Abstract
Cyber attacks on critical infrastructure by ideology-based hackers may have both significant financial costs and public safety consequences. Scholars have been increasingly using Sykes and Matza’s (1957) techniques of neutralization to better understand the commission of various forms of cybercrime, including that of computer hacking. This study examines the effects of techniques of neutralization on college students’ willingness to commit cyber attacks, specifically defacing websites and compromising financial and government servers, against both domestic and foreign targets. An overall techniques of neutralization scale significantly predicted being willing to commit all examined forms of cyber attacks even after controlling for peer behavior, computer skills, time spent online, and being male. The strongest support was found for the techniques of condemnation of the condemners and claim of entitlement. The implications of the findings for our understanding of why certain individuals are more willing to commit cyber attacks and the situational crime prevention efforts to remove excuses for offenders are both explored.
Similar content being viewed by others
Notes
Holt and Kilger (2012) reported the following percentages of college students who would be willing to commit these specific cyber actions against the homeland: 13.2% deface website of government official; 12% deface website of government agency; 4.2% compromise bank server to withdraw money for victims; and 9.8% search government servers for secrets. Against a fictitious country: 11.5% deface website of government official; 10.9% deface website of government agency; 5% compromise bank server to withdraw money for victims; and 9.8% search government servers for secrets.
References
Akers, R. (1998). Social learning and social structure: A general theory of crime and deviance. Northeastern University Press.
Anderson, R., Barton, C., Bohme, R., Clayton, R., Ganan, C., Grasso, T., Levi, M., Moore, T., & Vasek, M. (2019). Measuring the changing cost of cybercrime. [Online]. Available at: https://www.paccsresearch.org.uk/wp-content/uploads/2019/06/WEIS_2019_paper_25.pdf
Bossler, A. M. (2019). Perceived formal and informal sanctions on the willingness to commit cyber attacks against domestic and foreign targets. Journal of Crime and Justice, 42, 599–615.
Bossler, A. M., & Burruss, G. W. (2011). The general theory of crime and computer hacking: Low self-control hackers? In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime (pp. 38–67). Hershey, PA: IGI Global.
Brantly, A. F. (2020). Beyond hyperbole: The evolving subdiscipline of cyber conflict studies. The Cyber Defense Review, 5, 99–120.
Brewer, R., & Fox., S., & Miller, C. (2019). Applying the techniques of neutralization to the study of cybercrime. In T. J. Holt & A. M. Bossler (Eds.), The Palgrave handbook of international cybercrime and cyberdeviance (pp. 547–565). Springer.
Brenner, S. W. (2010). Cybercrime: Criminal threats from cyberspace. Santa Barbara, CA: ABC-CLIO.
Chua, Y. T., & Holt, T. J. (2016). A cross-national examination for the techniques of neutralization to account for hacking behaviors. Victims & Offenders, 11, 534–555.
Clarke, R. V. (1997). Situational crime prevention: Successful case studies (2nd ed.). Harrow and Heston.
Coleman, J. W. (1985). The criminal elite: The sociology of white collar crime. St. Martin’s Press.
Cornish, D. B., & Clarke, R. V. (2003). Opportunities, precipitators and criminal decisions: A reply to Wortley’s critique of situational crime prevention. Crime Prevention Studies, 16, 41–96.
Cromwell, P., & Thurman, Q. (2003). “The Devil Made Me Do It”: Use of neutralizations by shoplifters. Deviant Behavior, 24, 535–550.
Denning, D. E. (2011). Cyber-conflict as an emergent social problem. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 170–186). Hershey, PA: IGI-Global.
DeTardo-Bora, K.A., Clark, E.N., & Gardner, B. (2019). “I did what I believe is right”: A study of neutralizations among Anonymous Operation participants. Journal of Qualitative Criminal Justice & Criminology, 8, https://doi.org/10.21428/88de04a1.5c02a7d3
Donner, C. M. (2016). The gender gap and cybercrime: An examination of college students’ online offending. Victims & Offenders, 11, 556–577.
Goldsmith, A., & Brewer, R. (2015). Digital drift and the criminal interaction order. Theoretical Criminology, 19, 112–130.
Goode, S., & Cruise, S. (2006). What motivated software crackers? Journal of Business Ethics, 65, 173–201.
