Published October 26, 2016 | Version v1
Journal article Open

The New Computer Hacker’s Quest and Contest with the Experienced Hackers: A Qualitative Study applying Pierre Bourdieu’s Field Theory

  • 1. Curtin University, Australia

Contributors

  • 1. Raksha Shakti University, India

Description

Hacker forums are places for new hackers, newbies, to find information on hacking practices and to become part of a community. This study contributes to understanding ways newbies try to become accepted experienced computer hackers. Using Pierre Bourdieu’s Field Theory and its concepts, 500 threads from a forum were analyzed to see how newbies attempt to gain a place in the hacking field amongst experienced hackers. Thematic analysis methods were used to demonstrate how the forum’s field, and those within it, behaved to obtain what Bourdieu describes as cultural and social capital to obtain knowledge and skills to hack and become accepted hackers. The significant finding was the theme of contesting social capital. This showed the types of strategies employed by experienced hackers to prevent or hinder newbies obtaining the skills and knowledge, social capital, to achieve their hacking goals. This study gives insights in to new hacker’s motivations and strategies for becoming accepted hackers and gives suggestions for further research in this growing area. 

Files

Nycykvol10issue2IJCC2016.pdf

Files (270.9 kB)

Name Size Download all
md5:3b007f2f2ac2af728bdcaac50b440293
270.9 kB Preview Download

Additional details

References

  • Alhojailan, M. (2012). Thematic analysis: a critical review of its process and evaluation. West East Journal of Social Sciences, 1(1), 39-47. Bachmann, M. (2010). The risk propensity and rationality of computer hackers. International Journal of Cyber Criminology, 4(1-2), 643-656. Retrieved from http://www.cybercrimejournal.com/michaelbacchmaan2010ijcc.pdf. Bourdieu, P. (1977). Outline of a theory of practice. (R. Nice, Trans.). New York: Cambridge University. Bourdieu, P. (1984). Distinction: a social critique of the judgement of taste. London: Routledge. Bourdieu, P. (1985). The social space and the genesis of groups. Theory and Society, 14(6), 723-744. Bourdieu, P. (1986). The forms of capital. In J. G. Richardson (Ed.), Handbook of theory and research in the sociology of education (pp.241-258). New York: Greenwald Press. Bourdieu, P. (1990). The logic of practice. (R. Nice Trans.). Cambridge: Polity Press. Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77-101. http://dx.doi:10.1191/1478088706qp063oa. Bruckman, A. (2002). Ethical guidelines for research online. Retrieved from http://www.cc.gatech.edu/~asb/ethics. Chiesa, R., Ducci, S., & Ciappi, S. (2009). Profiling Hackers: The science of criminal profiling as applied to the world of hacking. Florida: Auerbach Publications. Décary-Hétu, D., & Dupont, B. (2013). Reputation in a dark network of online criminals. Global Crime, 14(2-3), 175-196. doi: 10.1080/17440572.2013.801015. Dremliuga, R. (2014). Subculture of Hackers in Russia. Asian Social Science, 10(18), 158-162. Flowers, S. (2008). Harnessing the hackers: The emergence and exploitation of Outlaw Innovation. Research Policy, 37, 177-193. doi: 10.1016/j.respol.2007.10.006. Fötinger, C., & Ziegler, W. (2004). Understanding a Hacker’s Mind – a psychological insight into the hijacking of identities. Krems, Austria: Donau-Universität Krems. Retrieved from http://www.donau-uni.ac.at/de/department/gpa/informatik/DanubeUniversityHackersStudy.pdf. Gottfredson, M. & Hirschi, T. (1990). A general theory of crime. Stanford, CA: Stanford University Press. Hanks, W. (2005). Pierre Bourdieu and the practices of language. Annual Review of Anthropology, 34, 67-83. doi: 10.1146/annurev.anthro.33.070203.143907. Holt, T., D., Strumsky, D., Smirnova, O., & Kilger, M. (2012). Examining the social networks of malware writers and hackers. International Journal of Cyber Criminology, 6(1), 891- 903. Retrieved from http://cybercrimejournal.com/holtetal2012janijcc.pdf. Imperva. (2012). Hacker intelligence initiative, monthly trend report 13: monitoring hacker forums ADC monthly web attacks analysis, October 2012. Retrieved from https://www.imperva.com/docs/HII_Monitoring_Hacker_Forums_2012.pdf. Jordan, T., & Taylor, P. (1998). A sociology of hackers. Sociological Review, 46, 757-780. Kao, D., Huang, F., & Wang, S. (2009). Persistence and desistance: examining the impact of re-integrative shaming to ethics in Taiwan juvenile hackers. Computer Law and Security Review, 25, 464-476. doi: 10.1016/j.clsr.2009.05.009. Kilger, M., Stutzman., & Arkin, O. (2004). Profiling. In The Honeynet Project (2nd Ed.), Know your enemy. Addison Wesley Professional. Kirwan, G., & Power, A. (2013). Cybercrime: The psychology of online offenders. Cambridge: Cambridge University Press. Kollock, P. (1999). Invisible crowds in cyberspace: mapping the social structure of Usenet. In M. Smith & P. Kollock (Eds.), Communities in cyberspace (pp.195-219). London: Routledge. Kshetri, N. (2010). The global cybercrime industry: Economic, institutional and strategic perspectives. Berlin: Springer. Kubitschko, S. (2015). Hackers’ media practices: demonstrating and articulating expertise as interlocking arrangements. Convergence: The International Journal of Research into New Media Technologies, 21(3), 388-402. doi: 10.1177/1354856515579847. Madge, C. (2007). Developing a geographers’ agenda for online research ethics. Progress in Human Geography. 31(5), 654-674. doi: 10.1177/0309132507081496. Mander, M. (1987). Bourdieu, the sociology of culture and cultural studies: a critique. European Journal of Communication, 2(4), 427-453. doi: 10.1177/02673231870020040044. Markham, A., & Buchanan, E. (2012). Decision-making and internet research. Retrieved from http://aoir.org/reports/ethics2.pdf. Meyer, G., & Thomas, J. (1990). The baudy world of the byte bandit: A postmodernist interpretation of the computer underground. In F. Schmalleger (Ed.), Computers in criminal justice (pp.31-67). Bristol (Indiana): Wyndham Hall. Mitnick, K. (2002). The art of deception: Controlling the human element of security. Indianapolis: Wiley. Nikitina, S. (2012). Hackers as tricksters of the digital age: creativity in hacker culture. The Journal of Popular Culture, 45(1), 133-152. doi: 10.1111/j.1540-5931.2011.00915x. Nissenbaum, H. (2004). Hackers and the contested ontology of cyberspace. New Media and Society, 6(2), 195-217. doi: 10.1177/1461444804041445. Pick, R. (2013). The “ethics” of teaching ethical hacking. Journal of International Technology and Information Management, 22(4), 67-75. Schell, B., & Dodge, J. (2002). The Hacking of America: Who’s Doing it, Why, and How. Westport, CT: Quorum Books. Shachaf, P., & Hara, N. (2010). Beyond vandalism: Wikipedia trolls. Journal of Information Science, 36(3), 357-370. doi: 10.1177/0165551510365390. Skågeby, J. (2015). Interpreting Online Discussions: Connecting Artifacts and Experiences in User Studies. The Qualitative Report, 20(1), 115-129. Retrieved from http://nsuworks.nova.edu/tqr/vol20/iss1/9. Taylor, P. (1999). Hackers crime and the digital sublime. London: Routledge. Taylor, R., Fritsch, E., Liederbach, J., & Holt, T. (2011). Digital crime and digital terrorism (2nd ed.). Boston: Prentice Hall. Turgeman-Goldschmidt, O. (2008). Meanings that hackers assign to their being a hacker. International Journal of Cyber Criminology, 2(2), 382–396. Retrieved from http://www.cybercrimejournal.com/Orlyijccdec2008.pdf. Warren, M., & Leitch, S. (2009). Hacker Taggers: A new type of hackers. Information Systems Frontiers, 12(4), 425-431. http://dx.doi:10.1007/s10796-009-9203-y Yar, M. (2005). Computer hacking: just another case of juvenile delinquency? Howard Journal of Criminal Justice, 44(4), 387-399. doi:10.1111/j.1468-2311.2005.00383.x. Young, R., Zhang, L., & Prybutok, R, (2007). Hacking into the minds of hackers. Information Systems Management, 24(4), 281-287. doi:10.1080/10580530701585823.