652
Views
0
CrossRef citations to date
0
Altmetric
Research Article

The Morality Behind Supporting Crowdfunding Campaigns for Eco-Hacktivists

ORCID Icon & ORCID Icon
Pages 621-641 | Received 20 Mar 2023, Accepted 13 Sep 2023, Published online: 25 Sep 2023

References

  • Altbach, P. G. 2007. “Student politics: Activism and culture”. Pp. 329–45 in International Handbook of Higher Education, Dordrecht:Springer Netherlands. doi:10.1007/978-1-4020-4012-2_17.
  • Anderson, R., C. Barton, R. Böhme, R. Clayton, M. J. Van Eeten, M. Levi, and S. Savage, S. Savage. 2013. “Measuring the Cost of Cybercrime”. Pp. 265–300 in The Economics of Information Security and Privacy, Berlin, Heidelberg:Springer. doi:10.1007/978-3-642-39498-0_12.
  • Annas, J. 2006. “Virtue Ethics.” The Oxford Handbook of Ethical Theory 515–36. doi:10.1093/oxfordhb/9780195325911.003.0019
  • AnonymousTV [@youranontv]. 2022, February 26. JUST IN: #russian State TV Channels Have Been Hacked by #anonymous to Broadcast the Truth About What Happens in #ukraine. [video attached] [Tweet]. Twitter. (https://twitter.com/YourAnonTV/status/1497678663046905863?s=20&t=7j00tkh_KUmSo7YazDmkBQ).
  • Aquino, K., A. Reed II, S. Thau, and D. Freeman. 2007. “A Grotesque and Dark Beauty: How Moral Identity and Mechanisms of Moral Disengagement Influence Cognitive and Emotional Reactions to War.” Journal of Experimental Social Psychology 43(3):385–92. doi:10.1016/j.jesp.2006.05.013.
  • Armin, J., B. Thompson, and P. Kijewski. 2016. “Cybercrime economic costs: No measure no solution”. Pp. 135–55 in Combatting Cybercrime and Cyberterrorism, Cham:Springer International Publishing. doi:10.1007/978-3-319-38930-1_8.
  • Bandura, A. 1991. “Social Cognitive Theory of Self-Regulation.” Organizational Behavior and Human Decision Processes 50(2):248–87. doi:10.1016/0749-5978(91)90022-L.
  • Bandura, A. 1999. “Moral Disengagement in the Perpetration of Inhumanities.” Personality and Social Psychology Review 3(3):193–209. doi:10.1207/s15327957pspr0303_3.
  • Bandura, A. 2002. “Selective Moral Disengagement in the Exercise of Moral Agency.” Journal of Moral Education 31(2):101–19. doi:10.1080/0305724022014322.
  • Bandura, A. 2017. “Mechanisms of Moral Disengagement”. Pp. 85–115 in Insurgent Terrorism, in G. Mars, D. Nelken, and G. Cromer edited by, London, UK: Routledge. doi:10.4324/9781351155564-4.
  • Bandura, A., C. Barbaranelli, G. V. Caprara, and C. Pastorelli. 1996. “Mechanisms of Moral Disengagement in the Exercise of Moral Agency.” Journal of Personality and Social Psychology 71(2):364. doi:10.1037/0022-3514.71.2.364.
  • Barlett, C. P. 2015. “Anonymously Hurting Others Online: The Effect of Anonymity on Cyberbullying Frequency.” Psychology of Popular Media Culture 4(2):70–79. doi:10.1037/a0034335.
  • Baumeister, R. F., E. Bratslavsky, M. Muraven, and D. M. Tice. 1998. “Ego-Depletion: Is the Active Self a Limited Resource?” Journal of Personality and Social Psychology 74(5):1252–65. doi:10.1037/0022-3514.74.5.1252.
  • Beck, C. J. 2008. “The Contribution of Social Movement Theory to Understanding Terrorism.” Sociology Compass 2(5):1565–81. doi:10.1111/j.1751-9020.2008.00148.x.
  • Bowman, B. 2020. “‘They Don’t Quite Understand the Importance of What We’re Doing today’: The Young People’s Climate Strikes as Subaltern Activism.” Sustainable Earth 3(1):1–13. doi:https://doi.org/10.1186/s42055-020-00038-x.