Gordon, S., & Ma, Q. (2003). Convergence of virus writers and hackers: Factor or fantasy white paper]. Cupertino, CA: Symantec Security.
Guitton, C. (2012). Criminals and cyber attacks: The missing link between attribution and deterrence. International Journal of Cyber Criminology, 6, 1030–1043.
Higgins, G. E., Wolfe, S. E., & Marcum, C. D. (2008). Music piracy and neutralization: A preliminary trajectory analysis from short-term longitudinal data. International Journal of Cyber Criminology, 2, 324–336.
Hinduja, S. (2007). Neutralization theory and online software piracy. Ethics and Information Technology, 9, 187–204.
Holt, T. J. (2007). Subcultural Evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171–198.
Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress: Theory and prevention of technology-enabled offenses. Routledge.
Holt, T. J., Brewer, R., & Goldsmith, A. (2019a). Digital drift and the ‘sense of injustice’: Counter-productive policing of youth cybercrime. Deviant Behavior, 40, 1144–1156.
Holt, T. J., Burruss, G. W., & Bossler, A. M. (2010). Social learning and cyber-deviance: Examining the importance of a full social learning model in the virtual world. Journal of Crime and Justice, 33, 31–61.
Holt, T. J., & Copes, H. (2010). Transferring subcultural knowledge on-line: Practices and beliefs of persistent digital pirates. Deviant Behavior, 31, 625–654.
Holt, T. J., Freilich, J. D., & Chermak, S. M. (2017a). Exploring the subculture of ideologically motivated cyber-attackers. Journal of Contemporary Criminal Justice, 33, 212–233.
Holt, T. J., & Kilger, M. (2012). Examining willingness to attack critical infrastructure online and offline. Crime & Delinquency, 58, 798–822.
Holt, T. J., Kilger, M., Chiang, L., & Yang, C. (2015). Exploring the behavioral and attitudinal correlates of civilian cyberattacks. In M. Bouchard (Ed.), Social networks, terrorism, and counter-terrorism: Radical and connected (pp. 128–151). Routledge.
Holt, T. J., Kilger, M., Chiang, L., & Yang, C. (2017b). Exploring the correlates of individual willingness to engage in ideologically motivated cyberattacks. Deviant Behavior, 38, 356–373.
Holt, T. J., Lee, J. R., Freilich, J. D., Chermak, S. M., Bauer, J. M., Shillair, R., & Ross, A. (2020). An exploratory analysis of the characteristics of ideologically motivated cyberattacks. Terrorism and Political Violence. https://doi.org/10.1080/09546553.200.1777987
Holt, T. J., Stonhouse, M., Freilich, J., & Chermak, S. M. (2019b). Examining ideologically motivated cyberattacks performed by far-left groups. Terrorism and Political Violence. https://doi.org/10.1080/09546553.2018.1551213
Hutchings, A. (2013). Hacking and fraud: Qualitative analysis of online offending and victimization. In K. Jaishankar & N. Ronel (Eds.), Global criminology: Crime and victimization in a globalized era (pp. 93–114). CRC Press.
Hutchings, A., & Clayton, R. (2016). Exploring the provision of online Booter services. Deviant Behavior, 37, 1163–1178.
Ingram, J. R., & Hinduja, S. (2008). Neutralizing music piracy: An empirical examination. Deviant Behavior, 29, 334–366.
Jordan, T., & Taylor, P. (1998). A sociology of hackers. The Sociological Review, 46, 757–780.
Klockars, C. B. (1974). The professional fence. The Free Press.
Kranenbarg, M. W., Holt, T. J., & van Gelder, J. (2019). Offending and victimization in the Digital Age: Comparing correlates of cybercrime and traditional offending-only, victimization-only and the victimization-offending overlap. Deviant Behavior, 40, 40–55.
Maratea, R. J. (2011). Screwing the pooch: Legitimizing accounts in a zoophilia on-line community. Deviant Behavior, 32, 918–943.
Marcum, C. D., Higgins, G. E., Wolfe, S. E., & Ricketts, M. L. (2011). Examining the intersection of self-control, peer association and neutralization in explaining digital piracy. Western Criminology Review, 12, 60–74.
Maruna, S., & Copes, H. (2005). What have we learned from five decades of neutralization research? Crime and Justice, 32, 221–320.
