Table 1 - Purdue University

advertisement
Moral Choice and Traits 1
Abstract
This study was exploratory and designed to add to the growing body of knowledge in the
field of computer criminal behavior analysis. The study examined certain characteristics
of individuals engaged in computer criminal activity. Introductory psychology students
took part in the study as part of their course requirements for experimental credits (N =
381). The students filled out a battery of self-report questionnaires that measured their
frequency of criminal computer activity (Rogers, 2001), big-five factor traits (Goldberg,
1992), exploitive manipulative behavior (Altemeyer, 1995), and morality (Hladkyj,
2002). It was predicted that individuals engaging in criminal computer activities would
be introverted, antagonistic, undirected, neurotic and be more open to experience than
individuals who do not engage in criminal computer activities. The first hypothesis was
not supported by the findings. It was also hypothesized individuals engaging in criminal
computer activities would be more exploitive and manipulative than individuals who do
not engage in criminal computer activity. The second hypothesis was supported. The
third hypothesis predicted that individuals engaging in criminal computer activities would
have higher hedonistic morality than individuals who do not engage in criminal computer
activity. The third hypothesis was also not supported. Additional exploratory analyses
and the implications for future research are also discussed.
Background
With society’s increasing dependence on technology, we are becoming more vulnerable
to individuals who can exploit this technology. The rise of the Internet is as much a
societal revolution as it is a technical one (Rogers, 2001). The realm of cyberspace
competes with the “real world” for our attention, time and economic resources. The
dependence, both societal and technological, has not been lost on the criminal element of
our society. In the past few years, we have seen dramatic increases in criminal computer
behavior, and the accompanying losses to businesses and private citizens (Power, 2002).
The RCMP has reported that computer crime is one of the fastest growing criminal
categories in Canada (RCMP, 2003). The CSI/FBI’s 2002 computer crime survey
indicated that the business loss due to computer crime was nearly US $500,000 (Power,
2002).
The international community has recognized the danger and negative impact that
computer crime has on the world economy and on the personal lives of its constituents
(e.g., identity theft, fraud etc.). Several countries have passed legislation in an attempt to
deal with the growing crisis. Unfortunately, most of these laws have proven ineffective
in dealing with a criminal activity that transcends international borders, and our out dated
notions of legal jurisdictions (Parker, 1999).
Research to date indicates that criminal computer behavior is on the rise and will
continue to do so for the next few years (Power, 2002). It is important then that we
develop a reasonable understanding of those people who become involved in criminal
computer behavior. Part of this understanding must include personality characteristics,
motivations, and attraction to this new criminal behavior.
Moral Choice and Traits 2
The current study is exploratory and expands on the previous work of Skinner & Fream
(1997) and Rogers (2001). The study examined personality traits as operationalized by
Goldberg’s Big-Five Factor Model (i.e., extraversion, agreeableness, conscientiousness,
neuroticism, and openness to experience), moral decisions, and exploitive manipulative
behavior.
Hypotheses
1. Individuals engaging in criminal computer activities will be introverted,
antagonistic, undirected, neurotic and be more open to experience than individuals
who do not engage in criminal computer activities.
2. Individuals engaging in criminal computer activities will be more exploitive and
manipulative than individuals who do not engage in criminal computer activity.
3. Individuals engaging in criminal computer activities will have a higher rate of
hedonistic morality, and lower rates social and internal morality, than individuals
who do not engage in criminal computer activity.
Method
Participants
The participants consisted of 381 introductory psychology students. Their participations
was voluntary, but did form part of their course requirement for experimental participant
credits. The demographics of the participants can be found in table 1.
Instruments
1. Computer Crime Index (CCI) (Rogers, 2001) – measures the frequency and
prevalence of self-reported criminal computer activity.
2. Big-Five Factor Questionnaire (Goldberg, 1992) – self-report questionnaire
measuring personality traits based on five factors: extraversion (.87),
agreeableness (.90), conscientiousness (.84), neuroticism (.79), and openness to
experience (.79).
