middle East. Unless the hacker
has unusual capabilities, and a network of similarly minded
hackers, he/she probably would not consider hacking the
Pentagon’s computers to be a realistic target or one for which
he/she could manage his/her nerves. This is because the
“guardians” (and associated technologies) that protect the
Pentagon’s computer are among the best in the world.
Instead, it would be more realistic to hack a regional newspa-
12. per website that is considered pro-US in its coverage.
Overall, general strain theory explains that different strains
are impacting hacker’s emotional state motivating him/her to
crime, whereas RAT explains the crime context in which the
“virtual proximity” is the main facilitator of the criminal be-
havior. Applying these theoretical lenses in our context, black
hat hackers, when committing a cybercrime where costs and
benefits of their acts are evaluated, manage their nerves dif-
ferently than other more standard types of crimes (e.g. drug
smuggling). In the next section, we conceptualize nerves and
discuss nerve management from a hacker’s perspective.
2.2 Nerve Management
In this section, we explain how nerve management works for
hacker’s in respect to both general strain theory and RAT.
Overall, nerve management can be a useful technique that
hackers can use to intervene into their cognitive reasoning to
moderate and mitigate the fear that they may experience dur-
ing their criminal acts. Nerve management is about managing
the uncertainty and providing more clarity to their own
decision-making space they create in their psychological and
mental states when they engage in criminal activity. However,
the technical knowledge (higher or lower) to hack in the sys-
tem may not be enough to “manage the intense emotions
brought on by crime, while maintaining some minimal level
of composure” (Cherbonneau and Copes 2006, p.206). This is
because without proper nerve management, it may not be
possible to succeed in accomplishing the crime. Ironically, this
may be why many black hat hackers eventually become white
hat hackers. In a hacker’s context, the manifestation of nerves
occurs when hackers engage in risky illegal behaviors (e.g.,
illegally obtaining data, penetrating a target system, acquiring
unauthorized access, and the like). Such risky and illegal ac-
tivities can lead the hacker to be recognized by their peers
13. (Levy 2001). However, many such hackers actually care about
potential negative outcomes arising from their acts. For some
hackers, it is not acceptable to ask for any ransom or to behave
in an unethically acceptable way—leading to what is referred
to as “white hat” hacker behaviors. It is evident that in all of
these situations that emotions play an important role.
This criminal context in which negative emotions can lead
to anger and frustration is well explained by the general strain
theory (Agnew 1992). Strain theory explains that “When le-
gitimate solutions are not available, non-economic strain re-
sults in non-compliant behavior (Agnew 1999)” (Wall et al.
2016, p. 51). Such non-economic strains are typically stressors
like anger and negative emotions, and deviance is a way of
dealing with or escaping from these stressors (Agnew 1999).
Crucially, the relationship between emotions and nerve man-
agement needs to be better understood as the concept of
Inf Syst Front
nerves is closely related to negative emotion (Jacobs and
Cherbonneau 2017), which is a consequence of an anger frus-
tration situation. This anger/frustration dimensions, the core
premise of general strain theory (Agnew 1992, 1999), suggest
that an offender will rely on these two factors to build the
negative emotion and will, in turn, commit a crime.
Meanwhile, RAT theory argues that criminal behavior is
the result of an opportunity. Although crime can be attractive
to commit (Katz 1988), there is often an explanation for crime
accomplishment because it provides an opportunity to commit
an illegal act due to the absence of capable guardian (Reyns
2013) or simply due to the ‘virtual proximity’ context in
which hacking is greatly facilitated.
14. Research explains that nerve develops as part of the group
process, in which peer pressure is usually high (Hochstetler
2001). This leads to the negative act commitment by all indi -
viduals who are part of the group (Hochstetler 2001). This is
typically true in the black hat context, because hackers within
the same hacking group will want to show to their ‘peers’ that
they can handle their nerves and commit an illegal act. This
allows them to gain recognition and get access to a larger
community, since they were able to deliver on their acts by
demonstrating strong technical skills and knowledge. As illus-
tration, “one of the most effective ways of gaining respect is to
manifest nerve. A man shows nerve by taking another person’s
possessions, messing with someone’s woman, throwing the
first punch, ‘getting in someone’s face,’ or pulling a trigger”
(Anderson 2000, p. 92).
Thus, to these hackers, nerve management becomes a key
goal or objective, so that they can prove their abilities to the
greater group (Hochstetler 2002). This process appears to be
happening frequently, with repetitive phases, where offenders
demonstrate “a sense of ‘being on autopilot’ or ‘on automat-
ic,’ as they proceed from target to target” (Hochstetler 2002,
p. 63). It is not surprising that many black hat hackers use
security tools (e.g., Metasploit Framework or nmap) to try to
hack in an automated way. We also note that many hackers do
not use out-of-the-box tools, but rather develop custom tools
and approaches that can be difficult to detect by modern anti -
virus or other security tools. Regardless of the approaches
used, hacking has become shockingly ubiquitous: A typical
Web server on the Internet is attacked more than a quarter of a
million times in a day (Vaughan-Nichols 2018).
3 Method
Again, our study used a qualitative research method based on
15. grounded theory (Corbin and Strauss 2008). Grounded theory
aims at uncovering social relationships and behaviors of
groups, known as social processes (Crooks 2001).
Importantly, by uncovering these processes, theory emerges
from the data through an incremental and systematic approach
(Parks et al. 2017; Urquhart et al. 2010). Grounded theory is
particularly useful for deeply examining emerging issues
caused by new sociotechnical phenomenon (Parks et al.
2017). Consequently, grounded theory has been used effec-
tively in several hacker related studies (e.g., Turgeman-
Goldschmidt 2005; Turgeman-Goldschmidt 2008), in which
the outcome of the grounded theory is “a social construction
of the social constructions found and explicated in the data”
(Charmaz 1990, p. 1165).
