Hacker Personality Profiles Reviewed in Terms of the Big Five Personality Traits
Psychology and Behavioral Sciences
Volume 5, Issue 6, December 2016, Pages: 137-142
Received: Oct. 12, 2016; Accepted: Dec. 3, 2016; Published: Jan. 3, 2017
Views 8909      Downloads 242
Authors
Andik Matulessy, Faculty of Psychology Universitas 17 Agustus 1945, Surabaya, Indonesia
Nabilla H. Humaira, Faculty of Psychology Universitas 17 Agustus 1945, Surabaya, Indonesia
Article Tools
Follow on us
Abstract
As well as possessing advanced computer skills, hackers are typically highly intelligent. However, it is commonly assumed that hackers have personality traits that tend to be negative and detrimental in their effect on society. Hackers fall into three main categories: white hat hackers, grey hat hackers and black hat hackers. The aim of this study is to determine hacker personality profiles in relation to these categories. To do so, the author uses a measuring instrument focusing on the ‘big five personality traits’ – that is, openness to experience, conscientiousness, extraversion, agreeableness and neuroticism. This study focused on 30 hacker subjects and utilized descriptive qualitative research: the data collection techniques used were in the form of personality trait rating scales, interviews and research documents. Based on the research results pertaining to the 30 hacker subjects, it can be deduced that the white hats demonstrate agreeableness as a dominant personality trait, black hats openness to experience, and grey hats neuroticism.
Keywords
Hacker, White Hat, Black Hat, Grey Hat, Big Five Personality Traits
To cite this article
Andik Matulessy, Nabilla H. Humaira, Hacker Personality Profiles Reviewed in Terms of the Big Five Personality Traits, Psychology and Behavioral Sciences. Vol. 5, No. 6, 2016, pp. 137-142. doi: 10.11648/j.pbs.20160506.12
Copyright
Copyright © 2016 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
Azwar, Saifuddin. (2003). Reliabilitas dan validitas. Yogyakarta. Pustaka Pelajar.
[2]
Bowlby, John. (1973). Attachment and loss: Separation anxiety and Anger. Vol: 2. USA. The Tavistock Institute of Human Relations.
[3]
Bryman, A. (2012). Social Research Methods. 4-th edition. USA. Oxford University Press.
[4]
Digman, John M.; Inouye, Jillian. 1986. Further specification of the five robust factors of personality. Journal of Personality and Social Psychology. Vol 50 (1), Jan 1986, 116-123.
[5]
Eysenck, Hans J. (1981). A Model for personality, New York: Springer.
[6]
Goldberg, L. R. (1992). The development of markers for the big five factor structure. Psychological Assessment. 4. 26-42.
[7]
Graciano, W. G., Eisenberg, N. H. (1997). Agreeableness: A dimension of personality. In R. Horgan, J. Johnson & S. Briggs (Eds). Handbook of personality psychology. 795-824. San Diego. Academic Press.
[8]
Hadi, Sutrisno. 2000. Metodologi penelitian. Yogyakarta. Andi offset.
[9]
Hidayat. (2007). Rancangan analisis data. Jakarta. Pustaka Sinar Harapan.
[10]
Mc Crae, R. R., & Costa, P. T., Jr. (1985). Openness to experience. In Hogan R. & Jones, W. H. (Eds). Perspectives in personality. Vol: 1, 145-172. Greewich. JAI Press.
[11]
Mc Crae, R. R., & Costa, P. T., Jr. (1992). The five-factor model: Issues and application (special issue). Journal of personality. 60 (2).
[12]
Mc Crae, R. R., & Costa, P. T., Jr. (2003). Personality in adulthood: A five-factor theory perspective (2-nd edition). New York. Guilford Press.
[13]
Moleong, Lexy. (2002). Metodologi penelitian kualitatif. Bandung. PT Remaja Rosdakarya.
[14]
Mondak, Jeffery J. (2010). Personality and the Foundations of Political Behavior, New York: Cambridge University Press.
[15]
Moore, Robert (2005). Cybercrime: Investigating high technology computer crime. Matthew Bender & Company.
[16]
Mukhtar. (2013). Metode praktis penelitian deskriptif kualitatif, Jakarta: GP Press Group.
[17]
Peabody, D., Goldberg, L. R. (1989). Some determinants of factor structures from personality-trait descriptors. Journal of Personality and Social Psychology. 57. 552-567.
[18]
Pervin, Lawrence A., Cervone, Daniel., John, Oliver P. (2005). Personality: Theory and research. 9-edition. USA: Wiley.
[19]
Raymond, Eric. S. (1997). In the new hacker's dictionary version of the online hacker jargon file. version 4.2.0, was accessed on January 31, 2000.
[20]
Sugiyono. (2012). Memahami penelitian kualitatif. Bandung. Alfabeta.
[21]
Wiggins, J. S. (Ed.). (1996). The five-factor model of Personality: Theoritical perspectives. New York. Guilford Press.
[22]
Watson, David., Clark, Lee A., McIntyre, Curtis, W., Hamaker, Stacy. (1992). Affect, Personality and Social Activity. Journal of Personality and Social Psychology. Vol 63 (8). Dec 1992. 1011-1025.
[23]
http://en.wikipedia.org/wiki/Hacker_definition_controversy#Hacker_definition_controversy and http://en.wikipedia.org/wiki/Hacker_(computer_security) are accessed on November 9, 2013.
[24]
http://arsipkukuliahku.blogspot.com/2010/10/faktor-factors-which-mempengaruhi.html accessed on December 1, 2013.
[25]
http://arsipkukuliahku.blogspot.com/2010/10/faktor-factors-whichmempengaruhi.html and http://www.psychometric-success.com/personality-tests/personality-tests-big-5-aspects.html accessed on December 3, 2013).
[26]
http://www.academia.edu/4989941/penelitian_kualitatif_tahaptahap_penelitian_kualitatif, accessed on 25 April 2014).
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186