Intention to Hack? Applying the Theory of Planned Behaviour to Youth Criminal Hacking
Abstract
:1. Introduction
2. Understanding the Phenomenology of Hacking and Profile of Hackers
3. Application of Academic Theory
4. Research Aim
5. Hypothesis Development
5.1. Hacking Behaviour
5.2. Behavioural Intention
5.3. Attitudes
5.4. Subjective Norms
5.5. Perceived Behavioural Control
5.6. Demographic Variable: Age
5.7. Demographic Variable: Gender
5.8. Human Factor: Risk-Seeking
5.9. Human Factor: Toxic Online Disinhibition
5.10. Human Factor: Offline Deviant Behaviour
6. Method
6.1. Participants
6.2. Procedure
6.3. Measures
6.4. Hacking Behaviour
6.5. Behavioural Intention
6.6. Attitudes
6.7. Subjective Norm
6.8. Perceived Behavioural Control
6.9. Toxic Online Disinhibition
6.10. Offline Deviant Behaviour
6.11. Risk-seeking
6.12. Data Analysis
7. Results
7.1. Descriptive Findings
7.2. Fit of Measurement Model
7.3. Fit of Structural Model: TPB Constructs
7.4. Fit of Structural Model: Human Factors
7.5. Effect of Age and Gender on Model Constructs
8. Discussion
8.1. Result Summary
8.2. Limitations and Future Research
8.3. Application of Findings
9. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Johnson, S.B.; Blum, R.W.; Giedd, J.N. Adolescent maturity and the brain: The promise and pitfalls of neuroscience research in adolescent health policy. J. Adolesc. Health 2009, 45, 216–221. [Google Scholar] [CrossRef]
- Odgers, C.L.; Jensen, M.R. Adolescent development and growing divides in the digital age. Dialogues Clin. Neurosci. 2022, 22, 143–149. [Google Scholar] [CrossRef]
- Rideout, V.; Peebles, A.; Mann, S.; Robb, M.B. Common Sense Census: Media Use by Tweens and Teens, 2021. Common Sense. 2022. Available online: https://www.commonsensemedia.org/sites/default/files/research/report/8-18-census-integrated-report-final-web_0.pdf (accessed on 27 September 2023).
- Davidson, J.; Aiken, M.; Phillips, K.; Farr, R. 2022 Research Report. CC-DRIVER. 2022. Available online: https://www.ccdriver-h2020.com/publications (accessed on 11 September 2023).
- Logos, K.; Rubinshtein, S.; Brewer, R.; Whitten, T.; Cale, J.; Holt, T.; Goldsmith, A. South Australian Digital Youth Survey Research Report: Year 3 Results; University of Adelaide: Adelaide, Australia, 2021; Available online: https://researchoutput.csu.edu.au/en/publications/south-australian-digital-youth-survey-research-report-year-3-resu#:~:text=Access%20to%20Document-,https%3A//digital.library.adelaide.edu.au/dspace/handle/2440/134755,-Fingerprint (accessed on 1 January 2020).
- Cioban, S.; Lazăr, A.R.; Bacter, C.; Hatos, A. Adolescent deviance and cyber-deviance. A systematic literature review. Front. Psychol. 2021, 12, 748006. [Google Scholar] [CrossRef]
- Young, S.; Greer, B.; Church, R. Juvenile delinquency, welfare, justice and therapeutic interventions: A global perspective. BJPsych Bull. 2017, 41, 21–29. [Google Scholar] [CrossRef] [PubMed]
- Payne, B.K. Defining cybercrime. In The Palgrave Handbook of International Cybercrime and Cyberdeviance; Holt, T.J., Bossler, A.M., Eds.; Palgrave Macmillan: Cham, Switzerland, 2020; pp. 3–25. [Google Scholar] [CrossRef]
- Phillips, K.; Davidson, J.C.; Farr, R.R.; Burkhardt, C.; Caneppele, S.; Aiken, M.P. Conceptualizing cybercrime: Definitions, typologies and taxonomies. Forensic Sci. 2022, 2, 379–398. [Google Scholar] [CrossRef]
- McGuire, M.; Dowling, S. Cybercrime: A Review of the Evidence: Summary of Key Findings and Implications. Home Office. 2013. Available online: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/246749/horr75-summary.pdf (accessed on 20 September 2023).
