Wishing to be like the character on screen: Media exposure and perception of hacking behavior



This research addressed whether exposure to media, which increasingly portrays hacker characters across diverse media domains, may predict perceptions of others’ willingness to hack. Specifically, this study assessed how wishful identification with hacker characters may contribute to individuals’ perception of hacking behaviors. One-hundred forty-nine North American participants were recruited using MTurk.com. Participants reported (1) their exposure to general media and perceived identification with a fictional hacker character, and (2) their perceived risks, payoffs, and estimated willingness of others to engage in hacker behaviors regarding a specific call to hack. Additionally, this research examined differences in the effects of media exposure on hacking likelihood between two types of hacks: financial hacking attacks and hacktivism attacks. Results show (1) that perceived payoffs of hacking, but not perceived risks, predict individuals’ estimation of hacker behaviors, (2) a significant and positive indirect effect between media exposure and estimation of others’ willingness to hack passes through wishful identification and perceived payoffs of hacking attacks, and (3) no significant differences in the above relationships between the two types of hacks. Together, these findings highlight that media exposure may increase positive perceptions of hackers and in turn increase the perception of pervasiveness and legitimacy of engaging in hacking behaviors.

Wishful identification; game theory; cyber attacks; hacking; hacktivism; computer crimes

Alberici, I. A., Milesi, P., Malfermo, P., Marzana, D., & Canfora, R. (2012). Comparing social movements and political parties' activism: The psychosocial predictors of collective action and the role of the internet. Contention: The Multidisciplinary Journal of Social Protest, 0(0).

Alpcan, T., & Basar, T. (2003, December). A game theoretic approach to decision and analysis in network intrusion detection. In Proceedings of the IEEE Conference on Decision and Control (Vol. 3, pp. 2595–2600). IEEE.

American Psychological Association. (1993). Violence & youth: Psychology’s response. Volume I: Summary report of the American Psychological Association Commission on Violence and Youth. https://www.apa.org/pi/prevent-violence/resources/violence-youth.pdf

Andison, F. S. (1977). TV violence and viewer aggression: A cumulation of study results 1956-1976. Public Opinion Quarterly, 41(3), 314–331. https://doi.org/10.1086/268390

Ayres, J., & Hopf, T. (1992). Visualization: Reducing speech anxiety and enhancing performance. Communication Reports, 5(1), 1–10. http://dx.doi.org/10.1080/08934219209367538

Ayres, J., & Hopf, T. S. (1985). Visualization: A means of reducing speech anxiety. Communication Education, 34(4), 318–323. http://dx.doi.org/10.1080/03634528509378623

Ayres, J., & Hopf, T. S. (1990). The long‐term effect of visualization in the classroom: A brief research report. Communication Education, 39(1), 75–78. https://doi.org/10.1080/03634529009378788

Barber, R. (2001). Hackers profiled – Who are they and what are their motivations? Computer Fraud & Security, 2001(2), 14–17. https://doi.org/10.1016/S1361-3723(01)02017-6

Ben-Zur, H., & Zeidner, M. (2009). Threat to life and risk-taking behaviors: A review of empirical findings and explanatory models. Personality and Social Psychology Review, 13(2), 109–128. https://doi.org/10.1177/1088868308330104

Bergal, J. (2017, January 10). ‘Hacktivists’ increasingly target local and state government computers. The Pew Charitable Trusts: Research & Analysis. http://www.pewtrusts.org/en/research-and-analysis/blogs/stateline/2017/01/10/hacktivists-increasingly-target-local-and-state-government-computers

Bodford, J. E., & Kwan, V. S. Y. (2018). A game theoretical approach to hacktivism: Is attack likelihood a product of risks and payoffs? Cyberpsychology, Behavior, and Social Networking, 21(2), 73–77. https://doi.org/10.1089/cyber.2016.0706

Bond, B. J., & Drogos, K. L. (2014). Sex on the shore: Wishful identification and parasocial relationships as mediators in the relationship between Jersey Shore exposure and emerging adults' sexual attitudes and behaviors. Media Psychology, 17(1), 102-126. https://doi.org/10.1080/15213269.2013.872039

Borrett, L. (2010, August 24). Hackers, crackers, script-kiddies, cyber-spies: Can you spot the bad guy? Australian Anthill Magazine. http://anthillonline.com/hackers-crackers-script-kiddies-cyber-spies-can-you-spot-the-bad-guy/

