Skip to main content

Ilk Hunting: Newbies, Cyberpunks, Coders and the Search for Elusive, Ego-Twisted, Talented Computer Hackers

  • Chapter
International Handbook on Giftedness

Abstract

Talented computer hackers enjoy leverage within the larger computing community, a level of in- fluence that may be turned toward both positive and negative activities. Hackers, however, are differentiated along several characteristics. So, this effort to understand talented computer hackers (1) reviews a taxonomy of computer hackers; (2) blends three theories (the social psychology of creativity, social identity theory, and a motivational hierarchy of needs); (3) reports empirical findings regarding the demographic characteristics, social roles, and personality observations of hackers; and (4) adds observations from a long-time participant in the IT culture.We use the social psychology of creativity to offer three propositions that can contribute to our understanding and management of talented computer hackers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 669.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 849.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 849.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Adam, A. E. (2003). Hacking into hacking: Gender and the hacker phenomenon. Computers and Society, 33, 3.

    Google Scholar 

  • Amabile, T. M. (2001). Beyond talent: John Irving and the passionate craft of creativity. American Psychologist, 13, 333–336.

    Article  Google Scholar 

  • Amabile, T. M. (1996). Creativity in context. Boulder, CO: Westview Press.

    Google Scholar 

  • Amabile, T. M. (1983). The social psychology of creativity. Springer-Verlag: New York.

    Google Scholar 

  • Answers.com. Bill Gates, Business Personality. Retrieved January 6, 2007, from http://www.answers.com/topic/bill-gates.

  • Arief, B. & Besnard, D. (2003) Technical and human issues in computer-based systems security. University of Newcastle upon Tyne: Newcastle upon Tyne.

    Google Scholar 

  • Baumeister, R. F., & Muraven, M. (1996). Identity as adaptation to social, cultural, and historical context. Journal of Adolescence, 19(5), 405–416.

    Article  Google Scholar 

  • Blankenship, L. (aka The Mentor) (1986). The Conscience of a Hacker (The Hacker Manifesto it. ). Archives of the underground ezine Phrack. Retrieved January 3, 2007, from http://www.phrack.org/archives/7/P07-03.

  • Canetti, E. (1973). Crowds and Power. New York: Continuum.

    Google Scholar 

  • Chandler, A. (1996). The changing definition and image of hackers in popular discourse. International Journal of the Sociology of Law, 24, 229–251.

    Article  Google Scholar 

  • Csikszentmihalyi, M. (1996). Creativity: Flow and the Psychology of Discovery and Invention. New York: HarperCollins.

    Google Scholar 

  • Deci, E. L., Koestner, R., & Ryan, R. M. (1999). A meta-analytic review of experiments examining the effects of extrinsic rewards on intrinsic motivation. Psychological Bulletin, 125, 627–688.

    Article  Google Scholar 

  • Dibona, C., Ockman, S., & Stone, M. (Eds.). (1999). Open Sources: Voices from the Open Source Revolution. Sebastopol, CA: O’Reilly Media.

    Google Scholar 

  • Erickson, S. K., & McKnight, M. S. (2001). The Practitioner’s Guide to Mediation: A Client-Centered Approach. Hoboken, NJ: John Wiley & Sons.

    Google Scholar 

  • Free Software Foundation, The. Retrieved January 4, 2007, from http://www.fsf.org.

  • Friedman, T. (2005). The World is Flat. (A brief history of the twenty-first century). New York: Farrar, Straus, Reese, and Giroux.

    Google Scholar 

  • Goleman, D. (2006). Social Intelligence. New York: Bantam Dell.

    Google Scholar 

  • Hafner, K., & Markoff, J. (1995). Cyberpunks: Outlaws and hackers on the computer frontier. Toronto: Simon and Schuster.

    Google Scholar 

  • Hagib, R. (1999). History of Linux. Retrieved January 4, 2007, from https://netfiles.uiuc.edu/rhasan/linux.