- Council of Europe. Convention on Cybercrime. European Treaty Series No. 185. 2001, pp. 1–22. Available online: https://rm.coe.int/1680081561 (accessed on 18 September 2023).
- Viano, E.C. Cybercrime: Definition, typology, and criminalization. In Cybercrime, Organized Crime, and Societal Responses; Viano, E.C., Ed.; Springer International Publishing: Cham, Switzerland, 2017; pp. 3–22. [Google Scholar]
- Brewer, R.C.; Cale, J.; Goldsmith, A.; Holt, T. Young people, the Internet, and emerging pathways into criminality: A study of Australian adolescents. Int. J. Cyber Criminol. 2018, 12, 115–132. [Google Scholar] [CrossRef]
- Schell, B. Internet addiction and cybercrime. In The Palgrave Handbook of International Cybercrime and Cyberdeviance; Holt, T.J., Bossler, A.M., Eds.; Palgrave Macmillan: Cham, Switzerland, 2020; pp. 679–703. [Google Scholar] [CrossRef]
- Aiken, M.; Davidson, J.; Amann, P. Youth Pathways into Cybercrime. Paladin Capital Group. 2016. Available online: https://www.paladincapgroup.com/wp-content/uploads/2016/11/Pathways-White-Paper-US-final-1.pdf (accessed on 17 September 2023).
- NCA [National Crime Agency]. Pathways into Cyber Crime. National Crime Agency Unit/Prevent Team. 13 January 2017. Available online: https://www.nationalcrimeagency.gov.uk/who-we-are/publications/6-pathways-into-cyber-crime-1/file (accessed on 17 September 2023).
- Holt, T.J.; Bossler, A. Cybercrime in Progress: Theory and Prevention of Technology-Enabled Offenses; Routledge: Abingdon, UK, 2015. [Google Scholar] [CrossRef]
- Back, S.; Soor, S.; LaPrade, J. Juvenile hackers: An empirical test of self-control theory and social bonding theory. Int. J. Cybersecur. Intell. Cybercrime 2018, 1, 40–55. [Google Scholar] [CrossRef]
- Bachmann, M. The risk propensity and rationality of computer hackers. Int. J. Cyber Criminol. 2010, 4, 643–656. [Google Scholar]
- Chua, Y.T.; Holt, T.J. A cross-national examination of the techniques of neutralization to account for hacking behaviors. Vict. Offenders 2016, 11, 534–555. [Google Scholar] [CrossRef]
- Jordan, T.; Taylor, P. A sociology of hackers. Sociol. Rev. 1998, 46, 757–780. [Google Scholar] [CrossRef]
- Steinmetz, K.; Gerber, J. “It doesn’t have to be this way”: Hacker perspectives on privacy. Soc. Justice 2015, 41, 29–51. Available online: https://www.jstor.org/stable/24361631 (accessed on 16 September 2023).
- Turgeman-Goldschmidt, O. Hackers’ accounts: Hacking as a social entertainment. Soc. Sci. Comput. Rev. 2005, 23, 8–23. [Google Scholar] [CrossRef]
- Turgeman-Goldschmidt, O. Meanings that hackers assign to their being a hacker. Int. J. Cyber Criminol. 2008, 2, 382–396. Available online: https://www.cybercrimejournal.com/pdf/Orlyijccdec2008.pdf (accessed on 20 September 2023).
