How Hackers Think: a Mixed Method Study of Mental Models and Cognitive Patterns of High-Tech Wizards
Total Page:16
File Type:pdf, Size:1020Kb
HOW HACKERS THINK: A MIXED METHOD STUDY OF MENTAL MODELS AND COGNITIVE PATTERNS OF HIGH-TECH WIZARDS by TIMOTHY C. SUMMERS Submitted in partial fulfillment of the requirements For the degree of Doctor of Philosophy Dissertation Committee: Kalle Lyytinen, Ph.D., Case Western Reserve University (chair) Mark Turner, Ph.D., Case Western Reserve University Mikko Siponen, Ph.D., University of Jyväskylä James Gaskin, Ph.D., Brigham Young University Weatherhead School of Management Designing Sustainable Systems CASE WESTERN RESERVE UNIVESITY May, 2015 CASE WESTERN RESERVE UNIVERSITY SCHOOL OF GRADUATE STUDIES We hereby approve the thesis/dissertation of Timothy C. Summers candidate for the Doctor of Philosophy degree*. (signed) Kalle Lyytinen (chair of the committee) Mark Turner Mikko Siponen James Gaskin (date) February 17, 2015 *We also certify that written approval has been obtained for any proprietary material contained therein. © Copyright by Timothy C. Summers, 2014 All Rights Reserved Dedication I am honored to dedicate this thesis to my parents, Dr. Gloria D. Frelix and Dr. Timothy Summers, who introduced me to excellence by example and practice. I am especially thankful to my mother for all of her relentless support. Thanks Mom. DISCLAIMER The views expressed in this dissertation are those of the author and do not reflect the official policy or position of the Department of Defense, the United States Government, or Booz Allen Hamilton. Table of Contents List of Tables ..................................................................................................................... ix List of Figures ..................................................................................................................... x Acknowledgements ............................................................................................................ xi Abstract ............................................................................................................................. xii INTRODUCTION .............................................................................................................. 1 The History of Hacking ................................................................................................... 3 The First Generation Hackers ......................................................................................... 4 The Second Generation Hackers ..................................................................................... 8 The Third Generation Hackers ...................................................................................... 11 The Fourth Generation Hackers .................................................................................... 16 LITERATURE REVIEW ................................................................................................. 21 Pragmatism .................................................................................................................... 22 Learning ........................................................................................................................ 23 Forward Thinking .......................................................................................................... 25 Knowledge Acquisition and Transfer ........................................................................... 27 Intrinsic individual characteristics ............................................................................. 27 Creativity ................................................................................................................... 27 Curiosity .................................................................................................................... 28 Perceived Skills ............................................................................................................. 29 Domain expertise ....................................................................................................... 29 Diagramming ............................................................................................................. 30 Perception of Environment............................................................................................ 32 Ambiguity tolerance .................................................................................................. 33 THEORETICAL FRAMING............................................................................................ 34 What is Known .............................................................................................................. 34 What We Do Not Know ................................................................................................ 35 A Tentative Theoretical Framework ............................................................................. 36 Mental models ........................................................................................................... 37 Skill acquisition ......................................................................................................... 38 Self-efficacy ............................................................................................................... 38 Flow ........................................................................................................................... 39 vi Systems thinking........................................................................................................ 40 RESEARCH PLAN .......................................................................................................... 41 RESEARCH METHODOLOGY...................................................................................... 43 Method – Hacker Study #1............................................................................................ 49 Method – Hacker Study #2............................................................................................ 50 Method – Hacker Study #3............................................................................................ 51 OVERVIEW OF RESULTS ............................................................................................. 51 Study I: How Hackers Think: A Study of Cybersecurity Experts and Their Mental Models ........................................................................................................................... 51 Summary of Findings ................................................................................................ 51 Study II: How Hackers Think: Understanding the Mental Models and Cognitive Patterns of High-Tech Wizards ..................................................................................... 54 Summary of Findings ................................................................................................ 54 Study III: How Hackers Think: Sociocultural Facets and Understanding Their Impact on the Hacker Mind ....................................................................................................... 55 DISCUSSION ................................................................................................................... 55 Limitations .................................................................................................................... 60 Qualitative ................................................................................................................. 61 Quantitative ............................................................................................................... 61 Mixed method: Design quality .................................................................................. 62 Mixed method: Interpretive rigor .............................................................................. 62 Implications for Practitioners ........................................................................................ 63 Future Research ............................................................................................................. 67 Hacker assessments. .................................................................................................. 67 Performance outcomes. ............................................................................................. 67 Comparison with other populations. .......................................................................... 68 CONCLUSION ................................................................................................................. 70 Appendix A: How Hackers Think: A Study of Cybersecurity Experts and Their Mental Models............................................................................................................................... 71 Appendix B: How Hackers Think: Understanding the Mental Models and Cognitive Patterns of High-Tech Wizards ....................................................................................... 101 Appendix C: How Hackers Think: Sociocultural Facets and Understanding Their Impact on the Hacker Mind ........................................................................................................ 146 vii REFERENCES ............................................................................................................... 201 viii List of Tables Table 1: What We Know Concerning Hackers and Their Mental Models ....................... 34 Table 2: Unknowns Concerning Hackers and Their Mental Models ............................... 35 Table 3: Mapping Research Questions to Theoretical Frameworks ................................. 43