Our data was collected from in-depth interviews (Table 1)
with 16 black hat hackers. Since one of the paper’s authors
was a former white hat hacker, we had easier access to the
initial sample of seven black hat hackers, who when asked,
suggested 11 informants. All of the interviewees contacted
were black hat hackers who had committed at least one illegal
act during their hacking career. Institutional Review Board
(IRB) approval of the primary investigator was obtained prior
to the project start to remove any possible ethical concern
related to this project. Other recruitment criteria included the
following: 1) the hacker is still active (did not switch to white
hat); 2) the hacker is part of a group and does not act on their
own (this makes it easier to verify if the hacker really belongs
to a specific hacking group and is what he/she claims to be)
and 3) the hacker is “present” for more than six months (we
wanted to exclude novice and inexperienced hackers). We
removed two informants that did not meet all of these criteria.
To increase the likelihood that the participants were legiti -
mate black hat hackers, we conducted ethnographic observa-
16. tions on the Internet sources (e.g., forums) that were revealed
by participants during the interview. This was done to increase
the likelihood that no fake participants were interviewed but
also to make sure that the claims advanced by participants
(such as being black hat hacker) were true. By analyzing posts
and interactions present on the identified sources were able to
accurately confirm hacker’s background and their claims (al -
though we anonymized hackers real names/nicknames in the
paper, the ethnographic investigation was done using their real
pseudonyms).
The mean age for respondents was 22, with a range from 18
to 25 years of age. Detailed demographics are presented in
Table 2.
All of the interviews were semi-structured (they took place
between January 2017 and February 2018) and followed an
open-ended approach. The interviews were between 42 and
61 min long (an average of 55 min). Due to the sensitive
nature of the topic and since all interviewees wanted to pre-
serve their complete anonymity, all of the interviews were
conducted through secured fully encrypted communication
(most of the time using skype). Interviewees did not receive
any financial compensation for their participation (this was
expected, since hacking involves showing to others their ac-
complishments through a “feeling of power” that hackers
want to express (Leeson and Coyne 2005). All of the
Inf Syst Front
interviews were recorded. Four interviewees decided to
scramble their voice to minimize any potential identification.
The interview guideline (Appendix A) was pretested with one
information security professional and one white hat hacker.
17. Minor modifications were implemented to better formulate
questions. The interview started with some generic questions
for the participants, asking them their hacker name, how they
became hackers, etc. The interview then focused on their mo-
tives to commit criminal activities and the way they manage
their nerve, fear and emotions (e.g., a sample question we
asked was: “Can you describe how you feel in the presence
of a threat to be caught?” or “Are you afraid to be arrested by
the police?”). The names the hackers used were not secret, and
thus the interviewees did not have any objections against our
using them. Therefore, in the following sections, we refer to
their actual publicly available names.
Following Strauss and Corbin (1994)‘s recommendations
on conducting grounded theory building, we first started with
initial open coding.. We proceeded with an axial coding by
reducing and clustering different categories that we identified.
Finally, we conducted selective coding by detailing and
selecting the identified categories. In particular, we used
nVivo software (nVivo is a graphical qualitative data analysis
computer software package) to analyze the qualitative data,
identify different information, patterns, and relationships pres -
ent in the interviews. We combined or analyzed different cat-
egories and subcategories based on their relationships and
then tested the theoretical propositions by referring back to
the data. For example, we grouped different ideas based on
general behavior patterns that emerged from interviews and
the corresponding hacking activities that participants detailed
during the interview process.
3.1 How Are Hackers’ Nerves Managed?
In a typical crime situation, fear behind the act of committing
the crime is associated with increased heart rate, faster breath-
ing (Warr 2000) or the release of adrenaline into the blood.
Physical agitation accompanied by nervousness, decrease in
18. body temperature, mouth dryness or even psychological sig-
nals such as anger, frustration, outrage, are the main signs of
fear (Ferraro and Grange 1987). Fear can be seen as “an in-
hibitory emotion” that should, in most cases, prevent and mit-
igate criminal offenses (Topalli and Wright 2013, p. 52).
Because the emotion of fear drives deterrence (Beccaria
2009), it is expected that the perceived risk of getting caught
or sanction risk will be the result of the fear (Gibbs 1975). For
Cusson (1993, p. 55) “fear is obviously at the heart of deter -
rence,” but “is not a calculated risk.” It would, therefore, be
expected that hackers behave the same and manage their
nerves accordingly. However, hackers are a different type of
offender, since they are usually hiding their identity behind
their computers. Therefore, they are usually not facing the
victim, as is the case with street crimes. It is still expected that
the fear generated by the thought of the possibilities of appre -
hension, would influence the way nerves are managed in the
hacker’s mind. However, in reality, the way this cognitive
process is managed is different from other criminal situations
(e.g., robbery).
3.1.1 From Cognitive Distortion to Broken Windows: Shunting
and Minimization Techniques
Cognitive distortion refers to rationalizing attitudes, beliefs or
thoughts about one’s own or other’s social behavior (Barriga
Table 1 Interview details
Hacker (name) Interview length (min) Age Hacking focus
Hacking life (in years)
Voodoo 45 22 - Phishing / Denial of Service 5
Phantasm 58 23 - ClickJacking Attacks 2
Trinity 54 25 - Malware, Virus, Trojan 4
19. [email protected] 58 24 - System penetration / intrusion 3
LucNb 54 21 - System penetration / intrusion 6
NotoriusX 61 24 - Malware, Virus, Trojan 8
NbG 42 23 - Ransomware 5
JustiX 57 24 - Phishing / Denial of Service 8
Mr.trojan 60 22 - System penetration / intrusion 7
Crypto 59 23 - Social engineering 6
Hig Hacker 48 18 - Stealing financial data 3
B14D3 49 19 - Phishing / Denial of Service 4
M3M0RY 59 25 - Phishing / Denial of Service 9
Mr Binary 57 22 - Phishing / Denial of Service 4
Yuliux 55 20 - Ransomware, Malware 5
White Devil 60 20 - System penetration / intrusion 6
Inf Syst Front
and Gibbs 1996). In the hacking context, a particularly suit-
able cognitive distortion is minimizing or mislabeling, where
the antisocial behavior is followed by the mentality where the
offender believes that no harm is really done, and that his/her
actions can even be seen and accepted as admirable. When
20. asked how they felt about their acts, whether it is something
they consider to be dangerous, illegal or criminal, they all
expressed the same feeling that it was a ‘non-violent’ act
which did not harm anyone. For example, Voodoo said:
“…this is just harmless exploration. It's not a violent act
or a destructive act. It's nothing.”