- Yar, M. Computer hacking: Just Another case of juvenile delinquency? Howard J. Crim. Justice 2005, 44, 387–399. [Google Scholar] [CrossRef]
- Zhang, L.; Young, R.; Prybutok, V. A comparison of the inhibitors of hacking vs. shoplifting. In Evolutionary Concepts in End User Productivity and Performance: Applications for Organizational Progress; Clarke, S., Ed.; IGI Global: Hershey, PA, USA, 2008; pp. 63–77. [Google Scholar] [CrossRef]
- Bossler, A. Contributions of criminological theory to the understanding of cybercrime offending and victimization. In The Human Factor of Cybercrime; Leukfeldt, R., Holt, T.J., Eds.; Routledge: Abingdon, UK, 2019; pp. 29–59. [Google Scholar]
- Ajzen, I. From intentions to actions: A theory of planned behavior. In Action Control; Kuhl, J., Beckmann, J., Eds.; SSSP Springer Series in Social Psychology; Springer: Berlin/Heidelberg, Germany, 1985; pp. 11–39. [Google Scholar] [CrossRef]
- Ajzen, I.; Fishbein, M. Understanding Attitudes and Predicting Social Behavior; Prentice-Hall: Upper Saddle River, NJ, USA, 1980. [Google Scholar]
- Owen, K. Motivation and Demotivation of Hackers in the Selection of a Hacking Task: A Contextual Approach. Ph.D. Thesis, McMaster University, Hamilton, ON, Canada, 2016. [Google Scholar]
- Jeong, J.; Mihelcic, J.; Oliver, G.; Rudolph, C. Towards an improved understanding of human factors in cybersecurity. In Proceedings of the 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC), Los Angeles, CA, USA, 12–14 December 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 338–345. [Google Scholar] [CrossRef]
- Ajzen, I. The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 1991, 50, 179–211. [Google Scholar] [CrossRef]
- Heirman, W.; Walrave, M. Predicting adolescent perpetration in cyberbullying: An application of the theory of planned behavior. Psicothema 2012, 24, 614–620. Available online: https://www.psicothema.com/pdf/4062.pdf (accessed on 26 September 2023).
- Walrave, M.; Heirman, W.; Hallam, L. Under pressure to sext? Applying the theory of planned behaviour to adolescent sexting. Behav. Inf. Technol. 2014, 33, 86–98. [Google Scholar] [CrossRef]
- Chng, S.; Lu, H.Y.; Kumar, A.; Yau, D. Hacker types, motivations and strategies: A comprehensive framework. Comput. Hum. Behav. Rep. 2022, 5, 100167. [Google Scholar] [CrossRef]
- EUROPOL. Pandemic Profiteering: How Criminals Exploit the COVID-19 Crisis; European Union Agency for Law Enforcement Cooperation: The Hague, The Netherlands, 2020. Available online: https://www.europol.europa.eu/cms/sites/default/files/documents/pandemic_profiteering-how_criminals_exploit_the_covid-19_crisis.pdf (accessed on 20 September 2023).
- NCA. Rise in School Cyber Crime Attacks Sparks NCA Education Drive. National Crime Agency. 17 January 2022. Available online: https://www.nationalcrimeagency.gov.uk/news/rise-in-school-cyber-crime-attacks-sparks-nca-education-drive (accessed on 20 September 2023).
- Armitage, C.J.; Conner, M. Efficacy of the theory of planned behaviour: A meta-analytic review. Br. J. Soc. Psychol. 2001, 40, 471–499. [Google Scholar] [CrossRef]
- Holt, T.J.; Brewer, R.; Goldsmith, A. Digital drift and the “sense of injustice”: Counter-productive policing of youth cybercrime. Deviant Behav. 2019, 40, 1144–1156. [Google Scholar] [CrossRef]
- Matza, D. Delinquency & Drift; Wiley: Hoboken, NJ, USA, 1964. [Google Scholar]
- Holt, T.J. Computer hacking and the hacker subculture. In The Palgrave Handbook of International Cybercrime and Cyberdeviance; Holt, T.J., Bossler, A.M., Eds.; Palgrave Macmillan: Cham, Switzerland, 2020; pp. 725–742. [Google Scholar] [CrossRef]
- Staggs, S.; McMichael, S.L.; Kwan, V.S.Y. Wishing to be like the character on screen: Media exposure and perception of hacking behavior. Cyberpsychol. J. Psychosoc. Res. Cyberspace 2020, 14, 4. [Google Scholar] [CrossRef]
- The Mentor. The Conscience of a Hacker. Phrack 1986, 1, 15. Available online: http://phrack.org/issues/7/3.html (accessed on 28 January 2024).
