Overview
Navigate through the case files to investigate the psychological and social motives behind cybercrime.
Why study cybercrime motivation?
Cybercrime is one of the fastest-growing forms of crime in Canada. Understanding why people become cybercriminals helps us design better prevention, education, and policies.
What this investigation asks
- What is cybercrime and what forms does it take?
- What motivates people to commit these acts?
- How do culture, emotion, biology and social factors interact?
- How do theories of motivation explain cybercrime?
How Will Cybercrime be Addressed?
In this project, cybercrime is treated as a behaviour that can be analysed through psychological motivation theories: arousal theory, drive reduction theory, extrinsic vs intrinsic motivation, and Maslow’s hierarchy of needs.
Case file 1 – Definition & types of cybercrime
Establishing what counts as cybercrime before analysing motives.
Definition
Cybercrime refers to illegal activities carried out using computers, networks via the internet. It ranges from relatively simple hacks to highly organised, large-scale attacks on institutions.
In Canada, cybercrime is an emerging sector of crime and affects at least 1 in 5 internet users each year. They began as simple assaults on websites but now has evolved into sophisticated operations.
Main categories
- Financial fraud (phishing, online scams, ransomware demands).
- Identity theft and data breaches- Stealing personal data and inpersonation.
- Ransomeware- Locking vital files and demanding payment.
- Hacktivism and politically motivated attacks.
- Malware Distribution- Installing viruses or spyware.
Case file 2 – Financial motivation
Money is the clearest and most common extrinsic motive in cybercrime.
Money as primary driver
Research estimates that over half of recorded cybercrimes worldwide have a financial motive. Cybercriminals see the internet as a space with high potential payoff, relative anonymity, and low perceived risk. When criminals believe they have control over their situation, they become bolder, and conduct riskier acts for profit.
Common mechanisms
- The most stereotypical way is hacking into systems -bank accounts or investment funds- to redirect money into an offshore account where the money can be laundered and then used.
- Phishing scams uses basic psycholgical principles to fear monger, to create panic or to create scarcity. It often occurs in steps. Scammers impersonate legitimate organizations and trick vitims to follow their demands. They begin by building an emotional/trusting connection by talking about common interests; then they strike by creating a sense of urgency/fear, encouraging them to act quickly without thought However, the victim believes that the person on the other side is an authority figure with control; thus, they listen more and follow their instructions, even if it doesn't seem reasonable. Furthermore, other scams trigger the fear of missing out, making victims act faster without skepticism.
- Ransomware: locking an organisation’s files and demanding payment (often in cryptocurrency or direct wiring) to restore access.
These are examples of extrinsic motivation where the behaviour is driven by external rewards (money, material gain) rather than enjoyment of the act itself.
Case file 3 – Thrill, arousal & individual motives
Not all cybercrime is about money; for some offenders, it is about excitement, challenge, or ideology.
Arousal theory
Arousal theory suggests that people seek activities that move them toward an optimal level of stimulation. Hacking into a protected system, scamming others into giving money or vandalaizing online sites can create a feeling of excitement, powered by physiological responses.
- Thrill-seeking- Most amateurs engage in thrill-seeking as it gives them a sense of self control, and a sense of "beating and rebelling against the system."
- Testing one’s intelligence and technical skills- Many also want to test their own technical and intellectual skills; yet, everytime people successfully hack/conduct cybercrime and not get caught, they feel a rush of power and validation: this soon becomes reinforcing, encouraging them to do more.
Non-financial motives
- Arousal theory best explains the non-financial motives because it shows the psychological drive for stimulation. The risk and challenge associated with it is the true motivator, providing them with the arousal they crave.
- Boredom: highly skilled individuals with limited outlets may use hacking as a self-set challenge.
- Vigilantism: attacking sites they see as corrupt or unjust, to push their own ideological or political views.
- Status: proving competence to online communities. They may find existing sites such as "LeetCode" to be non-competitive and unreal, seeking out real challenges in the real world.
Case file 4 – Cultural influences & hacktivism
Online subcultures and media shape what people see as acceptable or even heroic.
Hacker culture
Certain online spaces frame hacking as clever, rebellious, or even noble. This causes the formation of decentralized groups, glorifying the acts while causing inconveinence.
- Anonymous usernames and avatars reduce accountability.
- “Elite” hackers gain respect and influence in communities.
- Some platforms celebrate leaking or defacing sites.
- Many hackers (in the activism field) genuinely believe what they is righteous. They believe their actions are defending democracy, free speech and freedom of the internet. They compare themselves to "Robin-hood", fighting against fighting against corrupt or oppressive instiutions.