  • Caldwell, T. 2015. “Hacktivism Goes Hardcore.” Network Security 2015(5):12–17. doi:10.1016/S1353-4858(15)30039-8.
  • Canadian Broadcasting Corporation. 2021Dec 02 How Indigenous Pipeline Resistance Keeps Emissions in the Ground CBC News. (https://www.cbc.ca/news/science/what-on-earth-indigenous-pipeline-resistance-1.6271187).
  • Carlsmith, K. M. 2008. “On Justifying Punishment: The Discrepancy Between Words and Actions.” Social Justice Research 21(2):119–37. doi:10.1007/s11211-008-0068-x.
  • Carlsmith, K. M. and J. M. Darley. 2008. “Psychological Aspects of Retributive Justice.” Advances in Experimental Social Psychology 40:193–236. doi:10.1016/S0065-2601(07)00004-4.
  • Chng, S., H. Y. Lu, A. Kumar, and D. Yau. 2022. “Hacker Types, Motivations and Strategies: A Comprehensive Framework.” Computers in Human Behavior Reports 5:100167. doi:10.1016/j.chbr.2022.100167.
  • Cota, A. A., Longman R Stewart, R. R. Holden, Fekken G Cynthia, and S. Xinaris 1993. “Interpolating 95Th Percentile Eigenvalues from Random Data: An Empirical Example.” Educational and Psychological Measurement 53(3):585–96. doi:10.1177/0013164493053003001.
  • Denning, D. E. 2001. “Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy.” in Pp. 239–88 in Networks and Netwars: The Future of Terror, Crime, and Militancy, edited by J. Arquilla and D. Ronfeldt. Pittsburgh, PA: RAND
  • Doffman, Z. ““Ashley Madison Hack Returns to ‘Haunt’ Its Victims: 32 Million Users Now Watch and Wait.” Forbes. Accessed Feb 1, 2020 (https://www.forbes.com/sites/zakdoffman/2020/02/01/ashley-madison-hack-returns-to-haunt-its-victims-32-million-users-now-have-to-watch-and-wait/?sh=5007a9415677).
  • Eagan, S. 1996. “From Spikes to Bombs: The Rise of Eco-Terrorism.” Studies in Conflict and Terrorism 19(1):1–18. doi:10.1080/10576109608435993.
  • Eamon, M. K. 2001. “Poverty, Parenting, Peer, and Neighborhood Influences on Young Adolescent Antisocial Behavior.” Journal of Social Service Research 28(1):1–23. doi:10.1300/J079v28n01_01.
  • Embar-Seddon, A. 2002. “Cyberterrorism: Are We Under Siege?” American Behavioral Scientist 45(6):1033–43. doi:10.1177/0002764202045006007.
  • Fletcher, R. 2018. “License to Kill: Contesting the Legitimacy of Green Violence.” Conservation & Society 16(2):147–56. doi:10.4103/cs.cs_16_148.
  • Galli, B. J. 2018. “How Ethics Impacts Hacktivism: A Reflection of Events.” International Journal of Qualitative Research in Services 3(1):11–20. doi:10.1504/IJQRS.2018.091536.
  • Gert, B. 2015. “The Definition of Morality.” The Stanford Encyclopedia of Philosophy. (https://plato.stanford.edu/archives/fall2015/entries/morality-definition/).
  • GoFundMe. 2022. “Giving Report: To 2021 with Gratitude.” GoFundme. (https://www.gofundme.com/c/gofundme-giving-report-2021).
  • Guzzetti, E., A. Sureda, S. Tejada, and C. Faggio. 2018. “Microplastic in Marine Organism: Environmental and Toxicological Effects.” Environmental Toxicology and Pharmacology 64:164–71. doi:10.1016/j.etap.2018.10.009.
  • Hadlington, L. 2018. “The “Human factor” in Cybersecurity: Exploring the Accidental Insider.” Pp. 1960–77 in Research Anthology on Artificial Intelligence Applications in Security, IGI Global. doi:10.4018/978-1-7998-7705-9.ch087
  • Hayes, A. F. 2012. PROCESS: A Versatile Computational Tool for Observed Variable Mediation, Moderation, and Conditional Process Modeling [White paper]. (http://www.afhayes.com/public/process2012.pdf).