Calzo, J. P. & Ward, L. M. (2009). Media exposure and viewers' attitudes toward homosexuality: Evidence for mainstreaming or resonance? Journal of Broadcasting & Electronic Media, 53(2), 280–299. https://doi.org/10.1080/08838150902908049

Coleman, G. (2011). Hacker politics and publics. Public Culture, 23(3), 511–516. https://doi.org/10.1215/08992363-1336390

Coleman, G. (2012). Coding freedom: The ethics and aesthetics of hacking. Princeton University Press. https://doi.org/10.2307/j.ctt1r2gbj

Cheryan, S., Plaut, V. C., Handron, C., & Hudson, L. (2013). The stereotypical computer scientist: Gendered media representations as a barrier to inclusion for women. Sex Roles, 69(1-2), 58–71. https://doi.org/10.1007/s11199-013-0296-x

Crawley, D. (2014, June 3). 12 games that teach kids to code — and are even fun, too. Venture Beat. https://venturebeat.com/2014/06/03/12-games-that-teach-kids-to-code/

Dworak, M., Schierl, T., Bruns, T., & Strüder, H. K. (2007). Impact of singular excessive computer game and television exposure on sleep patterns and memory performance of school-aged children. Pediatrics, 120(5), 978–985. https://doi.org/10.1542/peds.2007-0476

Fischer, P., Greitemeyer, T., Kastenmüller, A., Vogrincic, C., & Sauer, A. (2011). The effects of risk-glorifying media exposure on risk-positive cognitions, emotions, and behaviors: A meta-analytic review. Psychological Bulletin, 137(3), 367–390. https://doi.org/10.1037/a0022267

Fischer, P., Guter, S., & Frey, D. (2008). The effects of risk-promoting media on inclinations toward risk taking. Basic and Applied Social Psychology, 30(3), 230–240. https://doi.org/10.1080/01973530802375029

Fischer, P., Kubitzki, J., Guter, S., & Frey, D. (2007). Virtual driving and risk taking: Do racing games increase risk-taking cognitions, affect, and behaviors? Journal of Experimental Psychology: Applied, 13(1), 22–31. https://doi.org/10.1037/1076-898X.13.1.22

Fiske, S. T. (1998). Stereotyping, prejudice, and discrimination. In D. T. Gilbert, S. T. Fiske, & G. Lindzey (Eds.), The handbook of social psychology (4th ed., Vol. 2, pp. 357–411). McGraw-Hill.

Fiske, S. T., Cuddy, A. J. C., Glick, P., & Xu, J. (2002). A model of (often mixed) stereotype content: Competence and warmth respectively follow from perceived status and competition. Journal of Personality and Social Psychology, 82(6), 878–902. https://doi.org/10.1037/0022-3514.82.6.878

Garcia, V., & Arkerson, S. G. (2017). Crime, media, and reality: Examining mixed messages about crime and justice in popular media. Rowman & Littlefield.

Gerbner, G., Gross, L., Morgan, M., Signorielli, N., & Shanahan, J. (2002). Growing up with television: Cultivation processes. In J. Bryant & D. Zillmann (Eds.), Media effects: Advances in theory and research (pp. 43–68). Lawrence Erlbaum Associates, Inc.

Gonsalves, A. (2003). Experts say the MSBlaster author is a 'script kiddie'; experts say that the teen arrested by the FBI is, if guilty, a lightweight, not a highly sophisticated virus writer. Business Insights: Global.

Gordon, D. (2010). Forty years of movie hacking: Considering the potential implications of the popular media representation of computer hackers from 1968 to 2008. International Journal of Internet Technology and Secured Transactions, 2(1-2), 59–87. https://doi.org/10.1504/IJITST.2010.031472

Graham, L. (2017, September 20). The number of devastating cyberattacks is surging – and it’s likely to get much worse. CNBC: Cybersecurity. https://www.cnbc.com/2017/09/20/cyberattacks-are-surging-and-more-data-records-are-stolen.html

Greenwood, D. N. (2007). Are female action heroes risky role models? Character identification, idealization, and viewer aggression. Sex Roles, 57(9-10), 725–732, http://dx.doi.org/10.1007/s11199-007-9290-5

Greitzer, F. L., Kangas, L. J., Noonan, C. F., & Dalton, A. C. (2010). Identifying at-risk employees: A behavioral model for predicting potential insider threats (Report No. PNNL-19665). U.S. Department of Energy. https://www.pnnl.gov/main/publications/external/technical_reports/PNNL-19665.pdf.