Example: the “Anonymous” collective
Anonymous is a loose, decentralised group of self-proclaimed hacktivists. Each individual person is called an "Anon" and they have carried out many cyberattacks on governments, corporations and religious organisations. They are motivated by the ideas of free speech and unrestricted access to information, but most feared for their cyberattacks.
In 2008, they targeted the Church of Scientology with distributed denial of service attacks, prank calls and website disruptions. The motive was not financial but ideological – protesting against what they saw as censorship and control of information. This was one of the first major events of a decentralized collective coming together against an organization deemed harmful to society. The protest and actions were organized on "4-Chan", an anonymous commmunication website dedicated to many topics such as anime, politics and even cyberattacks. These cyberattacks eventually leaded to real life demonstrations in many American cities.
Case file 5 – Emotional influences
Fear, anger, excitement and even happiness can shape why someone turns to cybercrime.
Fear
Fear of poverty, job loss or financial instability can push someone toward crimes that promise quick money, especially when online anonymity makes the risk feel low; this is especially prevalent in less well-off countries where scamming others allows them to benefit and live a better life. This emotion is most associated with those conducting financial crime;in some regions, such as the Golden Triangle (Area between Myanmar, Laos and Thailand), trafficked individuals forced to scam others constant fear for their lives.
Anger
Anger at institutions, schools or governments can motivate revenge-style cyberattacks, such as vandalising websites or leaking data. When individuals feel mistreated by their organization (government, school board, etc), the most agitated launch "cyberwarfare". As school databases store large amounts of personal information and have outdated cybersecurity measures, an attack sends a visible message of anger, dissatisfaction and rebellion. In fact, in 2024, schools and universites ranked as the third most targeted institutions globally.
Excitement & happiness
Successfully breaking into a system can feel exhilarating. This positive emotion reinforces the behaviour, especially when combined with dopamine release and social praise from peers. This feeling is mostly correlated with those "hacking for fun". They see their actions as harmless, every site as an oppurtunity to test their skills. They gain status and feelings of self esteem, triggering the brain's reward system, releasing dopamine and making the behavior addictive.
Case file 6 – Biological factors
Hormones and brain chemistry shape how rewarding and risky cybercrime feels.
Reward & arousal systems
- Schachter–Singer Two‑Factor Theory: I believe this emotional theory best expains the response to cybercrime. When individuals break into systems without detection, their body produces adredaline, increases the heart rate and increases alertness. Although these physiological responses are essentially identical for everyone commiting cybercrime, it can lead to different emotions depend on how it's framed. Those hacking for fun feel pride, those "revenge" hacking feel satisfaction and those being coerced feel fear; it is the most comprehensive in explaining the variety of emotional motives.
- Dopamine: involved in reward and reinforcement when a hack succeeds.
- Norepinephrine & adrenaline: increase alertness and focus.
- Cortisol: stress hormone that can rise when there is a risk of being caught.
What biology does not explain
Unlike hunger or sex, there is no built-in biological drive to commit cybercrime. Drive reduction theory, which focuses on restoring homeostasis by reducing discomfort, does not fit well: cybercrime usually increases arousal and tension instead of reducing it.
Biology helps explain why the activity can feel rewarding or addictive, but social, cultural and cognitive factors are more important for explaining why people choose cybercrime in the first place.
Case file 7 – Extrinsic vs intrinsic motivation
Many cybercrimes mix outside rewards with inner satisfaction or ideology.
Extrinsic motives
- Money and material gain- the most common act of cybercrime often featured in news segments like the Wall Street Journal and BBC. A recent example of this is the "Chinese CryptoQueen", someone who ran a fradulent investment scheme scamming over 100,000 people, and a total of >$5 billion dollars.
- Status and reputation in hacker communities- Showing off thier accomplishments and flaunting sucessful exploits giving a sense of pride.
- Power over systems, data, or institutions- Individuals dissastified with government or corperations disrupt services based on their rationale that thier actions are justified, even though it may cause widespread harm.
Intrinsic motives
- Curiosity about how systems work- Their drive to understand digital structures motivates them to exploit mistakes in code while trying to deepen their personal understanding.
- Enjoyment of solving complex technical problems- Their satisfaction may come from genuine contentment from solving complex challenges.
- Belief in a cause (political or social hacktivism)- Their personal beliefs of idealogy/advocacy overwhelms their fear of being caught; they display "selflesness" in engaging in risky behavior.
Real cases usually involve both: an offender might enjoy the challenge (intrinsic) while also wanting money or recognition (extrinsic).