3. Exploitive Manipulative Amoral Dishonesty Scale (EMAD) (Altemeyer, 1995) –
self-report scale that measures the degree of exploitive and manipulative behavior
(.88 ).
4. Moral Decision Making Scale (MDKS) (Hladkyj, 2002) – adhoc self-report
questionnaire that measures participants moral decision making across three
subscales: Internal (.73), Social (.59), and Hedonistic (.71).
Moral Choice and Traits 3
Table 1
Responden t Demogr aphics
Gende r
Age
Marit al Status
Ethn ic ity
Male
Female
Mis sing
Total
Percentage
(Frequen cy)
45.1 (172)
54.9 (209)
0.0 (0)
100.0 (381.0)
Less than 18
18
19
20
21-22
23-25
26-30
31-36
37-45
46 or older
Mis sing
Total
0.5 (2)
27.8 (106)
27.6 (105)
13.9 (53)
13.4 (51)
9.7 (37)
4.2 (16)
0.5 (2)
1.8 (7)
0.3 (1)
0.3 (1)
100.0 (381)
Single
In relation no tcohab it ating
Comm on-law
Married
Separated
Divorced
Mis sing
Total
59.3 (226)
Caucas ian
Abo riginal
East Ind ian
Asian
Polynes ian
Middle Eastern
African
Central American
South A merican
Australi an
Mis sing
Total
69.8 (266)
5.5 (21)
4.5 (17)
13.4 (51)
0.3 (1)
0.3 (1)
2.4 (9)
1.3 (5)
0.8 (3)
1.0 (4)
0.8 (3)
100 (381)
32.5 (124)
3.7 (14)
2.4 (9)
0.5 (2)
1.3 (5)
0.3 (1)
100 (381)
Moral Choice and Traits 4
Table 2 Correlations
CCG
EMAD
EXT
AGR
NEU
OPN
CSN
MC-I
MC-S MC-H
CCG
1.00
EMAD
.15
1.00
EXT
.01
-.14
1.00
AGR
-.08
-.34
.42
1.00
NEU
-.05
-.12
.41
.37
1.00
OPN
.05
-.13
.47
.42
.39
1.00
CSN
-.08
-.18
.43
.52
.40
.52
1.00
MC-I
-.14
-.50
.13
.39
.09
.27
.28
1.00
MC-S
-.18
-.27
.03
.22
-.04
.02
.19
.56
1.00
MC-H
-.05
.04
.07
.08
.10
.13
.15
.38
.43
1.00
Note: CCG = Computer Crim e Frequency Grouped, EMAD = Exploitive
Manipul ative Total Score, EX T = Extrave rsion, AGR = Agreeable nes s, NEU
= Neuroticism, OPN = Openne ss to Exp erience, CNS = Conscientiousne ss,
MC-I = Moral Cho ice Internal, MC –S, = Moral Cho ice Social, MC-H =
Moral Cho ice Hedon ism
Results
The hypotheses were tested using multiple one-tailed t-tests (See Table 4). The power of
the tests were found to be .95
Moral Choice and Traits 5
Table 3 Descriptive Statistics
Descriptive
EMAD
MC-I
MC-S
Crimi nal Catego ry
M
SD
n
No Crim Activit y
71.77
24.13
171
Crim Activit y
79.06
24.50
172
Total
75.43
24.06
343
No Crim Activit y
29.02
4.20
188
Crim Activit y
27.82
4.60
192
Total
28.41
4.44
380
No Crim Activit y
26.14
4.50
186
Crim Activit y
24.41
4.85
189
Total
25.27
4.75
375
Note: EMAD = Exp loiti ve Manipulative Total S core, MC-I = Moral Choice Interna l,
MC –S, = Moral Choi ce Social.