Phantasm explained that his/her acts are not violent at all,
since it is all about learning:
“Not at all. Well, first of all, I was just looking around,
playing around. What was fun for me was a challenge to
see what I could pull off.”
All of the interviewees confirmed the belief that there was
nothing really wrong in what they were doing. The cognitive
tactic employed in this context can be referred to as shunting.
This is similar to but slightly different from neutralization
(Sykes and Matza 1957). Shunting involves only thinking
about the positive outcomes and putting aside any fear that
may arise from the action (Jacobs and Cherbonneau 2017).
Lord Nikon explained that he/she is not even thinking about
any negative consequences. He/she sees it as something pos-
itive, where he/she will get a new ‘power’ through his/her
acts:
“Well, it's power at your fingertips. You can control all
these computers from the government, from the military,
from large corporations. And if you know what you're
doing, you can travel through the internet at your will,
with no restrictions. That's power; it's a power trip.”
Trinity has a slightly different view when asked about what
he/she considers to be illegal:
21. “At the first time when I came into the headlines for my
breach…, I was a little bit afraid that I was getting
caught…I did not leak all the database only a little bit
to make them aware of it. If it's legal? In my opinion, it is
legal when you only leak a little bit database to make
them aware of it.”
Several others confirmed Trinity’s position that only doing
[leaking] a little is not a problem. This sort of minimization
technique is an interesting method that hackers use to cogni -
tively minimize the severity of their acts.
Another interesting method used by hackers has its origins
in the Broken windows theory (Wilson 2003), which suggests
that policing methods that target minor crimes are welcome.
This is because a fast reaction will most likely prevent bigger
crimes to happen. However, these “minor” crimes in the
hacking milieu are usually not sanctioned. This provides jus-
tification for hackers to continue with their acts, which could
lead to more harmful actions. One hacker explained that
risks are low, as the cost of their acts is also low.
Therefore, they do not expect the police to chase them
for small losses. [email protected] commented:
[It seems like a lot of risk for the $2K you've made so
far]”...Well, that is publicly. And in less than a month. It
is no risk for me, as they can't do anything. Like I said,
quick easy cash in about a month.”
Another hacker explained
“I’m never hacking a company based in my country – no
police will come and take me down for such a small cost
– If I steel few millions, it would probably be different –
but I’m cautious about the amount.”
22. Clearly, nerves are managed through calculated risks that each
hacker weighs to understand possible gains and losses,
but this ‘calculation’ may not be as rational as the hack-
er believes it to be. This behavior can be associated to
bounded rationality, as seen in security contexts in gen-
eral (e.g., D’Arcy and Lowry 2019), because the decisions
hackers make are ‘bounded’ by their cognitive limitations
and also influenced by their emotions. As illustration, one
hacker (LucNb) boldly claimed that
“only inexperienced or novice hackers do not pay atten-
tion to the risks vs fear to get caught – so they make
errors and cross the line...I never do that.”
3.1.2 Plan B, Thrill and Lens Widening Techniques
Interestingly, most of the interviewed hackers claimed that
they do not worry too much about being apprehended, wheth-
er their illegal acts are small or large. The majority of the
interviewees claim to have some sort of a backup plan. For
example, Trinity said
Table 2 Demographics
Summary Variable Mean Value Standard deviation
Mean age 22 2.0
Average interview length (in min) 55 5.5
Average hacking life (in years) 5.3 1.92
Inf Syst Front
23. “Well, it is a little more complicated than that, but I have
plans in case something happens.”
Others also highlighted that they usually have a backup plan,
in case things go wrong. They emphasized the importance of
having a Plan B. For example, [email protected] explained:
“I’m not afraid. In case something goes wrong – I’m
ready and I know what I will do…I don’t worry so
much.”
This ‘Plan B scenario’ thinking is important in nerve manage-
ment. Having a Plan B, reduces the psychological discomfort
associated with uncertainty (Shin and Milkman 2016). It not
only it drives a hacker’s state of mind regarding removing or
mitigating the risk factors, it also contributes to a better focus
on the Plan B scenario. These hackers feel more comfortable
in the way their nerves are managed, since they do not fully
perceive the inherent risks. This is because they convince
themselves they are somehow “secured” by the Plan B sce-
nario that they have put in place. However, when hackers were
asked what exactly their Plan B is, most of the them gave a
vague and unclear answer. Several of them did not want to
clearly explain their back up plan. A few others tried to ex-
plain it, but their answers were generic. As illustration, one
noted that his/her plan B is:
“I will co-operate and turn to white hat hacker…I’m
sure I will not go to prison not pay any penalties…this
is anyway not big deal…I did not harm to anyone.”
Another important technique used by hackers to manage their
nerves is experiencing the thrill. Thrill corresponds to a social
entertainment method used by hackers to satisfy their inner
psychological needs (Turgeman-Goldschmidt 2005). Thrill is
24. a positive, powerful emotion that they thus use to cover up the
natural fear that should be resulting from the huge risks they
are taking. For example, NotoriusX commented:
“I was just in it for the thrill” and Ley2x added “To be
honest, there is a thrill in knowing that what I do would
be illegal except for a legal document that says I’m
allowed to do it without getting in trouble.”
Hiding behind the thrill, provides an opportunity for hackers
to go after novelty and intense sensations, as a result of achiev-
ing their goal (e.g., breaking into a system). This pursuit of
new experience for its own sake, despite the risks, shows how
nerves can be more effectively managed.