- Steinberg, L. Adolescence, 12th ed.; McGraw Hill Education: Maidenhead, UK, 2020. [Google Scholar]
- Whitbourne, S.K. Life Span Development; American Psychological Association: New York, NY, USA, 2012. [Google Scholar]
- Spear, L.P. The adolescent brain and age-related behavioral manifestations. Neurosci. Biobehav. Rev. 2000, 24, 417–463. [Google Scholar] [CrossRef] [PubMed]
- Pratt, T.C.; Cullen, F.T.; Sellers, C.S.; Thomas Winfree, L.J., Jr.; Madensen, T.D.; Daigle, L.E.; Fearn, N.C.; Gau, J.M. The empirical status of social learning theory: A meta-analysis. Justice Q. 2010, 27, 765–802. [Google Scholar] [CrossRef]
- Bossler, A.M.; Burruss, G.W. The general theory of crime and computer hacking: Low self-control hackers? In Corporate Hacking and Technology Driven Crime: Social Dynamics and Implications; Holt, T.J., Schell, B.H., Eds.; IGI Global: Hershey, PA, USA, 2011; pp. 38–67. [Google Scholar] [CrossRef]
- Skinner, W.F.; Fream, A.M. A social learning theory analysis of computer crime among college students. J. Res. Crime Delinq. 1997, 34, 495–518. [Google Scholar] [CrossRef]
- Holt, T.J. Examining the role of technology in the formation of deviant subcultures. Soc. Sci. Comput. Rev. 2010, 28, 466–481. [Google Scholar] [CrossRef]
- Holt, T.J. Subcultural evolution? Examining the influence of on and off-line experiences on deviant subcultures. Deviant Behav. 2007, 28, 171–198. [Google Scholar] [CrossRef]
- Schell, B.H.; Dodge, J.L. The Hacking of America: Who’s Doing it, Why, and How; Greenwood Publishing Group, Inc.: Westport, CT, USA, 2002. [Google Scholar]
- Sterling, B. The Hacker Crackdown: Law and Disorder on the Electronic Frontier; Penguin: London, UK, 1994. [Google Scholar]
- Taylor, P. Hackers: Crime and the Digital Sublime, 1st ed.; Routledge: Abingdon, UK, 1999. [Google Scholar] [CrossRef]
- Gilboa, N. Elites, lamers, narcs, and whores: Exploring the computer underground. In Wired_Women; Cherny, L., Weise, E.R., Eds.; Seal Press: Cypress, CA, USA, 1996; pp. 98–113. [Google Scholar]
- Marcum, C.D.; Higgins, G.E.; Ricketts, M.L.; Wolfe, S.E. Hacking in high school: Cybercrime perpetration by juveniles. Deviant Behav. 2014, 35, 581–591. [Google Scholar] [CrossRef]
- Barbieri, D.; Caisl, J.; Karu, M.; Lanfredi, G.; Mollard, B.; Peciukonis, V.; Salanauskaitė, L. Gender Equality Index 2020: Digitalisation and the Future of Work; European Institute for Gender Equality (EIGE): Vilnius, Lithuania, 2020; Available online: https://eige.europa.eu/sites/default/files/documents/mhaf20001enn_002.pdf (accessed on 20 September 2023).
- Heimer, K.; De Coster, S. Crime and gender. In International Encyclopedia of the Social & Behavioural Sciences; Smelser, N.J., Baltes, P.B., Eds.; Elsevier Science Ltd.: Amsterdam, The Netherlands, 2001; pp. 2918–2921. [Google Scholar]
- Gottfredson, M.R.; Hirschi, T. A General Theory of Crime; Stanford University Press: Redwood City, CA, USA, 1990. [Google Scholar]
- Holt, T.J.; Bossler, A.M.; May, D.C. Low self-control, deviant peer associations, and juvenile cyberdeviance. Am. J. Crim. Justice 2012, 37, 378–395. [Google Scholar] [CrossRef]
- Udris, R. Cyber deviance among adolescents and the role of family, school, and neighborhood: A cross-national study. Int. J. Cyber Criminol. 2016, 10, 127–146. Available online: http://www.cybercrimejournal.com/Udrisvol10issue2IJCC2016 (accessed on 26 September 2023).
