• HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
Friday, July 25, 2025
BIOENGINEER.ORG
No Result
View All Result
  • Login
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
No Result
View All Result
Bioengineer.org
No Result
View All Result
Home NEWS Science News

Decoding how kids get into hacking

Bioengineer by Bioengineer
September 19, 2019
in Science News
Reading Time: 4 mins read
0
ADVERTISEMENT
Share on FacebookShare on TwitterShare on LinkedinShare on RedditShare on Telegram

New research is first to uncover gender-specific traits leading boys and girls to hacking

IMAGE

Credit: Michigan State University

Is your kid obsessed with video games and hanging out with questionable friends? These are common traits for involvement in cybercrime, among other delinquencies. New research from Michigan State University identified characteristics and gender-specific behaviors in kids that could lead them to become juvenile hackers.

“We know much about the scope of hacking and its threat, but the problem is that we don’t know exactly when and how hacking behavior starts,” said Thomas Holt, lead author and MSU cybercrime expert in the School of Criminal Justice. “There is a general understanding that hacking starts in the early teens but until now, we weren’t clear on background factors, such as behavioral issues, the impact of social connections or personality traits. Our findings pointed us in the direction of thinking that there are gendered pathways to hacking.”

Holt assessed responses from 50,000 teens from around the world to determine predictors of hacking. The findings, published in Crime & Delinquency, are the first to dig into gendered differences from a global data set.

“We found that predictors of juvenile delinquency, like low self-control – so, not having the ability to hold back when opportunity presents itself – are big factors for computer hacking for both boys and girls,” Holt said. “But for girls, peer associations mattered more. If she has friends who shoplift or engage in petty forms of crime, she’s more likely to be influenced to hack as well. For boys, we found that time spent watching TV or playing computer games were associated with hacking.”

Holt explained that the stark differences between boys and girls were quite distinct, reinforcing the idea that girls get into hacking in ways that greatly differed from boys. He said that some of the findings play to how kids are raised within gender roles, such as letting boys play video games and giving girls different activities.

For boys and girls, simply having opportunities to hack were significant in starting such behavior.

This could include having their own bedroom, their own computer or the freedom of doing what they want on the internet without parental supervision.

While most schools have computer and internet access, Holt explained that there are still some geographic barriers for kids to enter cybercrime. The researchers found that kids who had mobile phone access early on were more likely to hack – especially if they lived in larger cities. Spending time with peers was more likely to influence delinquent behavior for those living in smaller cities. The researchers also found a connection between pirating movies and music and hacking.

In the 1980s and 1990s, juvenile hacking was mostly limited to gaming purposes, and even now most initial cybercrime isn’t serious, such as getting into Facebook or email accounts, Holt said.

“The initial attempts might not be serious, but without supervision and low self-control, it’s likely they got a taste for what they might be able to accomplish by taking their hacking abilities further,” Holt said. “And while low self-control plays a huge role with kids and teens, some of them mature as they age and can sit for hours, which gives them time to refine the skills of a sophisticated hacker.”

It’s important for parents to understand their kids’ tech-savviness and habits to help guide them on a path that uses their skills in a more positive way.

“Parents shouldn’t assume that having a kid with sophisticated technological competency is always totally fine,” Holt said. “Finding others in the field – like those you’d meet in a robotics club or attending something like the DefCon conference – is vital for kids to learn about using their skills in a positive way and for staving off bad behaviors,” Holt said. “Cybercrime can be a hidden problem, so talking is vital. The more you can understand what they’re doing, the easier you can flag something that might be off and curtail activity.”

###

(Note for media: Please include a link to the original paper in online coverage: https://journals.sagepub.com/eprint/75WA7TNAKTKHXZVU2XMN/full)

Michigan State University has been working to advance the common good in uncommon ways for 160 years. One of the top research universities in the world, MSU focuses its vast resources on creating solutions to some of the world’s most pressing challenges, while providing life-changing opportunities to a diverse and inclusive academic community through more than 200 programs of study in 17 degree-granting colleges.

For MSU news on the Web, go to MSUToday. Follow MSU News on Twitter at twitter.com/MSUnews.

Media Contact
Caroline Brooks
[email protected]

Original Source

https://msutoday.msu.edu/news/2019/decoding-how-kids-get-into-hacking/

Related Journal Article

http://dx.doi.org/10.1177/0011128719875697

Tags: Computer ScienceDecision-making/Problem SolvingInformation Management/Tracking SystemsIntellectual PropertyInternetK-12Parenting/Child Care/FamilyPersonality/AttitudeTechnology/Engineering/Computer ScienceViolence/Criminals
Share12Tweet8Share2ShareShareShare2

Related Posts

Additive Manufacturing of Monolithic Gyroidal Solid Oxide Cells

July 20, 2025

Machine Learning Uncovers Sorghum’s Complex Mold Resistance

July 20, 2025

Pathology Multiplexing Revolutionizes Disease Mapping

July 20, 2025

Single-Cell Atlas Links Chemokines to Type 2 Diabetes

July 20, 2025
Please login to join discussion

POPULAR NEWS

  • Blind to the Burn

    Overlooked Dangers: Debunking Common Myths About Skin Cancer Risk in the U.S.

    60 shares
    Share 24 Tweet 15
  • AI Achieves Breakthrough in Drug Discovery by Tackling the True Complexity of Aging

    70 shares
    Share 28 Tweet 18
  • USF Research Unveils AI Technology for Detecting Early PTSD Indicators in Youth Through Facial Analysis

    43 shares
    Share 17 Tweet 11
  • Dr. Miriam Merad Honored with French Knighthood for Groundbreaking Contributions to Science and Medicine

    46 shares
    Share 18 Tweet 12

About

We bring you the latest biotechnology news from best research centers and universities around the world. Check our website.

Follow us

Recent News

Additive Manufacturing of Monolithic Gyroidal Solid Oxide Cells

Machine Learning Uncovers Sorghum’s Complex Mold Resistance

Pathology Multiplexing Revolutionizes Disease Mapping

  • Contact Us

Bioengineer.org © Copyright 2023 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Homepages
    • Home Page 1
    • Home Page 2
  • News
  • National
  • Business
  • Health
  • Lifestyle
  • Science

Bioengineer.org © Copyright 2023 All Rights Reserved.