Abstract
Talented computer hackers enjoy leverage within the larger computing community, a level of in- fluence that may be turned toward both positive and negative activities. Hackers, however, are differentiated along several characteristics. So, this effort to understand talented computer hackers (1) reviews a taxonomy of computer hackers; (2) blends three theories (the social psychology of creativity, social identity theory, and a motivational hierarchy of needs); (3) reports empirical findings regarding the demographic characteristics, social roles, and personality observations of hackers; and (4) adds observations from a long-time participant in the IT culture.We use the social psychology of creativity to offer three propositions that can contribute to our understanding and management of talented computer hackers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Adam, A. E. (2003). Hacking into hacking: Gender and the hacker phenomenon. Computers and Society, 33, 3.
Amabile, T. M. (2001). Beyond talent: John Irving and the passionate craft of creativity. American Psychologist, 13, 333–336.
Amabile, T. M. (1996). Creativity in context. Boulder, CO: Westview Press.
Amabile, T. M. (1983). The social psychology of creativity. Springer-Verlag: New York.
Answers.com. Bill Gates, Business Personality. Retrieved January 6, 2007, from http://www.answers.com/topic/bill-gates.
Arief, B. & Besnard, D. (2003) Technical and human issues in computer-based systems security. University of Newcastle upon Tyne: Newcastle upon Tyne.
Baumeister, R. F., & Muraven, M. (1996). Identity as adaptation to social, cultural, and historical context. Journal of Adolescence, 19(5), 405–416.
Blankenship, L. (aka The Mentor) (1986). The Conscience of a Hacker (The Hacker Manifesto it. ). Archives of the underground ezine Phrack. Retrieved January 3, 2007, from http://www.phrack.org/archives/7/P07-03.
Canetti, E. (1973). Crowds and Power. New York: Continuum.
Chandler, A. (1996). The changing definition and image of hackers in popular discourse. International Journal of the Sociology of Law, 24, 229–251.
Csikszentmihalyi, M. (1996). Creativity: Flow and the Psychology of Discovery and Invention. New York: HarperCollins.
Deci, E. L., Koestner, R., & Ryan, R. M. (1999). A meta-analytic review of experiments examining the effects of extrinsic rewards on intrinsic motivation. Psychological Bulletin, 125, 627–688.
Dibona, C., Ockman, S., & Stone, M. (Eds.). (1999). Open Sources: Voices from the Open Source Revolution. Sebastopol, CA: O’Reilly Media.
Erickson, S. K., & McKnight, M. S. (2001). The Practitioner’s Guide to Mediation: A Client-Centered Approach. Hoboken, NJ: John Wiley & Sons.
Free Software Foundation, The. Retrieved January 4, 2007, from http://www.fsf.org.
Friedman, T. (2005). The World is Flat. (A brief history of the twenty-first century). New York: Farrar, Straus, Reese, and Giroux.
Goleman, D. (2006). Social Intelligence. New York: Bantam Dell.
Hafner, K., & Markoff, J. (1995). Cyberpunks: Outlaws and hackers on the computer frontier. Toronto: Simon and Schuster.
Hagib, R. (1999). History of Linux. Retrieved January 4, 2007, from https://netfiles.uiuc.edu/rhasan/linux.
Haney, C., Banks, C., & Zimbardo, P. (1973). Interpersonal dynamics in a simulated prison. International Journal of Criminology & Penology, 1(1), 69–97.
Heinzen, T. (1995). The ethical evaluation bias. Creativity Research Journal, 8(4). Special issue: Attributional approach to creativity. pp. 417–422.
HOPE Number Six (Hackers on Planet Earth, 2006). Retrieved January 12, 2007, from http://www.hopenumbersix.net.
Jordan, T., & Taylor, P. (1998). A sociology of hackers. The Sociological Review, 46, 757.
Lakhani, K. R., & Wolf, R. G. (2005). Why hackers do what they do: Understanding motivation and effort in free/open source software projects. In J. Feller, B. Fitzgerald, S. A. Hissam, & K. R. Lakhani (Eds.), Perspectives on Free and Open Source Software (pp. 3–21). Cambridge, MA: MIT Press.
Levy, S. (1984). Hackers. New York: Anchor/Doubleday (Random House).
Lewis, D. A., & Gonzalez-Burgos, G. (2000). Intrinsic excitatory connections in the prefrontal cortex and the pathophysiology of schizophrenia. Brain Research Bulletin, 52, 309–317.
Li, C. L., DeGiuseppe, R., & Froh, J. (2006). The roles of sex, gender, and coping in adolescent depression. Adolescence, 41, 409–415.
Linus Torvalds. (n.d.). Retrieved January 4, 2007, from Wikipedia - The Free Encyclopedia: http://en.wikipedia.org/wiki/Linus_Torvalds.
Littman, J. (1995). The Fugitive Game: online with Kevin Mitnick. Toronto: Little Brown & Company.
Maslow, A. H. (1943). A Theory of Human Motivation. Psychological Review, 50, 370–396.
Maslow, A. H. (1958). A dynamic theory of human motivation. In C. L. Stacy & M. Demartino, (Eds.), Understanding human motivation, (pp. 26–47), Cleveland, OH: Howard Allen Publishers.
