Overview
Navigate through the case files to investigate the psychological and social motives behind cybercrime.
Project brief – why study cybercrime motivation?
Cybercrime is one of the fastest-growing forms of crime in Canada. Understanding why people become cybercriminals helps us design better prevention, education, and policies.
What this investigation asks
- What is cybercrime and what forms does it take?
- What motivates people to commit these acts?
- How do culture, emotion, biology and social factors interact?
- How do theories of motivation explain cybercrime?
How Will Cybercrime be Addressed?
In this project, cybercrime is treated as a behaviour that can be analysed through psychological motivation theories: arousal theory, drive reduction theory, extrinsic vs intrinsic motivation, and Maslow’s hierarchy of needs.
Case file 1 – Definition & types of cybercrime
Establishing what counts as cybercrime before analysing motives.
Definition
Cybercrime refers to illegal activities carried out using computers, networks via the internet. It ranges from relatively simple hacks to highly organised, large-scale attacks on institutions.
In Canada, cybercrime is an emerging sector of crime and affects at least 1 in 5 internet users each year. They began as simple assaults on websites but now has evolved into sophisticated operations.
Main categories
- Financial fraud (phishing, online scams, ransomware demands)
- Identity theft and data breaches- Stealing personal data and inpersonation
- Hacking into systems and networks
- Denial of service attacks (DDoS)- Crashing websites and services with overwhelming traffic
- Ransomeware- Locking vital files and demanding payment
- Hacktivism and politically motivated attacks
- Malwatre Distribution- Installing viruses or spyware
Case file 2 – Financial motivation
Money is the clearest and most common extrinsic motive in cybercrime.
Money as primary driver
Research estimates that over half of recorded cybercrimes worldwide have a financial motive. Cybercriminals see the internet as a space with high potential payoff, relative anonymity, and low perceived risk. When criminals believe they have control over their situation, they become bolder, conduct riskier acts for profit.
Common mechanisms
- The most stereotypical way is hacking into systems -bank accounts or investment funds- to redirect money into an offshore account where the money can be laundered and then used.
- Stolen credit card information is often sold in the dark web giving criminals access to more money.
- Phishing scams are one of the most effective ways in tricking people into sending money or giving login details. It uses basic psycholgical thought of fear mongering to get people to trust. It often occurs in steps. Scammers impersonate legitimate organizations and trick vitims by appealing to their psycholgy. Often times, they begin by building an emotional connection by talking about common interests, building trust, then they strike by creating a sense of urgency and fear to victims, encouraging them to act quickly. When the victim believes that the person on the other side is an authority figure, they listen more and follow their instructions, even if it doesn't seem reasonable.
- Ransomware: locking an organisation’s files and demanding payment (often in cryptocurrency) to restore access.
These are classic examples of extrinsic motivation – the behaviour is driven by external rewards (money, material gain) rather than enjoyment of the act itself.
Case file 3 – Thrill, arousal & individual motives
Not all cybercrime is about money; for some offenders, it is about excitement, challenge, or ideology.
Arousal theory
Arousal theory suggests that people seek activities that move them toward an optimal level of stimulation. Hacking into a protected system can create a “rush” – increased heart rate, adrenaline and dopamine – similar to other risk-taking behaviours.
- Thrill-seeking and “beating the system”.
- Testing one’s intelligence and technical skills.
- Repeat offending because the rush becomes reinforcing.
Non-financial motives
- Boredom: highly skilled individuals with limited outlets may use hacking as a self-set challenge.
- Vigilantism: attacking sites they see as corrupt or unjust, to push their own ideological or political views.
- Status: proving competence to online communities.
Case file 4 – Cultural influences & hacktivism
Online subcultures and media shape what people see as acceptable or even heroic.
Hacker culture
Certain online spaces frame hacking as clever, rebellious, or even noble. Memes, movies and forums can normalise illegal behaviour and blur the line between activism and crime.
- Anonymous usernames and avatars reduce accountability.