Hayes, A. F. (2017). Introduction to mediation, moderation, and conditional process analysis: A regression-based approach. Guilford Publications.

Henry, K. B., Arrow, H., & Carini, B. (1999). A tripartite model of group identification: Theory and measurement. Small Group Research, 30(5), 558–581. https://doi.org/10.1177/104649649903000504

Hilton, J. L., & von Hippel, W. (1996). Stereotypes. Annual Review of Psychology, 47, 237–271. https://doi.org/10.1146/annurev.psych.47.1.237

Hoffner, C. (1996). Children's wishful identification and parasocial interaction with favorite television characters. Journal of Broadcasting & Electronic Media, 40(3), 389–402. https://doi.org/10.1080/08838159609364360

Hoffner, C., & Buchanan, M. (2005). Young adults' wishful identification with television characters: The role of perceived similarity and character attributes. Media Psychology, 7(4), 325–351. https://doi.org/10.1207/S1532785XMEP0704_2

Holt, T. J., & Schell, B. H. (Eds.). (2010). Corporate hacking and technology-driven crime: Social dynamics and implications. IGI Global. https://doi.org/10.4018/978-1-61692-805-6

Hu, L., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A Multidisciplinary Journal, 6(1), 1–55. https://doi.org/10.1080/10705519909540118

Johnson, J. G., Cohen, P., Smailes, E. M., Kasen, S., & Brook, J. S. (2002). Television viewing and aggressive behavior during adolescence and adulthood. Science, 295(5564), 2468–2471. https://doi.org/10.1126/science.1062929

Jordan, T. & Taylor, P. (2004). Hacktivism and cyberwars: Rebels with a cause? Routledge. https://doi.org/10.4324/9780203490037

Kelty, C. M. (2008). Two bits: The cultural significance of free software. Duke University Press. https://doi.org/10.1215/9780822389002

Konijn, E. A., Nije Bijvank, M., & Bushman, B. J. (2007). I wish I were a warrior: The role of wishful identification in the effects of violent video games on aggression in adolescent boys. Developmental Psychology, 43(4), 1038–1044. https://doi.org/10.1037/0012-1649.43.4.1038

Krawczyk, K. (2014, June 10). Cyber crime costs the world more money than some natural disasters do. Digital Trends. http://www.digitaltrends.com/computing/new-study-says-cyber-crime-costs-hundreds-of-billions-per-year

Long, M., Steinke, J., Applegate, B., Knight Lapinski, M., Johnson, M. J., & Ghosh, S. (2010). Portrayals of male and female scientists in television programs popular among middle school-age children. Science Communication, 32(3), 356–382. https://doi.org/10.1177/1075547009357779

MacCallum, R. C., Browne, M. W., & Sugawara, H. M. (1996). Power analysis and determination of sample size for covariance structure modeling. Psychological Methods, 1(2), 130–149. https://doi.org/10.1037/1082-989X.1.2.130

Mansfield-Devine, S. (2011). Hacktivism: Assessing the damage. Network Security, 2011(8), 5–13. https://doi.org/10.1016/S1353-4858(11)70084-8

Massa, F. G. (2011). Out of bounds: Anonymous’ transition to collective action. Academy of Management Proceedings 2011(1). https://doi.org/10.5465/ambpp.2011.65869486

Milan, S. (2013). Social movements and their technologies: Wiring social change. Palgrave Macmillan. https://doi.org/10.1057/9781137313546

Minnebo, J. & Eggermont, S. (2007). Watching the young use illicit drugs: Direct experience, exposure to television and the stereotyping of adolescents' substance use. Young, 15(2), 129–144. https://doi.org/10.1177/110330880701500202

Nabi, R. L. & Sullivan, J. L. (2001). Does television viewing relate to engagement in protective action against crime? A cultivation analysis from a theory of reasoned action perspective. Communication Research, 28(6), 802–825. https://doi.org/10.1177/009365001028006004

Palmer, C. C. (2001). Ethical hacking. IBM Systems Journal, 40(3), 769–780. https://doi.org/10.1147/sj.403.0769

Ponemon Institute. (2012). 2012 cost of cyber crime study: United States. https://www.ponemon.org/local/upload/file/2012_US_Cost_of_Cyber_Crime_Study_FINAL6%20.pdf