- Grasmick, H.G.; Tittle, C.R.; Bursik, R.J., Jr.; Arneklev, B.J. Testing the core empirical implications of Gottfredson and Hirschi’s general theory of crime. J. Res. Crime Delinq. 1993, 30, 5–29. [Google Scholar] [CrossRef]
- Suler, J. The online disinhibition effect. Cyberpsychology Behav. 2004, 7, 321–326. [Google Scholar] [CrossRef]
- Soudijn, M.R.J.; Zegers, B.C.H.T. Cybercrime and virtual offender convergence settings. Trends Organ. Crime 2021, 15, 111–129. [Google Scholar] [CrossRef]
- Udris, R. Psychological and social factors as predictors of online and offline deviant behavior among Japanese adolescents. Deviant Behav. 2017, 38, 792–809. [Google Scholar] [CrossRef]
- Goldsmith, A.; Brewer, R. Digital drift and the criminal interaction order. Theor. Criminol. 2014, 19, 112–130. [Google Scholar] [CrossRef]
- Cale, J.; Whitten, T.; Brewer, R.; de Vel-Palumbo, M.; Goldsmith, A.; Holt, T. South Australian Digital Youth Survey Research Report: Year 1 Results; University of Adelaide: Adelaide, Australia, 2019. [Google Scholar]
- Sabillon, R.; Cavaller, V.; Cano, J.; Serra-Ruiz, J. Cybercriminals, cyberattacks and cybercrime. In Proceedings of the 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF), Vancouver, BC, Canada, 12–14 June 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–9. [Google Scholar] [CrossRef]
- Ajzen, I. Design and evaluation guided by the theory of planned behavior. In Social Psychology Evaluation; Mark, M.M., Donaldson, S.I., Campbell, B.C., Eds.; The Guilford Press: New York, NY, USA, 2011; pp. 74–100. [Google Scholar]
- Udris, R. Cyberbullying among high school students in Japan: Development and validation of the online disinhibition scale. Comput. Hum. Behav. 2014, 41, 253–261. [Google Scholar] [CrossRef]
- Sanches, C.; Gouveia-Pereira, M.; Marôco, J.; Gomes, H.; Roncon, F. Deviant behavior variety scale: Development and validation with a sample of Portuguese adolescents. Psicol. Reflexão Crítica 2016, 29, 31–38. [Google Scholar] [CrossRef]
- Muthén, L.K.; Muthén, B.O. Mplus User’s Guide. Version 8.7; Muthén & Muthén: Los Angeles, CA, USA, 2021; Available online: https://www.statmodel.com/download/usersguide/MplusUserGuideVer_8.pdf (accessed on 20 September 2023).
- Brown, T.A. Confirmatory Factor Analysis for Applied Research; The Guilford Press: New York, NY, USA, 2006. [Google Scholar]
- Kline, R.B. Principles and Practices of Structural Equation Modelling, 2nd ed.; The Guilford Press: New York, NY, USA, 2005. [Google Scholar]
- Bentler, P.M. Comparative fit indexes in structural models. Psychol. Bull. 1990, 107, 238–246. [Google Scholar] [CrossRef]
- Tucker, L.R.; Lewis, C. Reliability coefficients for maximum likelihood factor-analysis. Psychometrika 1973, 38, 1–10. [Google Scholar] [CrossRef]
- Steiger, J.H. Structural model evaluation and modification: An interval estimation approach. Multivar. Behav. Res. 1990, 25, 173–180. [Google Scholar] [CrossRef]
- Byrne, B.M. Structural Equation Modeling with AMOS: Basic Concepts, Applications, and Programming; Lawrence Erlbaum Associates Publishers: Mahwah, NJ, USA, 2001. [Google Scholar]
- Hu, L.; Bentler, P.M. Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Struct. Equ. Model. 1999, 6, 1–55. [Google Scholar] [CrossRef]
- Ponnet, K. Financial stress, parent functioning and adolescent problem behavior: An actor-partner interdependence approach to family stress processes in low-, middle-, and high-income families. J. Youth Adolesc. 2014, 43, 1752–1769. [Google Scholar] [CrossRef] [PubMed]
- Holt, T.J.; Navarro, J.N.; Clevenger, S. Exploring the moderating role of gender in juvenile hacking behaviors. Crime Delinq. 2020, 66, 1533–1555. [Google Scholar] [CrossRef]
- Goldsmith, A.; Wall, D.S. The seductions of cybercrime: Adolescence and the thrills of digital transgression. Eur. J. Criminol. 2019, 19, 98–117. [Google Scholar] [CrossRef]
- Moore, G.F.; Rothwell, H.; Segrott, J. An exploratory study of the relationship between parental attitudes and behaviour and young people’s consumption of alcohol. Subst. Abus. Treat. Prev. Policy 2010, 5, 6. [Google Scholar] [CrossRef]
- Wachs, S.; Wright, M.F. The moderation of online disinhibition and sex on the relationship between online hate victimization and perpetration. Cyberpsychol. Behav. Soc. Netw. 2019, 22, 300–306. [Google Scholar] [CrossRef]
- Logan-Greene, P.L.; Nurius, P.S.; Herting, J.R.; Walsh, E.; Thompson, E.A. Violent victimization and perpetration: Joint and distinctive implications for adolescent development. Vict. Offenders 2010, 5, 329–353. [Google Scholar] [CrossRef]
- UK Safer Internet Centre. Safer Internet Day 2023. UK Safer Internet Centre. 2022. Available online: https://saferinternet.org.uk/safer-internet-day/safer-internet-day-2023 (accessed on 27 September 2023).