Lens widening refers to a technique, in which offenders
believe that their acts are not that dangerous (Jacobs and
Cherbonneau 2017). This allows them to believe that there is
really no reason to be nervous. It is a “bigger picture” view, in
which offenders compare their acts against other illegal activ-
ities and by doing so, they attribute a lower score to the seri -
ousness of their acts. For example, NbG explained:
“what I do is nothing; there are people that get killed
daily and all I do is just sneaking around a bit and
looking what is behind the curtain; the risk of getting
caught is minimal…I will not go to jail for that.”
A similar behavior can also be found in neutralization theory
via the ‘denial of injury technique,’ in which an offender in-
sists that his/her actions did not cause any meaningful harm or
damage (Sykes and Matza 1957).
Another hacker added that most of the time hacking acts do
not get reported. This is because companies are afraid of the
25. impact that the hacking may have on their image. This sup-
ports the lens widening view of the majority of the inter-
viewees, who highlighted that their acts are rarely reported.
When they are reported or when an investigation takes place,
they seem to be “protected” by the gravity of their acts, which
in their view, is not that high. Consequently, they should not
be punished or risk some more serious consequences. This is
because there are so many more serious crimes, compared to
their hacking activities. They serve a good cause, as explained
by JustiX:
“all I do is to help companies…when I find a bug I to
send them an email informing them about my findings…
of course, I learn a lot from their security issues…and I
will not get caught – why should I? I just helped them by
informing them about the security vulnerability I
discovered.”
4 Discussion
Our study used grounded theory building approach, supported
by the theoretical lens we applied from general strain theory
(Agnew 1992) and RAT (Cohen and Felson 1979), to better
understand the theoretical importance of nerve management
by black hat hackers. In particular, we sought to understand,
through theory building process, how black hat hackers man-
age their nerves and which techniques they use in their
decision-making process before and after committing a crime.
Drawing from a sample of 16 hackers, we investigated how
hackers manage their nerves during illegal hacking activities.
According to Jacobs and Cherbonneau (2017), nerves and
nervousness are recognized but relatively understudied parts
of the offender decision-making process. In that context,
“nerve management is, therefore, best considered to be an
intervening exercise in the threat perception process, that
26. moderates the fear-offending relationship through its effect
on nervousness” (Jacobs and Cherbonneau 2017, p. 14).
Inf Syst Front
Through our grounded theory study, we identified five broader
techniques that hackers use to better manage their nerves,
including: shunting, minimization, Plan B, thrill and lens wid-
ening techniques.
As can be seen from the five techniques described earl ier,
these hackers are essentially trying to trick themselves to bet-
ter manage their nerves by implementing different strategies
that should help them better cope with the threat. All of the
identified techniques have a common purpose, which is to
minimize the fear of sanctions, in such a way that offenders
feel better and minimize the threat-perception process.
From a theoretical perspective, our research offers several
new insights. First, we addressed the calls to further investi -
gate black hat research (Mahmood et al. 2010) to better un-
mask the mystery of the hacker world (Crossler et al. 2013),
by gaining access to real known hackers as the subjects of our
study. This addresses one of the primary challenges in the
hacking research. By doing so, we contribute to expanding
the existing theoretical basis of general strain theory (Agnew
1992) and RAT (Cohen and Felson 1979), by highlighting
theoretical justifications that each of these theories offer to
better understand hacking in a nerve management context.
In particular, the stressors that hackers experience are impor -
tant factors that drive their emotional states. Also, the “virtual
proximity” together with absence of capable guardians pro-
vide explanations of why hacking is unique as a criminal
activity and highlights the importance of these two dimen-
27. sions for research and prevention. We further propose newly
uncovered techniques that contribute to the frustration or an-
ger phenomenon, which is occurring in the hacker’s mindset.
All five techniques (i.e., shunting, minimization, Plan B, thrill,
and lens widening) contribute at different levels, to better
manage nerves when experiencing strains or stressors. These
techniques are well-positioned within past research that has
called to further understand the psychological predispositions
behind criminal acts (Schell and Holt 2009), and in particular,
the emotional states of hacker’s minds. In such a context, our
findings bring new theoretical insights on top of the already
established criminological theories. This adds new dimension
to the existing cybercrime knowledge which was in need of
better understanding of hacker’s motivations and the applica-
bility of traditional theories of crime to virtual offenses (Holt
and Bossler 2014).
Because negative emotions influence the way nerves are
managed, emotions are better controlled in the presence of
shunting or minimization techniques. This is because of-
fenders will try to escape reality and try to minimize or shed
their negative thoughts and emotions. Parallel to that process,
as suggested by RAT, crime is the result of an opportunity, in
which the motivated offender will create Plan B and will use
his/her thrill and lens widening techniques to control the fear.
As a result, they will be better able to manage their nerves.
That is, hackers are weighing costs and benefits and use the
suitable technique to reduce and minimize the negative out-
comes in their minds. However, the hackers are deluding
themselves somewhat as in reality they are operating with
‘bounded rationality’ influenced by emotions, and do not fully
rationally calculate costs and benefits. This process results in
unconscious decisions that downplay the risks and increase
benefits, such as: “there is no big risk in getting caught”;
“Plan B exists and will save me if I get into trouble”; or,
28. “This is a small act that I’m doing…it’s no big deal in reality.”
This sheds light on the inner motivational states that hackers
are going through, when trying to manage their nerves more
effectively.
Our research thus offers valuable new insights on the psy-
chological reasoning in the hacker’s decision-making process,
during their crime life cycle. By using different techniques,
hackers are indirectly trying to convince themselves that their
acts, which are digital crimes, are not as important as other
physical crimes (e.g., robbery). Therefore, they delude them-
selves into thinking that the inherent risks cannot be the same
and should not be seen in the same way. This is an important
insight, since it suggests that the seriousness of their acts is not
clearly understood, communicated, or explained. Notably, we
contribute to having a clearer understanding of a hacker’s
cognitive profile, which should contribute to a better under -
standing of hacker’s criminal actions and behaviors.
Although, this may not be the perfect representation of the
black hat hacker as even within the same hacking group there
are notable differences in their skills and abilities to conduct
hacking (Holt and Bossler 2014; Holt et al. 2012) our study
provides some initial insights into psychological structure of
hacker’s motivational states.