  • Haney, C., Banks, C., & Zimbardo, P. (1973). Interpersonal dynamics in a simulated prison. International Journal of Criminology & Penology, 1(1), 69–97.

    Google Scholar 

  • Heinzen, T. (1995). The ethical evaluation bias. Creativity Research Journal, 8(4). Special issue: Attributional approach to creativity. pp. 417–422.

    Article  Google Scholar 

  • HOPE Number Six (Hackers on Planet Earth, 2006). Retrieved January 12, 2007, from http://www.hopenumbersix.net.

  • Jordan, T., & Taylor, P. (1998). A sociology of hackers. The Sociological Review, 46, 757.

    Article  Google Scholar 

  • Lakhani, K. R., & Wolf, R. G. (2005). Why hackers do what they do: Understanding motivation and effort in free/open source software projects. In J. Feller, B. Fitzgerald, S. A. Hissam, & K. R. Lakhani (Eds.), Perspectives on Free and Open Source Software (pp. 3–21). Cambridge, MA: MIT Press.

    Google Scholar 

  • Levy, S. (1984). Hackers. New York: Anchor/Doubleday (Random House).

    Google Scholar 

  • Lewis, D. A., & Gonzalez-Burgos, G. (2000). Intrinsic excitatory connections in the prefrontal cortex and the pathophysiology of schizophrenia. Brain Research Bulletin, 52, 309–317.

    Article  Google Scholar 

  • Li, C. L., DeGiuseppe, R., & Froh, J. (2006). The roles of sex, gender, and coping in adolescent depression. Adolescence, 41, 409–415.

    Google Scholar 

  • Linus Torvalds. (n.d.). Retrieved January 4, 2007, from Wikipedia - The Free Encyclopedia: http://en.wikipedia.org/wiki/Linus_Torvalds.

  • Littman, J. (1995). The Fugitive Game: online with Kevin Mitnick. Toronto: Little Brown & Company.

    Google Scholar 

  • Maslow, A. H. (1943). A Theory of Human Motivation. Psychological Review, 50, 370–396.

    Article  Google Scholar 

  • Maslow, A. H. (1958). A dynamic theory of human motivation. In C. L. Stacy & M. Demartino, (Eds.), Understanding human motivation, (pp. 26–47), Cleveland, OH: Howard Allen Publishers.

    Chapter  Google Scholar 

  • Maverick, The. (2005). An Interview with Linus Torvalds. Retrieved January 4, 2007, from http://hs.riverdale.k12.or.us/maverick/?q=node/257.

  • Mischel, W., & Shoda, Y. (1995). A cognitive-affective system theory of personality: Reconceptualizing situations, dispositions, dynamics, and invariance in personality structure. Psychological Review, 102, 246–268.

    Article  Google Scholar 

  • MIT Computer Science and Artificial Intelligence Laboratory (CSAIL). Retrieved January 4, 2007, from http:// www.csail.mit.edu.

  • Nakamura, J., & Csikszentmihalyi, M. (2002). The construction of meaning through vital engagement. In C. Keyes & J. Haidt (Eds.), Flourishing (pp. 83–104). Washington, DC: American Psychological Association Books.

    Google Scholar 

  • Onorato, R. S., & Turner, J. C. (2004). Fluidity in the self-concept: The shift from personal to social identity. European Journal of Social Psychology, 34, 257–278.

    Article  Google Scholar 

  • Parker, D. (1998). Fighting computer crime: A new framework for protecting information. New York: John Wiley & Sons, Inc.

    Google Scholar 

  • Picciano, E. M. (1974). Personal communication.

    Google Scholar 

  • Post, J., Shaw, E. & Ruby, K. (1998). Information terrorism and the dangerous insider. Paper presented at the meeting of InfowarCon’98, Washington, DC.

    Google Scholar 

  • Rogers, M. (2002). A New Hacker Taxonomy. Retrieved December 27, 2006, from http://www.dvara.net/HK/taxonomy.doc.