Matza, D. (1964). Delinquency and drift. Wiley.
Minor, W. W. (1981). Techniques of neutralization: A reconceptualization and empirical examination. Journal of Research in Crime and Delinquency, 18, 295–318.
Morris, R. G. (2011). Computer hacking and the techniques of neutralization: An empirical assessment.” In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (1–17). Hershey, PA: IGI-Global.
Morris, R. G., & Blackburn, A. G. (2009). Cracking the code: An empirical exploration of social learning theory and computer crime. Journal of Crime and Justice, 32, 1–32.
Morris, R. G., & Higgins, G. E. (2009). Neutralizing potential and self-reported digital piracy: A multitheoretical exploration among college undergraduates. Criminal Justice Review, 34, 173–195.
Newman, G., & Clarke, R. (2003). Superhighway robbery: Preventing e-commerce crime. Cullompton: Willan.
Payne, B. K., & Chappell, A. (2008). Using student samples in criminological research. Journal of Criminal Justice Education, 19, 175–192.
Ponemon Institute. (2020). Cost of a data breach report 2020. Available online at: https://www.ibm.com/security/digital-assets/cost-data-breach-report/#/
Popham, J. F., & Volpe, C. (2018). Predicting moral disengagement from the harms associated with digital music piracy: An exploratory, integrative test of digital drift and the criminal interaction order. International Journal of Cyber Criminology, 12, 133–150.
Pratt, T. C., & Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi’s general theory of crime: A meta-analysis. Criminology, 38, 931–964.
Pratt, T. C., Cullen, F. T., Sellers, C. S., Winfree, T., Madensen, T. D., Daigle, L. E., Fearn, N. E., & Gau, J. M. (2009). The empirical status of social learning theory: A meta-analysis. Justice Quarterly, 27, 765–802.
Rege-Patwardhan, A. (2009). Cybercrimes against critical infrastructures: A study of online criminal organization and techniques. Criminal Justice Studies, 22, 261–271.
Renfrow, D. G., & Rollo, E. A. (2014). Sexting on campus: Minimizing perceived risks and neutralizing behaviors. Deviant Behavior, 35, 903–920.
Rid, T. (2013). Cyber war will not take place. Hurst & Company.
Risk-Based Security. (2021). 2020 Year end report: Data breach quickview. Available online at: https://pages.riskbasedsecurity.com/hubfs/Reports/2020/2020%20Year%20End%20Data%20Breach%20QuickView%20Report.pdf
Siponen, M., Vance, A., & Willison, R. (2012). New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs. Information & Management, 49, 334–341.
Smallridge, J. L., & Roberts, J. R. (2013). Crime specific neutralizations: An empirical examination of four types of digital piracy. International Journal of Cyber Criminology, 7, 125–140.
Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34, 495–518.
Steinmetz, K. F. (2015). Craft(y)ness. British Journal of Criminology, 55, 125–145.
Sykes, M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Society of Criminology, 22, 664–670.
Turgeman-Goldschmidt, O. (2008). Meanings that hackers assign to their being a hacker. International Journal of Cyber Criminology, 2, 382–396.
Turgeman-Goldschmidt, O. (2009). The rhetoric of hackers’ neutralisations. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the Internet (pp. 315–335). Pearson.
Turton, W., & Mehrotra, K. (2021, June 4). Hackers breached Colonial Pipeline using compromised password. Bloomberg. Available online at: https://www.bloomberg.com/news/articles/2021-06-04/hackers-breached-colonial-pipeline-using-compromised-password
Ulsperger, J. S., Hodges, S. H., & Paul, J. (2010). Pirates on the plank: Neutralization theory and the criminal downloading of music among generation Y in the era of late modernity. Journal of Criminal Justice and Popular Culture, 17, 124–151.
Vysotsky, S., & McCarthy, A. L. (2017). Normalizing cyberracism: A neutralization theory analysis. Journal of Crime and Justice, 40, 446–461.
Yu, S. (2013). Digital piracy justification: Asian students versus American students. International Criminal Justice Review, 23, 185–196.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Bossler, A.M. Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks. Am J Crim Just 46, 911–934 (2021). https://doi.org/10.1007/s12103-021-09654-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12103-021-09654-5