  • Heering, M. S., G. A. Travaglino, D. Abrams, and E. Goldsack. 2020. ““If They Don’t Listen to Us, They Deserve it”: The Effect of External Efficacy and Anger on the Perceived Legitimacy of Hacking.” Group Processes & Intergroup Relations 23(6):863–81. doi:10.1177/1368430220937777.
  • Holt, T. J. and M. Kilger. 2012. “Examining Willingness to Attack Critical Infrastructure Online and Offline.” Crime & Delinquency 58(5):798–822. doi:10.1177/0011128712452963.
  • The Japan Times. 2023, Aug 18. “Hackers Attack Japan Nuclear Websites Over Fukushima Water Plan.” The Japan Times. (https://www.japantimes.co.jp/news/2023/08/18/japan/cyberattacks-anonymous-nuclear/).
  • Joinson, A. N. 2007. “Disinhibition and the Internet.” Pp. 75–92 in Psychology and the Internet. Academic Press. doi:10.1016/B978-012369425-6/50023-0.
  • Jordan, T. and P. Taylor 1998. “A Sociology of Hackers.” The Sociological Review 46(4):757–80. doi:10.1111/1467-954X.00139.
  • Karagiannopoulos, V. 2013. “The Regulation of Hacktivism in Contemporary Society, Problems and Solutions.”
  • Karagiannopoulos, V. 2021. “A Short History of Hacktivism: Its Past and Present and What Can We Learn from It.” Rethinking Cybercrime: Critical Debates 63–86. doi:10.1007/978-3-030-55841-3_4.
  • Kutner, M., C. Nachtsheim, and J. Neter. 2004. Applied Linear Statistical Models. 4th Boston: McGraw-Hill; Irwin
  • Li, X. and A. Y. Liu. 2021. “What Drives Consumer Activism During Trade Disputes? Experimental Evidence from Canada.” International Journal: Canada’s Journal of Global Policy Analysis 76(1):68–84. doi:10.1177/0020702020968942.
  • Lim, H. C., R. Stocker, and H. Larkin (2008, December). Ethical Trust and Social Moral Norms Simulation: A Bio-Inspired Agent-Based Modelling Approach. In 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (Vol. 2, pp. 245–51). IEEE.
  • Loh, W. 2023. “Anonymity, Fidelity to Law, and Digital Civil Disobedience.” Philosophy & Social Criticism 49(4):448–76. doi:10.1177/01914537211072886.
  • Manion, M. and A. Goodrum. 2000. “Terrorism or Civil Disobedience: Toward a Hacktivist Ethic.” ACM SIGCAS Computers and Society 30(2):14–19. doi:10.1145/572230.572232.
  • Milmo, D. (2022, Feb 27). “Anonymous: The Hacker Collective That Has Declared Cyberwar on Russia.” The Guardian. (https://www.theguardian.com/world/2022/feb/27/anonymous-the-hacker-collective-that-has-declared-cyberwar-on-russia).
  • Monroe, A. E., K. D. Dillon, S. Guglielmo, and R. F. Baumeister. 2018. “It’s Not What You Do, but What Everyone Else Does: On the Role of Descriptive Norms and Subjectivism in Moral Judgment.” Journal of Experimental Social Psychology 77:1–10. doi:10.1016/j.jesp.2018.03.010.
  • Moore, C. 2015. “Moral Disengagement.” Current Opinion in Psychology 6:199–204. doi:10.1016/j.copsyc.2015.07.018.
  • Morgan, S. (2022, January 19). “2022 Cybersecurity Almanac: 100 Facts, Figures, Predictions and Statistics” Cybercrime Magazine. (https://cybersecurityventures.com/cybersecurity-almanac-2022/).
  • Newman, A., H. Le, A. North-Samardzic, and M. Cohen 2020. “Moral Disengagement at Work: A Review and Research Agenda.” Journal of Business Ethics 167(3):535–70. doi:10.1007/s10551-019-04173-0.