Notably, some of the interviewees eventually recognized
the gravity of their acts, but only after having negative expe-
riences with the police. We thus argue that policy makers (e.g.,
government officials, legal and justice system policy makers)
should learn from this when building and defining criminal
laws in respect to hacking. Part of the issue here is that author -
ities need to change the calculus that hackers apply to their
nerve management, such that they see greater risk and fear,
and thus are less likely to have the nerve to go through with
the act. Here, broadly warning and communicating potential
hackers of specific and severe consequences for specific types
29. of hacking, versus vague consequences would be a step for -
ward. Crucially, this communication needs to be reframed
from the typical obscure legalese of lawyers to the actual lan-
guage used by hackers.
For these reasons, they should try to better communicate
not only the risks for hackers, but also the harm of the hackers’
acts for their victims —not only for companies but also for
people’s lives whose data is exploited (such as their privacy
and identity theft). Moreover, they should communicate the
monitoring and policing efforts they are doing, especially on
the dark Web, to increase a sense of ‘guardianship’ to decrease
Inf Syst Front
the hacker’s belief they are anonymous and cannot get caught,
or that if they do get caught it will actually be a ‘big deal.’
Better communication and sensibility toward the hacking
community should thus create positive effects in mitigating
hacker’s criminal objectives and goals. Education can be lev-
eraged in which ex- black hat hackers could be used to spread
the message and teach new and existing hackers on the pos-
sible consequences of their crimes. Highlighting the fact that
there are small or large acts, could be one opportunity to be
explored by the policy makers. It would strengthen the mes-
sage that no matter how small the financial impact can
be, the hacking crime can have similar consequences in
terms of the sanctions and punishment, as the other
types of crimes. Also, policy makers need to understand
this activity as more than mere “hacking” but under-
stand it can involve identity theft, stolen currency, dis-
abling mission-critical systems that not only can lead to
devasting economic consequences but can threaten human life
(e.g., traffic control systems, industrial control systems, utility
30. systems, military systems.
Furthermore, it is important to explain to hackers that their
Plan B is not what they think of. In reality, Plan B is usually
going to prison or paying high fines. Interestingly, this area of
justice system was highlighted by Holt and Bossler (2014) as
being one of the important areas that should provide
more insights on how the courts and correctional system
should react when confronted to cybercrime situations.
In particular, Plan B, in this context, should be correctly
positioned within the correctional system to account for
the recent evolution and past experiences of offending
through technological means. Further understanding of
this relationship of two opposite sides, offender vs jus-
tice system, we could further “understand how the larger crim-
inal justice system is responding to cybercrimes at all levels”
(Holt and Bossler 2014, p. 34).
Moreover, this improved communication can come from
those who actively manage and protect servers. The calculus
is clearly different in considering hacking a Pentagon comput-
er versus the Web site of a small-town newspaper. Here, per-
ceptions of the strength of the US government may be just as
important as the actual strength of the guardianship and tech-
nologies involved protecting the computers. Thus, one ap-
proach for lesser-known entities would be to leverage the rep-
utation and explicitly communicate the guardianship of a
better-known entity (e.g., IBM, Oracle).
Future research could further extend our initial findings on
the importance of hackers managing their nerves and fear in
such a way that future studies could, for example, study the
passage from black hat (illegal) crimes to white hat (ethical
hacking) activities. This could provide some new insights on
how the hacker’s inner psychological motivations are driven
and what motivates them to become good one day. Our re-
31. search is also limited by the fact that we could not verify with
100% certainty that the hackers we interviewed are who they
pretend to be; however, we did conduct ethnographic obser-
vations to verify the participants’ hacker identity and their
behaviors as ‘black hat.’ Unfortunately, we could not collect
any detailed demographics about the interviewees, due to the
nature of their activities. This is a substantial challenge when
studying any serious criminal behavior. Another challenge
relates to the actual definition of the black hat hacker.
Although provide a definition in this paper, in reality, the
definition of who exactly is and is not a black hat hacker is a
challenging topic that is not easy to address. Finally, as
motivations of black hat hackers can be different ones
ranging from state-sponsored attacks to hacktivism, the
way their nerve is managed can also be impacted dif-
ferentially. For example, if a black-hat hacker is sup-
ported by a State and a large group of professional
hackers, their nerve management calculus is going to be quite
different than for a lone black-hat hacker. Thus, future re-
search should look at nerve management for these different
kinds of motivations.
Overall, in this research, we have investigated the theoret-
ical importance of nerve management in the unique hacking
decision-making offender context. We contribute to the cur-
rent state of cybercrime scholarship by providing new theo-
retical insights into the complex psychological and motiva-
tional reasoning behind hacking illegal activities. In particular,
we identified five cognitive and presentational tactics that
black hat hackers use to shape their nerve management.
This has important implications on how the perception
of threat is managed and provides important insights on
why hacking, as one type of the crime, is differently
approached and management from emotional and fear
perspectives when compared to more traditional crime
32. contexts (e.g., street crime). These insights provide valuable
insights to different stakeholders (e.g., legal and justice sys -
tem) which should benefit from our findings as it suggests
how fear, and consequently nerve, is managed in the unique
hacking context.
5 Conclusion
Our study investigated how black hat hackers manage
their nerves when conducting crime activities. We iden-
tified five techniques they use: shunting, minimization,
Plan B, thrill, and lens widening techniques. Each of
these techniques helps hackers to better manage their
nerves and consequently, learn how live with their fear.
During their psychological decision-making processes,
hackers turn to these five techniques to create a new
mindset. It allows them to hide with the objective of minimiz-
ing and mitigating the inherent risks they incur during their
criminal activities.
Inf Syst Front
Appendix 1: Interview Guideline
Introduction
The interview will not take more than 1 h. I will be recording
the session because I don’t want to miss any of your
comments. All comments and responses will be kept
strictly confidential which means that your responses
will be shared only with research team members and
will ensure that any information from the report does
not identify you as the respondent. Do you have any questions
at this stage?