Male | Female | Identify in Another Way | Prefer Not to Say | Total | |||||
---|---|---|---|---|---|---|---|---|---|
n | % | n | % | n | % | n | % | ||
UK | 237 | 48.67 | 232 | 47.64 | 16 | 3.29 | 2 | 0.41 | 487 |
Spain | 244 | 47.84 | 253 | 49.61 | 10 | 1.96 | 3 | 0.59 | 510 |
France | 243 | 45.94 | 267 | 50.47 | 12 | 2.27 | 7 | 1.32 | 529 |
Germany | 251 | 50.20 | 237 | 47.40 | 10 | 2.00 | 2 | 0.40 | 500 |
Italy | 237 | 48.97 | 224 | 46.28 | 20 | 4.13 | 3 | 0.62 | 484 |
Netherlands | 201 | 43.04 | 252 | 53.96 | 9 | 1.93 | 5 | 1.07 | 467 |
Romania | 243 | 48.50 | 249 | 49.70 | 6 | 1.20 | 3 | 0.60 | 501 |
Sweden | 177 | 48.10 | 180 | 48.91 | 7 | 1.90 | 4 | 1.09 | 368 |
Norway | 62 | 44.60 | 74 | 53.24 | 2 | 1.44 | 1 | 0.72 | 139 |
Total | 1895 | 47.55 | 1968 | 49.39 | 92 | 2.31 | 30 | 0.75 | 3985 |
Min | Max | Mean | SD | |
---|---|---|---|---|
Behaviour | ||||
I have engaged in hacking. | 0 | 4 | 0.25 | 0.66 |
Intention | ||||
I intend to engage in hacking. | 1 | 7 | 1.5 | 1.17 |
I expect to hack someone’s computer. | 1 | 7 | 1.46 | 1.09 |
I plan to hack a computer. | 1 | 7 | 1.43 | 1.08 |
Attitudes | ||||
Legal—Illegal | 1 | 7 | 6.14 | 1.61 |
Right—Wrong | 1 | 7 | 5.95 | 1.66 |
Normal—Not normal | 1 | 7 | 5.63 | 1.76 |
Not serious—Serious | 1 | 7 | 5.98 | 1.58 |
Not harmful—Harmful | 1 | 7 | 5.97 | 1.59 |
Not risky—Risky | 1 | 7 | 6.07 | 1.56 |
Subjective Norm Parents | ||||
My parent(s)/guardians would not have a problem with me hacking someone’s computer. | 1 | 7 | 1.71 | 1.52 |
My parent(s)/guardians would approve of me hacking someone’s computer. | 1 | 7 | 1.54 | 1.23 |
Subjective Norm Friends | ||||
My friends would not have a problem if I engage in computer hacking. | 1 | 7 | 2.18 | 1.75 |
My friends would approve of me hacking someone’s computer. | 1 | 7 | 2.00 | 1.59 |
Perceived Behavioural Control | ||||
I have the skills to hack a computer. | 1 | 7 | 1.73 | 1.38 |
It is easy for me to hack a computer. | 1 | 7 | 1.62 | 1.26 |
I am able to hack a computer. | 1 | 7 | 1.78 | 1.46 |
Online (Toxic) Disinhibition | ||||
I don’t mind writing insulting things about others online, because it’s anonymous. | 0 | 3 | 0.41 | 0.78 |
It is easy to write insulting things online because there are no repercussions. | 0 | 3 | 1.02 | 1.09 |
There are no rules online therefore you can do whatever you want. | 0 | 3 | 0.61 | 0.88 |
Writing insulting things online is not bullying. | 0 | 3 | 0.46 | 0.84 |
Offline Deviant Behaviour | ||||
Used cocaine or heroin? | 0 | 4 | 0.2 | 0.65 |
Sold drugs (e.g., hash, weed, cocaine, ecstasy, amphetamines, etc.)? | 0 | 4 | 0.21 | 0.68 |
Drawn graffiti on buildings or other locations (e.g., school, public transports, walls, etc.)? | 0 | 4 | 0.27 | 0.73 |