Rainie, L., Anderson, J., & Connolly, J. (2014). Cyber attacks likely to increase. Pew Research Center: Internet & Technology. http://www.pewinternet.org/2014/10/29/cyber-attacks-likely-to-increase/

Reinganum, J. F. (1981). On the diffusion of new technology: A game theoretic approach. The Review of Economic Studies, 48(3), 395–405. https://doi.org/10.2307/2297153

Robertson, L. A., McAnally, H. M., & Hancox, R. J. (2013). Childhood and adolescent television viewing and antisocial behavior in early adulthood. Pediatrics, 131(3), 439–446. https://doi.org/10.1542/peds.2012-1582

Rosewarne, L. (2016). Cyberbullies, cyberactivists, cyberpredators: Film, TV, and Internet stereotypes. ABC-CLIO.

Ross, L., Greene, D., & House, P. (1977). The “false consensus effect”: An egocentric bias in social perception and attribution processes. Journal of Experimental Social Psychology, 13(3), 279–301. https://doi.org/10.1016/0022-1031(77)90049-X

Ryan, R. M., & Deci, E. L. (2000). Self-determination theory and intrinsic motivation, social development, and well-being. American Psychologist, 55(1), 68–78. https://doi.org/10.1037/0003-066X.55.1.68

Sauter, M. (2013). “LOIC will tear us apart”: The impact of tool design and media portrayals in the success of activist DDOS attacks. American Behavioral Scientist, 57(7), 983–1007. https://doi.org/10.1177/0002764213479370

Segan, S. (2000). Female hackers battle sexism to get ahead. ABC News. http://www.mujeresenred.net/spip.php?article1543 http://abcnews.go.com/Technology/story?id=99341&page=1

Sinclair, S., & Smith, S. W. (2008). Preventative directions for insider threat mitigation via access control. In S. J. Stolfo, S. M. Bellovin, S. Hershkop, S. W. Smith, & S. Sinclair (Eds.), Insider attack and cyber security: Beyond the hacker (pp. 165–194). Springer. https://doi.org/10.1007/978-0-387-77322-3_10

Strasburger, V. C., Donnerstein, E. I. (2000). Children, adolescents, and the media in the 21st century. Adolescent Medicine (Philadelphia, Pa.), 11(1), 51–68.

Surette, R. (2002). Self-reported copycat crime among a population of serious and violent juvenile offenders. Crime & Delinquency, 48(1), 46–69. https://doi.org/10.1177/0011128702048001002

Suzuki, M., & Nakayama, M. (1976). The cost assignment of the cooperative water resource development: A game theoretical approach. Management Science, 22(10), 1081–1086. https://doi.org/10.1287/mnsc.22.10.1081

Tanczer, L. M. (2016). Hacktivism and the male-only stereotype. New Media & Society, 18(8), 1599–1615. https://doi.org/10.1177/1461444814567983

The Council of Economic Advisers. (2018). The cost of malicious cyber activity to the U.S. economy. https://www.whitehouse.gov/wp-content/uploads/2018/03/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf

Vingilis, E., & Smart, R. G. (2009). Street racing: A neglected research area? Traffic Injury Prevention, 10(2), 148–156. https://doi.org/10.1080/15389580802641753

von Neumann, J. (1928). Die zerlegung eines intervalles in abzählbar viele kongruente teilmengen. Fundamenta Mathematicae, 11, 230–238. https://doi.org/10.4064/fm-11-1-230-238

Wiederhold, B. K. (2014). The role of psychology in enhancing cybersecurity. Cyberpsychology, Behavior, and Social Networking, 17(3), 131–132. https://doi.org/10.1089/cyber.2014.1502

Wikipedia contributors. (2020, February 2). List of fictional hackers. Wikipedia, The Free Encyclopedia.https://en.wikipedia.org/w/index.php?

Young, R. Zhang, L., & Prybutok, V. R. (2007). Hacking into the minds of hackers. Information Systems Management, 24(4), 281–287. http://dx.doi.org/10.1080/10580530701585823

Zajonc, R. B. (1968). Attitudinal effects of mere exposure. Journal of Personality and Social Psychology, 9(2, Pt.2), 1–27. https://doi.org/10.1037/h0025848

Züger, T., Milan, S., & Tanczer, L. M. (2015). FCJ–192 Sand in the information society machine: How digital technologies change and challenge the paradigms of civil disobedience. The Fibreculture Journal, 26, 108–135. https://doi.org/10.15307/fcj.26.192.2015





PDF views