- “Elite” hackers gain respect and influence in communities.
- Some platforms celebrate leaking or defacing sites.
Example: the “Anonymous” collective
Anonymous is a loose, decentralised group of self-proclaimed hacktivists. They have carried out cyberattacks on governments, corporations and religious organisations.
In 2008, they targeted the Church of Scientology with distributed denial of service attacks, prank calls and website disruptions. The motive was not financial but ideological – protesting what they saw as censorship and control of information.
Case file 5 – Emotional influences
Fear, anger, excitement and even happiness can shape why someone turns to cybercrime.
Fear
Fear of poverty, job loss or financial instability can push someone toward crimes that promise quick money, especially when online anonymity makes the risk feel low.
Anger
Anger at institutions, schools or governments can motivate revenge-style cyberattacks, such as vandalising websites or leaking data.
Excitement & happiness
Successfully breaking into a system can feel exhilarating. The positive emotion reinforces the behaviour, especially when combined with dopamine release and social praise from peers.
Case file 6 – Biological factors
Hormones and brain chemistry shape how rewarding and risky cybercrime feels, but there is no “cybercrime gene.”
Reward & arousal systems
- Dopamine: involved in reward and reinforcement when a hack succeeds.
- Norepinephrine & adrenaline: increase alertness and focus during high-stakes attacks.
- Cortisol: stress hormone that can rise when there is a risk of being caught.
What biology does not explain
Unlike hunger or sex, there is no built-in biological drive to commit cybercrime. Drive reduction theory, which focuses on restoring homeostasis by reducing discomfort, does not fit well: cybercrime usually increases arousal and tension instead of reducing it.
Biology helps explain why the activity can feel rewarding or addictive, but social, cultural and cognitive factors are more important for explaining why people choose cybercrime in the first place.
Case file 7 – Extrinsic vs intrinsic motivation
Many cybercrimes mix outside rewards with inner satisfaction or ideology.
Extrinsic motives
- Money and material gain.
- Status and reputation in hacker communities.
- Power over systems, data, or institutions.
- Avoidance of punishment through anonymity.
Intrinsic motives
- Curiosity about how systems work.
- Enjoyment of solving complex technical problems.
- Thrill of risk and challenge.
- Belief in a cause (political or social hacktivism).
Real cases usually involve both: an offender might enjoy the challenge (intrinsic) while also wanting money or recognition (extrinsic).
Case file 8 – Peer, family & expectations
Motivation is shaped by the social environments people grow up and interact in.
Peers & online communities
- Hacker forums and Discord servers can normalise illegal acts.
- Group operations (“ops”) create a sense of belonging and pressure to participate.
- Young offenders may be encouraged by older, more skilled members.
Family, school & expectations
- High pressure at home can push teens to escape into online worlds.
- Feeling isolated or bullied at school can make online communities more attractive.
- Some families may minimise or not understand the seriousness of cyber offences.
Case file 9 – Maslow’s hierarchy of needs
Cybercrime can be mapped onto several levels of Maslow’s pyramid, although in unhealthy ways.
Safety & security
For some offenders, cybercrime is a way to obtain money for basic needs or to escape unstable living situations. It attempts to meet security needs through illegal income.
Belonging & esteem
Hacker groups can provide a sense of belonging, identity and respect. Being recognised as “skilled” meets esteem needs, even if the actions are harmful.
Self-actualisation (distorted)
Hacktivists may feel they are achieving their full potential by fighting for political or social causes online, even when methods are illegal.
Personal reflection – my own motivations
Part B: a separate example of motivation from my own life.
Replace this with your paragraph
Write 1 solid paragraph about something you have accomplished or want to accomplish (education, health, community involvement, etc.) and explain what motivates you. Mention:
- Intrinsic motives (interest, passion, curiosity, satisfaction).
- Extrinsic motives (grades, scholarships, recognition, future career).
- Any cultural, family or personal factors that influence you.