  • Shonkoff. J. P., & Phillips, D. A. (Eds.). (2000). From Neurons to Neighborhoods: The Science of Early Childhood Development. Washington, DC: National Academy Press.

    Google Scholar 

  • Silver, J. (Producer), Wachowski, L., & Wachowski, A. (Directors). (1999). The Matrix [Motion picture]. United States: Warner Brothers Entertainment.

    Google Scholar 

  • Sisk, C. L., & Foster, D. L. (2004). The neural basis of puberty and adolescence, Nature Neuroscience, 7, 1040–1042.

    Article  Google Scholar 

  • Stallman, R. (1996). Richard Stallman’s Personal Home Page. Retrieved January 4, 2007, from http://www.stallman.org.

  • Stallman, R. (1998). The GNU Project. Retrieved January 12, 2007, from http://www.gnu.org/gnu/thegnuproject.html.

  • Stallman, R. (2002). Free Software, Free Society: Selected Essays of Richard M. Stallman. Boston: GNU Press.

    Google Scholar 

  • Sterling, B. (1992). The Hacker crackdown: Law and disorder on the electronic frontier. Toronto: Bantam Books.

    Google Scholar 

  • Suls, J., Martin, R., & Wheeler, L. (2002). Social comparison: Why, with whom, and with what effect? Current Directions in Psychological Science, 11, 159.

    Article  Google Scholar 

  • Tajfel, H., & Turner, J. C. (1986). The social identity theory of inter-group behavior. In S. Worchel & L. W. Austin (Eds.), Psychology of intergroup relations. Chicago: Nelson-Hall.

    Google Scholar 

  • Tajfel, H. (1974). Social identity and intergroup behavior. Social Science Information, 13, 65–93.

    Article  Google Scholar 

  • Taylor, D. (2006). Signs U R 2Wired . Retrieved January 4, 2007, from http://dpaultaylor57.blogspot.com/2006/12/signs-u-r-2wired.html.

  • Thurlow, C. (2002). High-schoolers’ peer orientation priorities: A snapshot. Journal of Adolescence, 25, 341–349.

    Article  Google Scholar 

  • Torvalds, L. (1991). Linus Torvalds announces Linux. Retrieved January 4, 2007, from http://www.linux.org/people/linus_post.html.

  • Torvalds, L., & Diamond, D. (2001). Just for Fun (The Story of an Accidental Revolutionary). New York: Collins.

    Google Scholar 

  • Voiskounsky, A. E., & Smyslova, O. V. (2003). Flow-based models of computer hackers’ motivation, CyberPsychology & Behavior, 6, 171–180.

    Article  Google Scholar 

  • Ward, M. (2000). Hacking: A History. Retrieved Jan 12, 2007 from http://news.bbc.co.uk/1/hi/sci/tech/994700.stm.

  • Wark, M. (2004). A Hacker Manifesto. Cambridge, MA.: Harvard University Press.

    Google Scholar 

  • Winship, G. (2006). Further thoughts on the process of restraint. Journal of Psychiatric and Mental Health Nursing, 13, 55–60.

    Article  Google Scholar 

  • Woo, H., Kim,Y., & Dominick, F. (2004). Hackers: Militants or merry pranksters? A content analysis of defaced web pages. Media Psychology, 6, 63–82.

    Article  Google Scholar 

  • Yar, M. (2005). Computer hacking: Just another case of juvenile delinquency? Howard Journal of Criminal Justice, 44(4), 387–399.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media B.V.

About this chapter

Cite this chapter

Heinzen, T.E., Picciano, L.M. (2009). Ilk Hunting: Newbies, Cyberpunks, Coders and the Search for Elusive, Ego-Twisted, Talented Computer Hackers. In: Shavinina, L.V. (eds) International Handbook on Giftedness. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-6162-2_39

Download citation

Publish with us

Policies and ethics