Used a motorbike or a car to go for a ride without the owner’s permission? | 0 | 4 | 0.21 | 0.67 |
Used LSD (“acid”), ecstasy (“tablets”), or amphetamines (“speed”)? | 0 | 4 | 0.23 | 0.7 |
Stolen something worth more than 50 euros (e.g., in shops, at school, from someone, etc.)? | 0 | 4 | 0.23 | 0.7 |
Hit an adult (e.g., teacher, family, security guard, etc.)? | 0 | 4 | 0.26 | 0.72 |
Broken into a car, a house, shop, school, or other building? | 0 | 4 | 0.24 | 0.7 |
Damaged or destroyed public or private property (e.g., parking meters, traffic signs, product distribution machines, cars, etc.)? | 0 | 4 | 0.25 | 0.69 |
Carried a weapon (e.g., knife, pistol, etc.)? | 0 | 4 | 0.27 | 0.75 |
Risk-seeking | ||||
I like to test myself every now and then by doing something a little risky. | 1 | 4 | 2.04 | 0.97 |
Sometimes I will take a risk just for the fun of it. | 1 | 4 | 2.02 | 0.99 |
Excitement and adventure are more important to me than security. | 1 | 4 | 1.94 | 0.93 |
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | ||
---|---|---|---|---|---|---|---|---|---|
1 | Attitudes | ||||||||
2 | SN Parents | −0.408 | |||||||
3 | SN Friends | −0.378 | 0.761 | ||||||
4 | PBC | −0.274 | 0.472 | 0.484 | |||||
5 | Intention | −0.385 | 0.584 | 0.529 | 0.441 | ||||
6 | Behaviour | −0.400 | 0.424 | 0.365 | 0.382 | 0.544 | |||
7 | Offline Deviant Behaviour | −0.262 | 0.357 | 0.247 | 0.307 | 0.295 | 0.348 | ||
8 | Online Toxic Disinhibition | −0.243 | 0.348 | 0.369 | 0.327 | 0.284 | 0.263 | 0.458 | |
9 | Risk-Seeking | −0.086 | 0.194 | 0.257 | 0.240 | 0.166 | 0.148 | 0.262 | 0.369 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Aiken, M.P.; Davidson, J.C.; Walrave, M.; Ponnet, K.S.; Phillips, K.; Farr, R.R. Intention to Hack? Applying the Theory of Planned Behaviour to Youth Criminal Hacking. Forensic Sci. 2024, 4, 24-41. https://doi.org/10.3390/forensicsci4010003
Aiken MP, Davidson JC, Walrave M, Ponnet KS, Phillips K, Farr RR. Intention to Hack? Applying the Theory of Planned Behaviour to Youth Criminal Hacking. Forensic Sciences. 2024; 4(1):24-41. https://doi.org/10.3390/forensicsci4010003
Chicago/Turabian StyleAiken, Mary P., Julia C. Davidson, Michel Walrave, Koen S. Ponnet, Kirsty Phillips, and Ruby R. Farr. 2024. "Intention to Hack? Applying the Theory of Planned Behaviour to Youth Criminal Hacking" Forensic Sciences 4, no. 1: 24-41. https://doi.org/10.3390/forensicsci4010003
APA StyleAiken, M. P., Davidson, J. C., Walrave, M., Ponnet, K. S., Phillips, K., & Farr, R. R. (2024). Intention to Hack? Applying the Theory of Planned Behaviour to Youth Criminal Hacking. Forensic Sciences, 4(1), 24-41. https://doi.org/10.3390/forensicsci4010003