Maverick, The. (2005). An Interview with Linus Torvalds. Retrieved January 4, 2007, from http://hs.riverdale.k12.or.us/maverick/?q=node/257.
Mischel, W., & Shoda, Y. (1995). A cognitive-affective system theory of personality: Reconceptualizing situations, dispositions, dynamics, and invariance in personality structure. Psychological Review, 102, 246–268.
MIT Computer Science and Artificial Intelligence Laboratory (CSAIL). Retrieved January 4, 2007, from http:// www.csail.mit.edu.
Nakamura, J., & Csikszentmihalyi, M. (2002). The construction of meaning through vital engagement. In C. Keyes & J. Haidt (Eds.), Flourishing (pp. 83–104). Washington, DC: American Psychological Association Books.
Onorato, R. S., & Turner, J. C. (2004). Fluidity in the self-concept: The shift from personal to social identity. European Journal of Social Psychology, 34, 257–278.
Parker, D. (1998). Fighting computer crime: A new framework for protecting information. New York: John Wiley & Sons, Inc.
Picciano, E. M. (1974). Personal communication.
Post, J., Shaw, E. & Ruby, K. (1998). Information terrorism and the dangerous insider. Paper presented at the meeting of InfowarCon’98, Washington, DC.
Rogers, M. (2002). A New Hacker Taxonomy. Retrieved December 27, 2006, from http://www.dvara.net/HK/taxonomy.doc.
Shonkoff. J. P., & Phillips, D. A. (Eds.). (2000). From Neurons to Neighborhoods: The Science of Early Childhood Development. Washington, DC: National Academy Press.
Silver, J. (Producer), Wachowski, L., & Wachowski, A. (Directors). (1999). The Matrix [Motion picture]. United States: Warner Brothers Entertainment.
Sisk, C. L., & Foster, D. L. (2004). The neural basis of puberty and adolescence, Nature Neuroscience, 7, 1040–1042.
Stallman, R. (1996). Richard Stallman’s Personal Home Page. Retrieved January 4, 2007, from http://www.stallman.org.
Stallman, R. (1998). The GNU Project. Retrieved January 12, 2007, from http://www.gnu.org/gnu/thegnuproject.html.
Stallman, R. (2002). Free Software, Free Society: Selected Essays of Richard M. Stallman. Boston: GNU Press.
Sterling, B. (1992). The Hacker crackdown: Law and disorder on the electronic frontier. Toronto: Bantam Books.
Suls, J., Martin, R., & Wheeler, L. (2002). Social comparison: Why, with whom, and with what effect? Current Directions in Psychological Science, 11, 159.
Tajfel, H., & Turner, J. C. (1986). The social identity theory of inter-group behavior. In S. Worchel & L. W. Austin (Eds.), Psychology of intergroup relations. Chicago: Nelson-Hall.
Tajfel, H. (1974). Social identity and intergroup behavior. Social Science Information, 13, 65–93.
Taylor, D. (2006). Signs U R 2Wired . Retrieved January 4, 2007, from http://dpaultaylor57.blogspot.com/2006/12/signs-u-r-2wired.html.
Thurlow, C. (2002). High-schoolers’ peer orientation priorities: A snapshot. Journal of Adolescence, 25, 341–349.
Torvalds, L. (1991). Linus Torvalds announces Linux. Retrieved January 4, 2007, from http://www.linux.org/people/linus_post.html.
Torvalds, L., & Diamond, D. (2001). Just for Fun (The Story of an Accidental Revolutionary). New York: Collins.
Voiskounsky, A. E., & Smyslova, O. V. (2003). Flow-based models of computer hackers’ motivation, CyberPsychology & Behavior, 6, 171–180.
Ward, M. (2000). Hacking: A History. Retrieved Jan 12, 2007 from http://news.bbc.co.uk/1/hi/sci/tech/994700.stm.
Wark, M. (2004). A Hacker Manifesto. Cambridge, MA.: Harvard University Press.
Winship, G. (2006). Further thoughts on the process of restraint. Journal of Psychiatric and Mental Health Nursing, 13, 55–60.
Woo, H., Kim,Y., & Dominick, F. (2004). Hackers: Militants or merry pranksters? A content analysis of defaced web pages. Media Psychology, 6, 63–82.
Yar, M. (2005). Computer hacking: Just another case of juvenile delinquency? Howard Journal of Criminal Justice, 44(4), 387–399.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media B.V.
About this chapter
Cite this chapter
Heinzen, T.E., Picciano, L.M. (2009). Ilk Hunting: Newbies, Cyberpunks, Coders and the Search for Elusive, Ego-Twisted, Talented Computer Hackers. In: Shavinina, L.V. (eds) International Handbook on Giftedness. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-6162-2_39
Download citation
DOI: https://doi.org/10.1007/978-1-4020-6162-2_39
Publisher Name: Springer, Dordrecht
Print ISBN: 978-1-4020-6161-5
Online ISBN: 978-1-4020-6162-2
eBook Packages: Humanities, Social Sciences and LawEducation (R0)