33. Introductory questions
1. Can you tell us your name (hacker nickname), gender and
age?
2. Can you briefly describe who you are and when you
started to hack?
3. Can you confirm which type of hacker you are and what
does that mean to you?
About Hacking
4. Can you provide more information your hacking debuts
and how did you learn?
5. What motivates you to hack? What attracted you to black
hat hacking?
6. Is what you do illegal?
7. What is the scope of your hacking activities? On which
online sites (e.g., forums) you are active?
Hacking vs Fear
8. What is your perception regarding risks behind hacking
activities? Please explain.
9. How do you see the criminal side related to your activi-
ties? Please explain.
10. Do you worry about being apprehended? Please explain.
11. Do you have any backup plans? Please explain.
12. Do you have any bad feelings when hacking? Please
34. explain.
13. How do you manage your fear? Please explain.
Outlook / Interview Closing
14. What are the challenges in doing the hacking job? Please
explain.
15. How do you see your future in hacking? Please explain.
Interview closing
a) Would you like to add anything else?
b) If not, I will analyze all informa tion provided together
with other interviews in the following weeks and would
be happy to send you a copy to review if you are interest-
ed. Thank you very much for your time!
General probes used during the Interview
& Would you give me an example?
& Can you elaborate on that idea?
& Would you explain that further?
& I’m not sure I understand what you’re saying.
& Is there anything else?
References
Agnew, R. (1992). Foundation for a general strain theory of
crime and
delinquency. Criminology, 30(1), 47–88.
Agnew, R. (1999). A general strain theory of community
differences in
35. crime rates. Journal of Research in Crime and Deliquency,
36(2),
123–155.
Anderson, E. (2000). Code of the street: Decency, violence, and
the moral
life of the inner city. New York, NY: WW Norton & Company.
Bandura, A., & Walters, R. H. (1977). Social learning theory.
New York,
NY: General Learning Press.
Baron, S. W. (2004). General strain, street youth and crime: A
test of
Agnew's revised theory. Criminology, 42(2), 457–484.
Barriga, A. Q., & Gibbs, J. C. (1996). Measuring cognitive
distortion
in antisocial youth: Development and preliminary validation of
the “how I think” questionnaire. Aggressive Behavior, 22(5),
333–343.
Beccaria, C. (2009). On crimes and punishments and other
writings.
Toronto Buffalo, London: University of Toronto Press.
Benjamin, V., Li, W., Holt, T., & Chen, H. (2015). Exploring
threats and
vulnerabilities in hacker web: Forums, IRC and carding shops.
Paper presented at the 2015 IEEE international conference on
intel-
ligence and security informatics (ISI), Baltimore, MD, USA.
Benjamin, V., Zhang, B., Nunamaker, J. F., Jr., & Chen, H.
(2016).
Examining hacker participation length in cybercriminal
36. internet-
relay-chat communities. Journal of Management Information
Systems, 33(2), 482–510.
Benjamin, V., Valacich, J., & Chen, H. (2019). DICE-e: A
framework for
conducting darknet identification, collection, evaluation with
ethics.
MIS Quarterly, 43(1), 1–22.
Blackburn, R. (1993). The psychology of criminal conduct:
Theory, re-
search and practice. Oxford, England: John Wiley & Sons.
Chandler, A. (1996). The changing definition and image of
hackers in
popular discourse. International Journal of the Sociology of
Law,
24(2), 229–251.
Charmaz, K. (1990). ‘Discovering’chronic illness: Using
grounded theo-
ry. Social Science & Medicine, 30(11), 1161–1172.
Cherbonneau, M., & Copes, H. (2006). ‘Drive it like you stole
it’: Auto
theft and the illusion of normalcy. British Journal of
Criminology,
46(2), 193–211.
Inf Syst Front
Cisco. (2018). 2018 Annual Cybersecurity Report. Retrieved
from https://
37. www.cisco.com/c/en/us/products/security/security-reports.html.
Accessed 13 Jan 2018
Cohen, L. E., & Felson, M. (1979). Social change and crime rate
trends:
A routine activity approach. American Sociological Review,
44(4),
588–608.
Corbin, J., & Strauss, A. (2008). Basics of qualitative research:
Techniques and procedures for developing grounded theory. In
London: Thousand oaks. CA: Sage.
Cornish, D. B., Clarke, R. V., & Wortley, R. (2008). The
rational choice
perspective (Vol. 21). Cullompton, UK: Willan Publishing.
Crooks, D. L. (2001). The importance of symbolic interaction in
ground-
ed theory research on women's health. Health Care for Women
International, 22(1–2), 11–27.
Cross, T. (2006). Academic freedom and the hacker ethic.
Communications of the ACM, 49(6), 37–40.
Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q.,
Warkentin, M., &
Baskerville, R. (2013). Future directions for behavioral
information
security research. Computers & Security, 32, 90–101.
Cusson, M. (1993). Situational deterrence: Fear during the
criminal event.
Crime Prevention Studies, 1, 55–68.
D’Arcy, J., & Lowry, P. B. (2019). Cognitive-affective drivers
38. of em-
ployees’ daily compliance with information security policies: A
multilevel, longitudinal study. Information Systems Journal,
29(1),
43–69.
Davis, R. W., & Hutchison, S. C. (1997). Computer crime in
Canada: An
introduction to technological crime and related legal issues.
Canada: Carswell Legal Publications.
Deci, E. L., & Ryan, R. M. (2010). Self determination theory
Corsini
Encyclopedia of Psychology. Online: Wiley Online Library.
EY. (2018). 21st EY Global Information Security Survey.
Retrieved from
https://www.ey.com/Publication/vwLUAssets/ey-global-
information-security-survey-2018-19/$FILE/ey-global-
information-security-survey-2018-19.pdf
Ferraro, K. F., & Grange, R. L. (1987). The measurement of
fear of crime.
Sociological Inquiry, 57(1), 70–97.
Gibbs, J. P. (1975). Crime, punishment, and deterrence. New
York, NY:
Elsevier New York.
