IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v23y2021i2d10.1007_s10796-019-09949-3.html
   My bibliography  Save this article

Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes

Author

Listed:
  • Mario Silic

    (University of St. Gallen)

  • Paul Benjamin Lowry

    (Pamplin College of Business, Virginia Tech)

Abstract

What is happening in hacker’s minds when they are committing criminal activities? How black hat hackers manage nerves, which is about managing fear and underlying emotions, and which tactics they employ during their decision-making process before, during and after committing a crime, is the question that could provide some initial insights on hacker’s trajectories, their switch from black hat to white hat and ultimately about their behaviors and motivations. The main difficulty in answering this question resides with the access to hacker’s data. To address this gap, we conducted interviews with 16 black hat hackers. Supported by the general strain theory and routine activity theory, we identified five techniques that they use to manage their nerves: shunting, minimization, plan B, thrill, and lens widening techniques. Each of these techniques help hackers to better manage their nerves and consequently, learn how to better cope with the fear. During their psychological decision-making processes, hackers use these five techniques to create a new mindset, behind which they hide, with the objective of minimizing and mitigating the inherent risks they encounter during their criminal activities. The theoretical importance of nerve is the key to a better understanding of black hat hacker’s illegal acts, their behaviors and ultimately their actions.

Suggested Citation

  • Mario Silic & Paul Benjamin Lowry, 2021. "Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes," Information Systems Frontiers, Springer, vol. 23(2), pages 329-341, April.
  • Handle: RePEc:spr:infosf:v:23:y:2021:i:2:d:10.1007_s10796-019-09949-3
    DOI: 10.1007/s10796-019-09949-3
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-019-09949-3
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-019-09949-3?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Charmaz, Kathy, 1990. "'Discovering' chronic illness: Using grounded theory," Social Science & Medicine, Elsevier, vol. 30(11), pages 1161-1172, January.
    2. Paul Benjamin Lowry & Jun Zhang & Chuang Wang & Mikko Siponen, 2016. "Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model," Information Systems Research, INFORMS, vol. 27(4), pages 962-986, December.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Wang, Lin & Ngai, Steven Sek-yum, 2020. "The effects of anonymity, invisibility, asynchrony, and moral disengagement on cyberbullying perpetration among school-aged children in China," Children and Youth Services Review, Elsevier, vol. 119(C).
    2. Alessia Bertolazzi & Katarzyna Marzęda-Młynarska & Justyna Kięczkowska & Maria Letizia Zanier, 2024. "Datafication of Care: Security and Privacy Issues with Health Technology for People with Diabetes," Societies, MDPI, vol. 14(9), pages 1-25, August.
    3. Dena Yadin & Inbal Yahav & Lior Zalmanson & Nira Munichor, 2024. "Resolving the Ethical Tension Between Creating a Civil Environment and Facilitating Free Expression Online: Comment Reordering as an Alternative to Comment Moderation," Journal of Business Ethics, Springer, vol. 192(2), pages 261-283, June.
    4. Scales, Ashley N. & Quincy Brown, H., 2020. "The effects of organizational commitment and harmonious passion on voluntary turnover among social workers: A mixed methods study," Children and Youth Services Review, Elsevier, vol. 110(C).
    5. Ji Wu & Zhiqiang (Eric) Zheng & J. Leon Zhao, 2021. "FairPlay: Detecting and Deterring Online Customer Misbehavior," Information Systems Research, INFORMS, vol. 32(4), pages 1323-1346, December.
    6. Stuart Holland & Teresa Carla Oliveira, 2013. "Missing Links: Hume, Smith, Kant and Economic Methodology," Economic Thought, World Economics Association, vol. 2(2), pages 1-46, October.
    7. Arnett, Rachel D. & Sidanius, Jim, 2018. "Sacrificing status for social harmony: Concealing relatively high status identities from one’s peers," Organizational Behavior and Human Decision Processes, Elsevier, vol. 147(C), pages 108-126.
    8. Arjeta Shaqiri Latifi, 2021. "The Impact of Education in Combating the Development of the Trafficking in Human Beings Process," European Journal of Social Sciences Education and Research Articles, Revistia Research and Publishing, vol. 8, ejser_v8_.
    9. Daria Denti & Alessandra Faggian, 2021. "Where do angry birds tweet? Income inequality and online hate in Italy," Cambridge Journal of Regions, Economy and Society, Cambridge Political Economy Society, vol. 14(3), pages 483-506.
    10. Broom, Alex & Adams, Jon & Tovey, Philip, 2009. "Evidence-based healthcare in practice: A study of clinician resistance, professional de-skilling, and inter-specialty differentiation in oncology," Social Science & Medicine, Elsevier, vol. 68(1), pages 192-200, January.
    11. São José, José & Barros, Rosanna & Samitca, Sanda & Teixeira, Ana, 2013. "Social Care and Well-being. Experiences and Perspectives of an Old-aged Group," Journal of Tourism, Sustainability and Well-being, Cinturs - Research Centre for Tourism, Sustainability and Well-being, University of Algarve, vol. 1(3), pages 187-201.
    12. Christine Abdalla Mikhaeil & Richard Baskerville, 2019. "Using semiotics to analyze representational complexity in social media," Post-Print hal-02509212, HAL.
    13. Hildreth, John Angus D., 2024. "When loyalty binds: Examining the effectiveness of group versus personal loyalty calls on followers’ compliance with leaders’ unethical requests," Organizational Behavior and Human Decision Processes, Elsevier, vol. 181(C).
    14. Sam Ransbotham & Robert G. Fichman & Ram Gopal & Alok Gupta, 2016. "Special Section Introduction—Ubiquitous IT and Digital Vulnerabilities," Information Systems Research, INFORMS, vol. 27(4), pages 834-847, December.
    15. Kathy Charmaz & Virginia Olesen, 1997. "Ethnographic Research in Medical Sociology," Sociological Methods & Research, , vol. 25(4), pages 452-494, May.
    16. Benson, Outi & Gibson, Susanne & Boden, Zoë V.R. & Owen, Gareth, 2016. "Exhausted without trust and inherent worth: A model of the suicide process based on experiential accounts," Social Science & Medicine, Elsevier, vol. 163(C), pages 126-134.
    17. Marten Risius & Kai Spohrer, 2017. "A Blockchain Research Framework," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 59(6), pages 385-409, December.
    18. Tommy K. H. Chan & Christy M. K. Cheung & Izak Benbasat & Bo Xiao & Zach W. Y. Lee, 2023. "Bystanders Join in Cyberbullying on Social Networking Sites: The Deindividuation and Moral Disengagement Perspectives," Information Systems Research, INFORMS, vol. 34(3), pages 828-846, September.
    19. Alexandra Ainz-Galende & Rubén Rodríguez-Puertas, 2020. "The Demands of Niqabi Women in the Telegram Subaltern Corner Orgullo Niqabi," Social Inclusion, Cogitatio Press, vol. 8(3), pages 286-295.
    20. Lez Trujillo Torres & Benét DeBerry-Spence, 2019. "Consumer valorization strategies in traumatic extraordinary experiences," Journal of the Academy of Marketing Science, Springer, vol. 47(3), pages 516-531, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:23:y:2021:i:2:d:10.1007_s10796-019-09949-3. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.