DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. What Motivates Ethical Hackers?

What Motivates Ethical Hackers?

While a lot of hackers do it for the money or to be a nuisance, there is a brand of hacker who looks to make social change. Does your sec policy take them into account?

Adi Gaskell user avatar by
Adi Gaskell
·
Aug. 07, 17 · Analysis
Like (10)
Save
Tweet
Share
4.89K Views

Join the DZone community and get the full member experience.

Join For Free

Cybersecurity is undoubtedly a big issue and is said to cost the UK economy several billion pounds per year. Indeed, a recent government report showed that 46% of all businesses identified at least one cyber attack in the last year, with 74% of directors regarding cyber security as a high priority issue for them.

Despite this level of priority, organizations struggle to attract the talent they need to keep up with the constant arms race they face with hackers and other cyber criminals.

Whilst many cyber attacks are conducted with criminal acts in mind, there are also attacks done with activism as the motivator. A recent study attempted to discover what it is that motivates so called ethical hackers or people that break into digital systems for moral, ethical, or social justice reasons.

It reveals that for most hacktivists, the payoff they might secure as a result of their attack is the main contributor, with the risks involved having much less impact on the likelihood of an attack taking place.

The researchers from Arizona State University used game theory to examine how participants weigh up the risks and benefits of trying to break into a computer system. The authors also hoped to construct a profile of a potential hacktivist.

“Hacktivism is becoming increasingly more prevalent as an inexpensive and easily accessible alternative to real world protests. The lack of variability by gender is important to note as we seek to develop a reliable profile of potential hacktivists,” the authors say.

Suffice it to say, the participants in the study were not hackers themselves, so a caveat has to be applied to the findings and doubt cast as to their applicability in the real world, but it nonetheless provides some interesting findings that warrant further exploration.

Hacker

Published at DZone with permission of Adi Gaskell, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • Building a RESTful API With AWS Lambda and Express
  • [DZone Survey] Share Your Expertise and Take our 2023 Web, Mobile, and Low-Code Apps Survey
  • Public Key and Private Key Pairs: Know the Technical Difference
  • Use Golang for Data Processing With Amazon Kinesis and AWS Lambda

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: