Skip to main content

Advertisement

Log in

Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks

  • Published:
American Journal of Criminal Justice Aims and scope Submit manuscript

Abstract

Cyber attacks on critical infrastructure by ideology-based hackers may have both significant financial costs and public safety consequences. Scholars have been increasingly using Sykes and Matza’s (1957) techniques of neutralization to better understand the commission of various forms of cybercrime, including that of computer hacking. This study examines the effects of techniques of neutralization on college students’ willingness to commit cyber attacks, specifically defacing websites and compromising financial and government servers, against both domestic and foreign targets. An overall techniques of neutralization scale significantly predicted being willing to commit all examined forms of cyber attacks even after controlling for peer behavior, computer skills, time spent online, and being male. The strongest support was found for the techniques of condemnation of the condemners and claim of entitlement. The implications of the findings for our understanding of why certain individuals are more willing to commit cyber attacks and the situational crime prevention efforts to remove excuses for offenders are both explored.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. Holt and Kilger (2012) reported the following percentages of college students who would be willing to commit these specific cyber actions against the homeland: 13.2% deface website of government official; 12% deface website of government agency; 4.2% compromise bank server to withdraw money for victims; and 9.8% search government servers for secrets. Against a fictitious country: 11.5% deface website of government official; 10.9% deface website of government agency; 5% compromise bank server to withdraw money for victims; and 9.8% search government servers for secrets.

References

  • Akers, R. (1998). Social learning and social structure: A general theory of crime and deviance. Northeastern University Press.

    Google Scholar 

  • Anderson, R., Barton, C., Bohme, R., Clayton, R., Ganan, C., Grasso, T., Levi, M., Moore, T., & Vasek, M. (2019). Measuring the changing cost of cybercrime. [Online]. Available at: https://www.paccsresearch.org.uk/wp-content/uploads/2019/06/WEIS_2019_paper_25.pdf

  • Bossler, A. M. (2019). Perceived formal and informal sanctions on the willingness to commit cyber attacks against domestic and foreign targets. Journal of Crime and Justice, 42, 599–615.

    Google Scholar 

  • Bossler, A. M., & Burruss, G. W. (2011). The general theory of crime and computer hacking: Low self-control hackers? In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime (pp. 38–67). Hershey, PA: IGI Global.

  • Brantly, A. F. (2020). Beyond hyperbole: The evolving subdiscipline of cyber conflict studies. The Cyber Defense Review, 5, 99–120.

    Google Scholar 

  • Brewer, R., & Fox., S., & Miller, C. (2019). Applying the techniques of neutralization to the study of cybercrime. In T. J. Holt & A. M. Bossler (Eds.), The Palgrave handbook of international cybercrime and cyberdeviance (pp. 547–565). Springer.

    Google Scholar 

  • Brenner, S. W. (2010). Cybercrime: Criminal threats from cyberspace. Santa Barbara, CA: ABC-CLIO.

  • Chua, Y. T., & Holt, T. J. (2016). A cross-national examination for the techniques of neutralization to account for hacking behaviors. Victims & Offenders, 11, 534–555.

    Google Scholar 

  • Clarke, R. V. (1997). Situational crime prevention: Successful case studies (2nd ed.). Harrow and Heston.

    Google Scholar 

  • Coleman, J. W. (1985). The criminal elite: The sociology of white collar crime. St. Martin’s Press.

    Google Scholar 

  • Cornish, D. B., & Clarke, R. V. (2003). Opportunities, precipitators and criminal decisions: A reply to Wortley’s critique of situational crime prevention. Crime Prevention Studies, 16, 41–96.

    Google Scholar 

  • Cromwell, P., & Thurman, Q. (2003). “The Devil Made Me Do It”: Use of neutralizations by shoplifters. Deviant Behavior, 24, 535–550.

    Google Scholar 

  • Denning, D. E. (2011). Cyber-conflict as an emergent social problem. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 170–186). Hershey, PA: IGI-Global.

  • DeTardo-Bora, K.A., Clark, E.N., & Gardner, B. (2019). “I did what I believe is right”: A study of neutralizations among Anonymous Operation participants. Journal of Qualitative Criminal Justice & Criminology, 8, https://doi.org/10.21428/88de04a1.5c02a7d3

  • Donner, C. M. (2016). The gender gap and cybercrime: An examination of college students’ online offending. Victims & Offenders, 11, 556–577.

    Google Scholar 

  • Goldsmith, A., & Brewer, R. (2015). Digital drift and the criminal interaction order. Theoretical Criminology, 19, 112–130.

    Google Scholar 

  • Goode, S., & Cruise, S. (2006). What motivated software crackers? Journal of Business Ethics, 65, 173–201.

    Google Scholar 

  • Gordon, S., & Ma, Q. (2003). Convergence of virus writers and hackers: Factor or fantasy white paper]. Cupertino, CA: Symantec Security.

  • Guitton, C. (2012). Criminals and cyber attacks: The missing link between attribution and deterrence. International Journal of Cyber Criminology, 6, 1030–1043.

    Google Scholar 

  • Higgins, G. E., Wolfe, S. E., & Marcum, C. D. (2008). Music piracy and neutralization: A preliminary trajectory analysis from short-term longitudinal data. International Journal of Cyber Criminology, 2, 324–336.

    Google Scholar 

  • Hinduja, S. (2007). Neutralization theory and online software piracy. Ethics and Information Technology, 9, 187–204.

    Google Scholar 

  • Holt, T. J. (2007). Subcultural Evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171–198.

    Google Scholar 

  • Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress: Theory and prevention of technology-enabled offenses. Routledge.

    Google Scholar 

  • Holt, T. J., Brewer, R., & Goldsmith, A. (2019a). Digital drift and the ‘sense of injustice’: Counter-productive policing of youth cybercrime. Deviant Behavior, 40, 1144–1156.

    Google Scholar 

  • Holt, T. J., Burruss, G. W., & Bossler, A. M. (2010). Social learning and cyber-deviance: Examining the importance of a full social learning model in the virtual world. Journal of Crime and Justice, 33, 31–61.

    Google Scholar 

  • Holt, T. J., & Copes, H. (2010). Transferring subcultural knowledge on-line: Practices and beliefs of persistent digital pirates. Deviant Behavior, 31, 625–654.

    Google Scholar 

  • Holt, T. J., Freilich, J. D., & Chermak, S. M. (2017a). Exploring the subculture of ideologically motivated cyber-attackers. Journal of Contemporary Criminal Justice, 33, 212–233.

    Google Scholar 

  • Holt, T. J., & Kilger, M. (2012). Examining willingness to attack critical infrastructure online and offline. Crime & Delinquency, 58, 798–822.

    Google Scholar 

  • Holt, T. J., Kilger, M., Chiang, L., & Yang, C. (2015). Exploring the behavioral and attitudinal correlates of civilian cyberattacks. In M. Bouchard (Ed.), Social networks, terrorism, and counter-terrorism: Radical and connected (pp. 128–151). Routledge.

    Google Scholar 

  • Holt, T. J., Kilger, M., Chiang, L., & Yang, C. (2017b). Exploring the correlates of individual willingness to engage in ideologically motivated cyberattacks. Deviant Behavior, 38, 356–373.

    Google Scholar 

  • Holt, T. J., Lee, J. R., Freilich, J. D., Chermak, S. M., Bauer, J. M., Shillair, R., & Ross, A. (2020). An exploratory analysis of the characteristics of ideologically motivated cyberattacks. Terrorism and Political Violence. https://doi.org/10.1080/09546553.200.1777987

    Article  Google Scholar 

  • Holt, T. J., Stonhouse, M., Freilich, J., & Chermak, S. M. (2019b). Examining ideologically motivated cyberattacks performed by far-left groups. Terrorism and Political Violence. https://doi.org/10.1080/09546553.2018.1551213

    Article  Google Scholar 

  • Hutchings, A. (2013). Hacking and fraud: Qualitative analysis of online offending and victimization. In K. Jaishankar & N. Ronel (Eds.), Global criminology: Crime and victimization in a globalized era (pp. 93–114). CRC Press.

    Google Scholar 

  • Hutchings, A., & Clayton, R. (2016). Exploring the provision of online Booter services. Deviant Behavior, 37, 1163–1178.

    Google Scholar 

  • Ingram, J. R., & Hinduja, S. (2008). Neutralizing music piracy: An empirical examination. Deviant Behavior, 29, 334–366.

    Google Scholar 

  • Jordan, T., & Taylor, P. (1998). A sociology of hackers. The Sociological Review, 46, 757–780.

    Google Scholar 

  • Klockars, C. B. (1974). The professional fence. The Free Press.

    Google Scholar 

  • Kranenbarg, M. W., Holt, T. J., & van Gelder, J. (2019). Offending and victimization in the Digital Age: Comparing correlates of cybercrime and traditional offending-only, victimization-only and the victimization-offending overlap. Deviant Behavior, 40, 40–55.

    Google Scholar 

  • Maratea, R. J. (2011). Screwing the pooch: Legitimizing accounts in a zoophilia on-line community. Deviant Behavior, 32, 918–943.

    Google Scholar 

  • Marcum, C. D., Higgins, G. E., Wolfe, S. E., & Ricketts, M. L. (2011). Examining the intersection of self-control, peer association and neutralization in explaining digital piracy. Western Criminology Review, 12, 60–74.

    Google Scholar 

  • Maruna, S., & Copes, H. (2005). What have we learned from five decades of neutralization research? Crime and Justice, 32, 221–320.

    Google Scholar 

  • Matza, D. (1964). Delinquency and drift. Wiley.

    Google Scholar 

  • Minor, W. W. (1981). Techniques of neutralization: A reconceptualization and empirical examination. Journal of Research in Crime and Delinquency, 18, 295–318.

    Google Scholar 

  • Morris, R. G. (2011). Computer hacking and the techniques of neutralization: An empirical assessment.” In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (1–17). Hershey, PA: IGI-Global.

  • Morris, R. G., & Blackburn, A. G. (2009). Cracking the code: An empirical exploration of social learning theory and computer crime. Journal of Crime and Justice, 32, 1–32.

    Google Scholar 

  • Morris, R. G., & Higgins, G. E. (2009). Neutralizing potential and self-reported digital piracy: A multitheoretical exploration among college undergraduates. Criminal Justice Review, 34, 173–195.

    Google Scholar 

  • Newman, G., & Clarke, R. (2003). Superhighway robbery: Preventing e-commerce crime. Cullompton: Willan.

  • Payne, B. K., & Chappell, A. (2008). Using student samples in criminological research. Journal of Criminal Justice Education, 19, 175–192.

    Google Scholar 

  • Ponemon Institute. (2020). Cost of a data breach report 2020. Available online at: https://www.ibm.com/security/digital-assets/cost-data-breach-report/#/

  • Popham, J. F., & Volpe, C. (2018). Predicting moral disengagement from the harms associated with digital music piracy: An exploratory, integrative test of digital drift and the criminal interaction order. International Journal of Cyber Criminology, 12, 133–150.

    Google Scholar 

  • Pratt, T. C., & Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi’s general theory of crime: A meta-analysis. Criminology, 38, 931–964.

    Google Scholar 

  • Pratt, T. C., Cullen, F. T., Sellers, C. S., Winfree, T., Madensen, T. D., Daigle, L. E., Fearn, N. E., & Gau, J. M. (2009). The empirical status of social learning theory: A meta-analysis. Justice Quarterly, 27, 765–802.

    Google Scholar 

  • Rege-Patwardhan, A. (2009). Cybercrimes against critical infrastructures: A study of online criminal organization and techniques. Criminal Justice Studies, 22, 261–271.

    Google Scholar 

  • Renfrow, D. G., & Rollo, E. A. (2014). Sexting on campus: Minimizing perceived risks and neutralizing behaviors. Deviant Behavior, 35, 903–920.

    Google Scholar 

  • Rid, T. (2013). Cyber war will not take place. Hurst & Company.

    Google Scholar 

  • Risk-Based Security. (2021). 2020 Year end report: Data breach quickview. Available online at: https://pages.riskbasedsecurity.com/hubfs/Reports/2020/2020%20Year%20End%20Data%20Breach%20QuickView%20Report.pdf

  • Siponen, M., Vance, A., & Willison, R. (2012). New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs. Information & Management, 49, 334–341.

    Google Scholar 

  • Smallridge, J. L., & Roberts, J. R. (2013). Crime specific neutralizations: An empirical examination of four types of digital piracy. International Journal of Cyber Criminology, 7, 125–140.

    Google Scholar 

  • Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34, 495–518.

    Google Scholar 

  • Steinmetz, K. F. (2015). Craft(y)ness. British Journal of Criminology, 55, 125–145.

    Google Scholar 

  • Sykes, M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Society of Criminology, 22, 664–670.

    Google Scholar 

  • Turgeman-Goldschmidt, O. (2008). Meanings that hackers assign to their being a hacker. International Journal of Cyber Criminology, 2, 382–396.

    Google Scholar 

  • Turgeman-Goldschmidt, O. (2009). The rhetoric of hackers’ neutralisations. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the Internet (pp. 315–335). Pearson.

    Google Scholar 

  • Turton, W., & Mehrotra, K. (2021, June 4). Hackers breached Colonial Pipeline using compromised password. Bloomberg. Available online at: https://www.bloomberg.com/news/articles/2021-06-04/hackers-breached-colonial-pipeline-using-compromised-password

  • Ulsperger, J. S., Hodges, S. H., & Paul, J. (2010). Pirates on the plank: Neutralization theory and the criminal downloading of music among generation Y in the era of late modernity. Journal of Criminal Justice and Popular Culture, 17, 124–151.

    Google Scholar 

  • Vysotsky, S., & McCarthy, A. L. (2017). Normalizing cyberracism: A neutralization theory analysis. Journal of Crime and Justice, 40, 446–461.

    Google Scholar 

  • Yu, S. (2013). Digital piracy justification: Asian students versus American students. International Criminal Justice Review, 23, 185–196.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adam M. Bossler.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bossler, A.M. Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks. Am J Crim Just 46, 911–934 (2021). https://doi.org/10.1007/s12103-021-09654-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12103-021-09654-5

Keywords

Navigation