{"id":"https://openalex.org/W7136056489","doi":"https://doi.org/10.1016/j.chb.2026.108996","title":"From curiosity to crime: Exploring pathways into criminal hacking","display_name":"From curiosity to crime: Exploring pathways into criminal hacking","publication_year":2026,"publication_date":"2026-03-15","ids":{"openalex":"https://openalex.org/W7136056489","doi":"https://doi.org/10.1016/j.chb.2026.108996"},"language":"en","primary_location":{"id":"doi:10.1016/j.chb.2026.108996","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.chb.2026.108996","pdf_url":null,"source":{"id":"https://openalex.org/S204030396","display_name":"Computers in Human Behavior","issn_l":"0747-5632","issn":["0747-5632","1873-7692"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers in Human Behavior","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1016/j.chb.2026.108996","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5129346710","display_name":"E.R. Leukfeldt","orcid":null},"institutions":[{"id":"https://openalex.org/I121797337","display_name":"Leiden University","ror":"https://ror.org/027bh9e22","country_code":"NL","type":"education","lineage":["https://openalex.org/I121797337"]},{"id":"https://openalex.org/I4210124189","display_name":"Netherlands Institute for the Study of Crime and Law Enforcement","ror":"https://ror.org/03124pm05","country_code":"NL","type":"facility","lineage":["https://openalex.org/I2800991832","https://openalex.org/I4210124189","https://openalex.org/I4405262988"]},{"id":"https://openalex.org/I930713850","display_name":"The Hague University of Applied Sciences","ror":"https://ror.org/021zvq422","country_code":"NL","type":"education","lineage":["https://openalex.org/I930713850"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"E.R. Leukfeldt","raw_affiliation_strings":["Leiden University, Rapenburg 70, 2311 EZ, Leiden, The Netherlands","Netherlands Institute for the Study of Crime and Law Enforcement, De Boelelaan 1077, 1081 HV, Amsterdam, The Netherlands","The Hague University of Applied Sciences, Johanna Westerdijkplein 75, 2521 EN, The Hague, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Leiden University, Rapenburg 70, 2311 EZ, Leiden, The Netherlands","institution_ids":["https://openalex.org/I121797337"]},{"raw_affiliation_string":"Netherlands Institute for the Study of Crime and Law Enforcement, De Boelelaan 1077, 1081 HV, Amsterdam, The Netherlands","institution_ids":["https://openalex.org/I4210124189"]},{"raw_affiliation_string":"The Hague University of Applied Sciences, Johanna Westerdijkplein 75, 2521 EN, The Hague, The Netherlands","institution_ids":["https://openalex.org/I930713850"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017254053","display_name":"Luuk Bekkers","orcid":null},"institutions":[{"id":"https://openalex.org/I4210124189","display_name":"Netherlands Institute for the Study of Crime and Law Enforcement","ror":"https://ror.org/03124pm05","country_code":"NL","type":"facility","lineage":["https://openalex.org/I2800991832","https://openalex.org/I4210124189","https://openalex.org/I4405262988"]},{"id":"https://openalex.org/I930713850","display_name":"The Hague University of Applied Sciences","ror":"https://ror.org/021zvq422","country_code":"NL","type":"education","lineage":["https://openalex.org/I930713850"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"L.M.J. Bekkers","raw_affiliation_strings":["Netherlands Institute for the Study of Crime and Law Enforcement, De Boelelaan 1077, 1081 HV, Amsterdam, The Netherlands","The Hague University of Applied Sciences, Johanna Westerdijkplein 75, 2521 EN, The Hague, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Netherlands Institute for the Study of Crime and Law Enforcement, De Boelelaan 1077, 1081 HV, Amsterdam, The Netherlands","institution_ids":["https://openalex.org/I4210124189"]},{"raw_affiliation_string":"The Hague University of Applied Sciences, Johanna Westerdijkplein 75, 2521 EN, The Hague, The