Abstract
Research summary: This qualitative interview study examined individual and social aspects in the lives of 15 hackers who started with ethical hacking before the age of 18. We examined what motivated and stimulated them to start with ethical hacking and how and why they continued. Results show that individual aspects, such as an early interest in ICT (Information and Communication Technology), the motivation to make systems more secure, and thinking of reporting vulnerabilities as a moral duty, contribute to the initiation of ethical hacking. Social aspects, such as role models, mainly play a role in the further development of the ethical hacking career. For example, peers, parents, friends, and hacker communities have a motivating and stimulating effect on young ethical hackers. Similarly, positive reactions from public and private system owners can further stimulate the development and self-image of ethical hackers. Policy Implications: In contrast to criminal hackers, ethical hackers improve cybersecurity, for example, by reporting weaknesses or errors in computer systems. Nowadays, an increasing number of public and private organizations around the world are creating cybersecurity policies and practices around ethical hacking. The interest in hacking usually arises at an early age, making it important to gain knowledge about what stimulates and motivates young people to start and continue with ethical hacking, to inform these policies and practices. Our results show that recognition and reactions from system owners are important in the ethical hacking career. Our recommendations based on these results could stimulate more young people to take the ethical path. Simultaneously, this increases the security of public and private organizations, reducing opportunities for criminal hackers.
Original language | English |
---|---|
Pages (from-to) | 803-824 |
Number of pages | 22 |
Journal | Criminology & Public Policy |
Volume | 22 |
Issue number | 4 |
Early online date | 11 Oct 2023 |
DOIs | |
Publication status | Published - Nov 2023 |
Bibliographical note
Special Issue: Cybercrime and Cybersecurity.Publisher Copyright:
© 2023 The Authors. Criminology & Public Policy published by Wiley Periodicals LLC on behalf of American Society of Criminology.