Figure 1 Mean Comparisons
Mean Comparisons
80
70
60
50
No Criminal Activity
40
Criminal Activity
30
20
10
0
EMAD
MC-I
MC-S
Moral Choice and Traits 6
Table 4 T-Tests
Independen t Samples T-Test
t
df
95% Conf idenc e Interval
Lower
Upper
EMAD
2.84**
341
2.24
12.35
MC-I
-2.65**
378
-2.09
-.31
MC-S
-3.60**
373
-2.68
-.78
Note: EMAD = Exploiti ve Manipulative Total Score, MC-I = Moral Choi ce Internal,
MC –S = Moral Choice Social.
**p < .001.
Exploration
A logistic regression analysis was conducted using the variables identified as being
significant during the primary hypotheses testing (See Table 5)
Table 5 –Logistic Regression
Logistic Regression: Variables in Equation: Backward Stepwise Wald Procedure
Step 1
Step 2
EMAD
MC-I
MC-S
Constant
B
.01
.02
-.08
.41
SE
.01
.03
.03
1.12
Wald
4.15*
.49
6.85**
.14
Exp (B)
1.01
1.02
.93
1.51
EMAD
MC-S
Constant
.01
-.07
.96
.01
.03
.80
3.75*
7.01**
1.42
1.01
.94
2.60
Note: EMAD = Exploitive Manipulative Total Score, MC-I = Moral Choice Internal,
MC –S = Moral Choice Social.
*p < .05. **p < .001.
Moral Choice and Traits 7
Discussion
The findings indicate that there was no significant difference regarding the Big-Five
Factor traits between individuals who have engaged in criminal computer behavior and
those who have not. This is contrary to what had been hypothesized and more
importantly, contrary to the currently held stereotype of computer criminals (Verton,
2002).
The results indicated that computer criminals are more exploitive and manipulative. This
makes intuitive sense as these characteristics are consistent with criminals in general and
are not unique to computer criminals alone.
The findings did not support the hypothesis that computer criminals would tend to make
their moral decisions based more on hedonism than on internal or social morality. Here
again, the findings contradict previous research and commonly held stereotypes. Moral
decisions based on hedonism is roughly equivalent to being at Kholberg’s preconventional morality stage. Previous studies have indicated that computer criminals tend
to aggregate in the pre-conventional morality stage (Gordon, 2000).
Caution must be taken when interpreting the results as the findings are somewhat
preliminary, the study is exploratory, and two of the instruments used are new (CCI and
MDKS).
Despite the limitations of this study, it is an important step in the direction of developing
a better understanding of computer criminals.
Moral Choice and Traits 8
Selected References
Goldberg, L. (1992). The development of markers for the big-five factor
Psychological Assessment, 4, 26-42
structure.
Hollin, C. (1989). Psychology and crime: An introduction to criminological
psychology. New York: Routledge.
Parker, D. (1998). Fighting computer crime: A new framework for protecting
information. New York: John Wiley & Sons, Inc.
Power, R. (2002). CSI/FBI 2000 computer security survey. Computer Security Institute.
Rogers, M. (1999a). Psychology of hackers: Steps toward a new taxonomy.
Retrieved May 5, 1999 from the World Wide Web:
http://www.infowar.com
Rogers, M. (1999b). Psychology of computer criminals. Paper presented at the annual
Computer Security Institute Conference, St. Louis, Missouri.
Rogers, M. (2001). A social learning theory and moral disengagement analysis of
criminal computer behavior: An exploratory study. Unpublished doctoral
dissertation, University of Manitoba, Canada
Skinner, W., & Fream, A. (1997). A social learning theory analysis of computer crime
among college students. Journal of Research in Crime and Delinquency, 34, 495518.
Spafford, E. (1997). Are hacker break-ins ethical? In, Ermann, M., Williams, M. &
Shauf, M. (Eds.) Computers, ethics, and society. (pp. 77-88). New York: Oxford.
Download