Netherlands","institution_ids":["https://openalex.org/I930713850"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5129346710"],"corresponding_institution_ids":["https://openalex.org/I121797337","https://openalex.org/I4210124189","https://openalex.org/I930713850"],"apc_list":{"value":3440,"currency":"USD","value_usd":3440},"apc_paid":{"value":3440,"currency":"USD","value_usd":3440},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.80990573,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"181","issue":null,"first_page":"108996","last_page":"108996"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.20640000700950623,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.20640000700950623,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14308","display_name":"Psychological and Educational Research Studies","score":0.06260000169277191,"subfield":{"id":"https://openalex.org/subfields/3205","display_name":"Experimental and Cognitive Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12268","display_name":"Deception detection and forensic psychology","score":0.053700000047683716,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/curiosity","display_name":"Curiosity","score":0.7868000268936157},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.6711999773979187},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.2687000036239624}],"concepts":[{"id":"https://openalex.org/C33435437","wikidata":"https://www.wikidata.org/wiki/Q366791","display_name":"Curiosity","level":2,"score":0.7868000268936157},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.6711999773979187},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.5526999831199646},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.412200003862381},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.3882000148296356},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.34630000591278076},{"id":"https://openalex.org/C11171543","wikidata":"https://www.wikidata.org/wiki/Q41630","display_name":"Psychoanalysis","level":1,"score":0.3199999928474426},{"id":"https://openalex.org/C188147891","wikidata":"https://www.wikidata.org/wiki/Q147638","display_name":"Cognitive science","level":1,"score":0.30559998750686646},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.30000001192092896},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.2687000036239624},{"id":"https://openalex.org/C107038049","wikidata":"https://www.wikidata.org/wiki/Q35986","display_name":"Aesthetics","level":1,"score":0.2639999985694885},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.2615000009536743}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/j.chb.2026.108996","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.chb.2026.108996","pdf_url":null,"source":{"id":"https://openalex.org/S204030396","display_name":"Computers in Human Behavior","issn_l":"0747-5632","issn":["0747-5632","1873-7692"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers in Human Behavior","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1016/j.chb.2026.108996","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.chb.2026.108996","pdf_url":null,"source":{"id":"https://openalex.org/S204030396","display_name":"Computers in Human Behavior","issn_l":"0747-5632","issn":["0747-5632","1873-7692"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers in Human Behavior","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W1924618820","https://openalex.org/W1967084539","https://openalex.org/W1974266312","https://openalex.org/W1979290264","https://openalex.org/W1988894481","https://openalex.org/W2042291430","https://openalex.org/W2066206193","https://openalex.org/W2080558891","https://openalex.org/W2122551442","https://openalex.org/W2145092856","https://openalex.org/W2225109469","https://openalex.org/W2292229558","https://openalex.org/W2297442600","https://openalex.org/W2345976710","https://openalex.org/W2613995114","https://openalex.org/W2772626569","https://openalex.org/W2895779664","https://openalex.org/W2900058199","https://openalex.org/W2982091379","https://openalex.org/W2996459574","https://openalex.org/W3012219742","https://openalex.org/W3023867818","https://openalex.org/W3032572436","https://openalex.org/W3094143515","https://openalex.org/W3100734526