Case file 8 – Peer, family & expectations
Motivation is shaped by the social environments people grow up and interact in.
Peers & online communities
- Group operations (“ops”) create a sense of belonging and pressure to participate.
- Young offenders may be encouraged by older, more skilled members.
Family, school & expectations
- High pressure at home and feelings of isolation at school can push teens to escape into online worlds. Early internet crimes were conducted by teenagers who had trouble in the social aspects, pushing them to explore different sides of the internet.
- Some families may minimise or not understand the seriousness of cyber offences.
Case file 9 – Maslow’s hierarchy of needs
Cybercrime can be mapped onto several levels of Maslow’s pyramid, although in unhealthy ways.
Safety & Physiology
For some offenders, cybercrime is a way to obtain money for basic needs or to escape unstable living situations. It attempts to meet security and biological needs through illegal income.
Belonging & esteem
Hacker groups can provide a sense of belonging, identity and respect, even if the actions are harmful.
Self-actualisation (distorted)
Hacktivists may feel they are achieving their full potential by fighting for political or social causes online, even when methods are illegal. They believe they are fighting for the greater good and are "sacrificing" themselves for their ideals.
Personal reflection – my own motivations
Part B: a separate example of motivation from my own life.
Extrinsic Motivation
When I was younger, extrinsic motivation was the most powerful: grades, praise and awards influenced me to go to school, and learn. Today, material motivation does not drive me, but instead the main factors such as AP scores, university admissions and future career aspirations.
In my experiences, my family members always used extrinsic motivation to motivate us. To praise us for our hard work and effort, they would give us monetary rewards even though we would be too young to understand the importance and value of money.
Intrinsic Motivation
In my opinion, my intrinsic motivation comes from many factors. The most influential form of intrinsic motivation for me is in the form of stories and experiences of others. I feel inspired by what others have endured and achieved and I use their journeys to guide my own. One of my favorite inspirational stories come from John D Rockerfeller- reading his personal writings on what it means to live, grow, compete and expand provides me with intrinsic motivation to strive for excellence. His story deeply resonates with me as he proved that anyone with vision could rise to the top.
Another story that has motivated me is one that I have always heard. The stories of "The Long March" influences me to go forward in life. The struggles of revolutionaries driven by their ideals inspires my perserveance and dedication, reminding me resilience is the deciding factor in my path forward.
Personal Experience
Originally, external rewards motivated me to join and participate in robotics - the chance of winning awards, gaining recognition/status from others as a well known competitor and qualifying for the world championship drove me to work hard and dedicate so much of my time. During my first year, I qualified to provincials but failed to win any awards; I was devastated. The following year, I had a choice: I built my own team of inexperienced members from the ground up as I believed in my own abilities in leadership and competence. But, the outcomes didn't match my expectations; my ability in building/coding and motivating my teammates were lackluster. We earned only won one award and didn't qualify to provincials.
By my third year, I qualified to provincials again, but I felt my motivation dwindling- my goal of making it to the world championship seemed far off and unreachable. Yet, this year, I've committed to growing my skills in communication and strengthening my coding. My original goal still remains but I'm motivated by a desire to improve and persist in the struggle with my teammates.
I believe my internal self-belief and self-confidence is my greatest strength, allowing me to keep moving forward despite past failures.
Sources
Sources
- Hawdon, James. “Cybercrime: Victimization, Perpetration, and Techniques.” American Journal of Criminal Justice, vol. 46, no. 6, 10 Nov. 2021, https://doi.org/10.1007/s12103-021-09652-7.
- Kosinski, Matthew. “What Is Phishing?” IBM, 17 May 2024, www.ibm.com/think/topics/phishing.
- Public Safety Canada. “Cybercrime - Canada.ca.” Canada.ca, 2018, www.canada.ca/en/services/policing/police/crime-and-crime-prevention/cybercrime.html.
- Raman, Raghu, et al. “Darkweb Research: Past, Present, and Future Trends and Mapping to Sustainable Development Goals.” Heliyon, vol. 9, no. 11, 1 Nov. 2023, www.sciencedirect.com/science/article/pii/S240584402309477X#sec4, https://doi.org/10.1016/j.heliyon.2023.e22269.
- RCMP. “Cybercrime.” Royal Canadian Mounted Police, 2024, rcmp.ca/en/federal-policing/cybercrime.
- Volle, Adam. “Anonymous | Definition, History, Purpose, Mask, & Facts | Britannica.” Www.britannica.com, 9 Jan. 2023, www.britannica.com/topic/Anonymous-hacking-group.