  • Noone, G. and C. Glover. 2023, Mar 30. “Eco-Hacktivism Should Be Taking the World by Storm. What Happened?” TechMonitor. (https://techmonitor.ai/focus/eco-hacktivism-should-be-taking-the-world-by-storm-what-happened).
  • Pickard, S., B. Bowman, and D. Arya. 2020. ““We are Radical in Our Kindness”: The Political Socialisation, Motivations, Demands and Protest Actions of Young Environmental Activists in Britain.” Youth and Globalization 2(2):251–80. doi:10.1163/25895745-02020007.
  • Prehn, K., I. Wartenburger, K. Mériau, C. Scheibe, O. R. Goodenough, A. Villringer, E. van der Meer, and H. R. Heekeren. 2008. “Individual Differences in Moral Judgment Competence Influence Neural Correlates of Socio-Normative Judgments.” Social Cognitive and Affective Neuroscience 3(1):33–46. doi:https://doi.org/10.1093/scan/nsm037.
  • PytlikZillig, L. M., S. Wang, L. K. Soh, A. J. Tomkins, A. Samal, T. K. Bernadt, and M. J. Hayes. 2015. “Exploring Reactions to Hacktivism Among Stem College Students: A Preliminary Model of Hacktivism Support and Resistance.” Social Science Computer Review 33(4):479–97. doi:10.1177/0894439314546815.
  • Rosenberg, T. 2013. “Harnessing Positive Peer Pressure to Create Atruism.” Social Research: An International Quarterly 80(2):491–510. doi:https://doi.org/10.1353/sor.2013.0019.
  • Sorell, T. 2015. “Human Rights and Hacktivism: The Cases of WikiLeaks and Anonymous.” Journal of Human Rights Practice 7(3):391–410. doi:10.1093/jhuman/huv012.
  • Suler, J. 2004. “The Online Disinhibition Effect.” Cyberpsychology & Behavior 7(3):321–26. doi:10.1089/1094931041291295.
  • Sykes, G. M. and D. Matza 1957. “Techniques of Neutralization: A Theory of Delinquency.” American Sociological Review 22(6):664 doi:10.2307/2089195.
  • Tabachnick, B. G., L. S. Fidell, and J. B. Ullman. 2007. Using Multivariate Statistics. Vol. 5. Boston, MA: Pearson.
  • Taylor, K. 2009. Cruelty: Human Evil and the Human Brain. New York: Oxford University Press.
  • Taylor, P. A. 2005. “From Hackers to Hacktivists: Speed Bumps on the Global Superhighway?.” New Media & Society 7(5):625–46.
  • Thackray, H. and J. McAlaney. 2018. “Groups Online: Hacktivism and Social Protest.” Pp. 194–209 in Psychological and Behavioral Examinations in Cyber Security. IGI Global.
  • Thompson, E. L., K. R. Mehari, and A. D. Farrell. 2020. “Deviant Peer Factors During Early Adolescence: Cause or Consequence of Physical Aggression?” Child Development 91(2):e415–e31. doi:10.1111/cdev.13242.
  • Tidy, J. “Anonymous: How Hackers are Trying to Undermine Putin.” BBC. Accessed March 20, 2022 (https://www.bbc.com/news/technology-60784526).
  • Walker, T. R. and D. Xanthos. 2018. “A Call for Canada to Move Toward Zero Plastic Waste by Reducing and Recycling Single-Use Plastics.” Resources, Conservation and Recycling 133:99–100. doi:10.1016/j.resconrec.2018.02.014.
  • Weiner, B., S. Graham, and C. Reyna. 1997. “An Attributional Examination of Retributive versus Utilitarian Philosophies of Punishment.” Social Justice Research 10(4):431–52. doi:10.1007/BF02683293.
  • Yavuzer, Y., Z. Karatas, A. Civilidag, and R. Gundogdu. 2014. “The Role of Peer Pressure, Automatic Thoughts and Self-Esteem on Adolescents’ Aggression.” Eurasian Journal of Educational Research 14(54):61–78. doi:https://dx.doi.org/10.14689/ejer.2014.54.4.
  • Zimmerman, A. G. and G. J. Ybarra. 2016. “Online Aggression: The Influences of Anonymity and Social Modeling.” Psychology of Popular Media Culture 5(2):181. doi:10.1037/ppm0000038.