Gottfredson, M. R., & Hirschi, T. (1990). A General Theory of
Crime:
Stanford University press.
Groff, E. R. (2008). Adding the temporal and spatial aspects of
routine
activities: A further test of routine activity theory. Security
39. Journal,
21(1–2), 95–116.
Hochstetler, A. (2001). Opportunities and decisions:
Interactional dynam-
ics in robbery and burglary groups. Criminology, 39(3), 737–
764.
Hochstetler, A. (2002). Sprees and runs: Opportunity
construction and
criminal episodes. Deviant Behavior, 23(1), 45–73.
Holt, T. J. (2009). The attack dynamics of political and
religiously moti-
vated hackers. NewYork: Paper presented at the Cyber
Infrastructure Protection.
Holt, T. J., & Bossler, A. M. (2014). An assessment of the
current state of
cybercrime scholarship. Deviant Behavior, 35(1), 20–40.
Holt, T. J., Strumsky, D., Smirnova, O., & Kilger, M. (2012).
Examining
the social networks of malware writers and hackers.
International
Journal of Cyber Criminology, 6(1), 891–903.
Hu, Q., Zhang, C., & Xu, Z. (2011). How can you tell a hacker
from a
geek? Ask whether he spends more time on computer games
than
sports. Blacksburg, Virginia: Paper presented at the DeWald
Information Security Research Workshop.
Jacobs, B. A., & Cherbonneau, M. (2017). Nerve management
and crime
40. accomplishment. Journal of Research in Crime and
Delinquency,
54(5), 617–638.
Kallman, E. A., & Grillo, J. P. (1998). Ethical decision making
and
information technology: An introduction with cases.
Collingdale:
DIANE Publishing Company.
Katz, J. (1988). Seductions of crime: Moral and sensual
attractions in
doing evil. New York, NY: Basic Books.
Kshetri, N. (2006). The simple economics of cybercrimes. IEEE
Security
and Privacy, 4(1), 33–39.
Leeson, P. T., & Coyne, C. J. (2005). The economics of
computer
hacking. JL Econ. & Pol'y, 1, 511.
Levy, S. (2001). Hackers: Heroes of the computer revolution
(Vol. 4).
New York, NY: Penguin Books New York.
Lichstein, H. (1963). Telephone Hackers Active. The Tech,
43(20), 20.
Lowry, P. B., Zhang, J., Wang, C., & Siponen, M. (2016). Why
do adults
engage in cyberbullying on social media? An integration of
online
disinhibition and deindividuation effects with the social
structure
and social learning (SSSL) model. Information Systems
41. Research,
27(4), 962–986.
Lowry, P. B., Dinev, T., & Willison, R. (2017). Why security
and privacy
research lies at the Centre of the information systems (IS)
artefact:
Proposing a bold research agenda. European Journal of
Information
Systems, 26(6), 546–563.
Mahmood, M. A., Siponen, M., Straub, D., Rao, H. R., &
Raghu, T.
(2010). Moving toward black hat research in information
systems
security: An editorial introduction to the special issue. MIS
Quarterly, 34(3), 431–433.
Parks, R., Xu, H., Chu, C.-H., & Lowry, P. B. (2017).
Examining the
intended and unintended consequences of organisational privacy
safeguards enactment in healthcare. European Journal of
Information Systems, 26(1), 37–65.
Patchin, J. W., & Hinduja, S. (2011). Traditional and
nontraditional bul-
lying among youth: A test of general strain theory. Youth &
Society,
43(2), 727–751.
Phukan, S. (2002). IT ethics in the internet age: New
dimensions. Paper
presented at the proceedings of informing. Cork, Ireland:
Science &
IT Education Conference.
42. Probasco, J. R., & Davis, W. L. (1995). A human capital
perspective on
criminal careers. Journal of Applied Business Research, 11(3),
58.
Reyns, B. W. (2013). Online routines and identity theft
victimization:
Further expanding routine activity theory beyond direct-contact
of-
fenses. Journal of Research in Crime and Delinquency, 50(2),
216–
238.
Rogers, M. K. (2006). A two-dimensional circumplex approach
to the
development of a hacker taxonomy. Digital Investigation, 3(2),
97–
102.
Schell, B. H., & Dodge, J. L. (2002). The hacking of America:
Who's
doing it, why, and how. Westport, CT, USA: Greenwood
Publishing
Group Inc..
Schell, B. H., & Holt, T. J. (2009). A profile of the
demographics, psy-
chological predispositions, and social/behavioral patterns of
com-
puter hacker insiders and outsiders Online consumer protection:
Theories of human relativism (pp. 190–213). Online: IGI
Global.
Shin, J., & Milkman, K. L. (2016). How backup plans can harm
goal
pursuit: The unexpected downside of being prepared for failure.
43. Organizational Behavior and Human Decision Processes, 135,
1–9.
Skinner, B. F. (1972). Beyond freedom and dignity. New York:
Bantam
Books.
Smith, A. D., & Rupp, W. T. (2002). Issues in cybersecurity;
understand-
ing the potential risks associated with hackers/crackers.
Information
Management & Computer Security, 10(4), 178–183.
Strauss, A., & Corbin, J. (1994). Grounded theory methodology.
Handbook of Qualitative Research, 17, 273–285.
Sykes, G. M., & Matza, D. (1957). Techniques of neutralization:
A theory
of delinquency. American Sociological Review, 22(6), 664–670.
Teske, N. (1997). Beyond altruism: Identity-construction as
moral motive
in political explanation. Political Psychology, 18(1), 71–91.
The-Honeynet-Project. (2004). Know your enemy: Learning
about secu-
rity threats. Boston, Massachusetts: Addison-Wesley
Professional.
Inf Syst Front
https://www.cisco.com/c/en/us/products/security/security-
reports.html
https://www.cisco.com/c/en/us/products/security/security-
reports.html
https://www.ey.com/Publication/vwLUAssets/ey-global-
45. under-constant-attack/. Accessed 13 Jan 2019
Wall, J. D., Lowry, P. B., & Barlow, J. (2016). Organizational
violations
of externally governed privacy and security rules: Explaining
and
predicting selective violations under conditions of strain and
excess.