","https://openalex.org/W3159569318","https://openalex.org/W3196988712","https://openalex.org/W4232818056","https://openalex.org/W4233019818","https://openalex.org/W4247234596","https://openalex.org/W4361284334","https://openalex.org/W4386709351","https://openalex.org/W4387575388","https://openalex.org/W4388441551","https://openalex.org/W4400130136","https://openalex.org/W4404991368","https://openalex.org/W4413029886","https://openalex.org/W4414813589","https://openalex.org/W4414860658","https://openalex.org/W4416203623","https://openalex.org/W7126054860"],"related_works":[],"abstract_inverted_index":{"The":[0,27],"goal":[1],"of":[2,46,104,137,143,229,292],"this":[3],"study":[4,28],"was":[5],"to":[6,67,92,128,164,172,213,238,278],"better":[7],"understand":[8],"pathways":[9],"into":[10,220],"cybercrime":[11,236,268],"and":[12,43,54,74,98,114,126,131,139,145,156,160,182,186,191,201,232,257,285],"the":[13,41,44,52,135,240,245,255,258,290],"various":[14,176,264],"stages":[15,265],"that":[16,63],"young":[17,64,117,161],"people":[18,118,162],"move":[19,262],"through":[20,263],"before":[21,266],"engaging":[22],"in":[23,107,134,151,167,244,289],"criminal":[24,38,58,252],"hacking":[25],"behaviors.":[26],"draws":[29],"on":[30,123],"unique":[31],"data":[32],"resulting":[33],"from":[34,40,188,254],"interviews":[35],"with":[36,71,77],"22":[37,251],"hackers":[39,65,253],"Netherlands":[42,256],"UK,":[45],"which":[47],"15":[48],"were":[49,56],"caught":[50],"by":[51,90,101,112,175],"police,":[53],"7":[55],"self-identified":[57],"hackers.":[59],"Qualitative":[60],"analysis":[61],"revealed":[62],"tend":[66],"have":[68],"early":[69,80],"experiences":[70],"information":[72,122,130],"technology":[73],"remain":[75],"preoccupied":[76],"computers":[78,138],"throughout":[79],"adolescence.":[81],"Here,":[82],"we":[83],"identified":[84,243],"two":[85],"primary":[86],"trajectories:":[87],"one":[88],"shaped":[89],"exposure":[91],"online":[93,190,281],"peers":[94,217,280],"via":[95],"gaming":[96],"communities,":[97],"another":[99],"characterized":[100],"self-directed":[102],"exploration":[103],"computer":[105,293],"skills":[106,133],"relative":[108],"social":[109],"isolation.":[110],"Driven":[111],"curiosity":[113],"intrinsic":[115],"motivations,":[116],"use":[119],"readily":[120],"available":[121],"YouTube,":[124],"Google":[125],"forums":[127,286],"obtain":[129],"develop":[132],"field":[136],"technology.":[140],"By":[141],"means":[142],"experimenting":[144],"trying":[146],"out":[147],"newly":[148],"acquired":[149],"knowledge":[150],"practice,":[152],"lines":[153],"between":[154],"legal":[155],"illegal":[157],"behaviors":[158,170,207],"blur":[159],"risk":[163,230],"become":[165],"involved":[166],"crime.":[168],"Offending":[169],"seem":[171],"be":[173],"influenced":[174],"mechanisms,":[177],"including":[178,301],"parental":[179,302],"oversight,":[180],"cognitions":[181],"perceptions":[183],"about":[184],"ethics,":[185],"encouragements":[187],"both":[189],"offline":[192],"peers.":[193],"They":[194],"possibly":[195],"form":[196],"critical":[197],"points":[198],"for":[199,235],"intervention":[200],"prevention":[202],"purposes.":[203],"Over":[204],"time,":[205],"offending":[206,237,299],"can":[208],"escalate":[209],"as":[210],"they":[211],"contribute":[212],"increased":[214],"reputation":[215],"among":[216],"or":[218],"evolve":[219],"more":[221],"materialistic":[222],"oriented":[223],"hacking.":[224],"We":[225,249],"encourage":[226],"quantitative":[227],"assessments":[228],"factors":[231],"involvement":[233],"mechanisms":[234,297],"validate":[239],"underlying":[241],"patterns":[242],"current":[246],"analysis.":[247],"\u2022":[248,260,269,282,295],"interviewed":[250],"UK":[259],"Offenders":[261],"committing":[267],"Some":[270],"are":[271,276,287],"socially":[272],"isolated":[273],"but":[274],"others":[275],"exposed":[277],"deviant":[279],"Google,":[283],"Youtube":[284],"key":[288],"development":[291],"skill":[294],"Various":[296],"influence":[298],"behaviors,":[300],"oversight":[303]},"counts_by_year":[],"updated_date":"2026-03-20T20:47:17.329874","created_date":"2026-03-16T00:00:00"}