Journal of the Association for Information Systems, 17(1), 39–
76.
Warr, M. (2000). Fear of crime in the United States: Avenues
for research
and policy. Criminal Justice, 4(4), 451–489.
Wikström, P.-O. H. (2004). Crime as alternative: Towards a
cross-level
situational action theory of crime causation. Beyond
Empiricism:
Institutions and Intentions in the Study of Crime, 13, 1–37.
Wikström, P.-O. H. (2006). Individuals, settings, and acts of
crime:
Situational mechanisms and the explanation of crime. New
York:
Cambridge University Press.
Willison, R., & Lowry, P. B. (2018). Disentangling the
motivations for
organizational insider computer abuse through the rational
choice
and life course perspectives. The DATA BASE for Advances in
Information Systems, 49(April), 81–102.
Willison, R., Lowry, P. B., & Paternoster, R. (2018). A tale of
two deter-
46. rents: Considering the role of absolute and restrictive deterrence
in
inspiring new directions in behavioral and organizational
security.
Journal of the Association for Information Systems, 19(12),
1187–
1216.
Wilson, J. Q. (2003). Broken windows: The police and
neighborhood
safety James Q. Wilson and George L. Kelling Criminological
Perspectives: Essential Readings (Vol. 400, pp. 29038).
London:
SAGE.
Yar, M. (2005). Computer hacking: Just another case of juvenile
delin-
quency? The Howard Journal of Crime and Justice, 44(4), 387–
399.
Young, R., Zhang, L., & Prybutok, V. R. (2007). Hacking into
the minds
of hackers. Information Systems Management, 24(4), 281–287.
Publisher’s Note Springer Nature remains neutral with regard to
juris-
dictional claims in published maps and institutional affiliations.
Mario Silic is a post-doctoral researcher at the Institute of
Information
Management, University of St. Gallen, Switzerland. He holds a
Ph.D.
from University of St Gallen, Switzerland. His research
motivation fo-
cuses on the fields of information security, open source
software, human-
47. computer interaction and mobile. He has published research in
Journal of
Management Information Systems, Security Journal,
Information &
Management, Computers & Security, Computers in Human
Behavior,
and others.
Paul Benjamin Lowry is the Suzanne Parker Thornhill Chair
Professor
and Eminent Scholar in Business Information Technology at the
Pamplin
College of Business at Virginia Tech. He is a former tenured
Full
Professor at both City University of Hong Kong and The
University of
Hong Kong. He received his Ph.D. in Management Information
Systems
from the University of Arizona and an MBA from the Marriott
School of
Management. He has published 220+ publications, including
120+ jour-
nal articles in MIS Quarterly, Information Systems Research, J.
of MIS, J.
of the AIS, Information System J., European J. of Information
Systems, J.
of Strategic IS, J. of IT, Decision Sciences J., Information &
Management, Decision Support Systems, and others. He is a
department
editor at Decision Sciences J. He also is an SE at J. of MIS, J.
of the AIS,
and Information System J., and an AE at the European J. of
Information
Systems. He has also served multiple times as track co-chair at
ICIS,
ECIS, and PACIS. His research interests include (1)
48. organizational and
behavioral security and privacy; (2) online deviance, online
harassment,
and computer ethics; (3) HCI, social media, and gamification;
and (4)
business analytics, decision sciences, innovation, and supply
chains.
Inf Syst Front
https://www.zdnet.com/article/your-website-is-under-constant-
attack/
https://www.zdnet.com/article/your-website-is-under-constant-
attack/
Reproduced with permission of copyright owner. Further
reproduction
prohibited without permission.
Breaking Bad in Cyberspace: Understanding why and how Black
Hat Hackers Manage their Nerves to Commit their Virtual
CrimesAbstractIntroductionTheoretical
BackgroundDevelopment of CrimeNerve
ManagementMethodHow Are Hackers’ Nerves Managed?From
Cognitive Distortion to Broken Windows: Shunting and
Minimization TechniquesPlan B, Thrill and Lens Widening
TechniquesDiscussionConclusionAppendix 1: Interview
GuidelineIntroductionIntroductory questionsAbout
HackingHacking vs FearOutlook / Interview ClosingInterview
closingGeneral probes used during the InterviewReferences
Running head: IMMIGRATION 1
IMMIGRATION 2
49. Immigration
Student's Name
Institutional Affiliation
Immigration
Introduction
Immigration is a significant issue in the U. S that has
precipitated numerous debates on whether it is a positive or
negative process. Today, the number of immigrants who have
moved into the country for different reasons is over 14%
(Azoulay et al., 2022). Some of these individuals use legal
protocols to secure citizenship for themselves and their family
members. They also acquire the papers needed to live and work
in the country seamlessly. Therefore, they can find employment
and effectively meet their day-to-day expenses. However, the
number of undocumented immigrants has also risen
significantly. These individuals, whose population is over
eleven million, enter the country illegally; hence they do not
have the necessary documentations (Sulkowski & Wolf, 2020).
50. As a result, they can only find low-paying jobs that cannot cater
to their day-to-day expenses. Seemingly, the unprecedented rise
in crime and poverty levels associated with immigration occur
when this group of individuals engages in criminal activities
such as robbery to acquire additional funds for their daily
needs. Also, their vulnerability to stress increases their chances
of using illicit drugs and addictive substances (Sulkowski &
Wolf, 2020). Therefore, immigration is a positive process that
has bettered many lives. Enhancing the immigration process is a
vital step that will reduce the number of undocumented
immigrants and the negative consequences of their presence.
References
Azoulay, P., Jones, B. F., Kim, J. D., & Miranda, J. (2022).
Immigration and entrepreneurship in the United
States. American Economic Review: Insights, 4(1), 71-88.
Sulkowski, M. L., & Wolf, J. N. (2020). Undocumented
immigration in the United States: Historical and legal context
and the ethical practice of school psychology. School
Psychology International, 41(4), 388-405.