From Breakers to Builders: The Role of Bug Bounty Hunters in Strengthening Organizational Cybersecurity
Abstract
:1. Introduction
2. Background and Conceptual Development
2.1. Overview of Relevant Literature
2.2. Devlopment of the Conceptual Model
2.2.1. Theory of Reasoned Action
2.2.2. Perceived Effectiveness of Bug Bounty Programs
2.2.3. Perceived Intrinsic and Extrinsic Motivations
2.2.4. The Curiosity of Bug Hunters
2.2.5. The Curiosity of Bug Hunters
2.2.6. Attitude Towards the Behavior
3. Methodology
3.1. Survey Development
3.2. Data Collection and Survey Distribution
4. Results
4.1. Survey Items
4.2. Hypotheses Testing
5. Contributions and Discussions
5.1. Practical Implications
5.2. Limitations
5.3. Future Research
6. Conclusions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Construct | Cronbach’s Alpha | Average Variance Extracted (AVE) |
---|---|---|
Curiosity (CUR) | 0.815 | 0.644 |
Perceived intrinsic motivation (PIM) | 0.837 | 0.670 |
Behavioral intention (BE) | 0.781 | 0.603 |
Perceived extrinsic motivation (PEM) | 0.807 | 0.634 |
Attitude towards behavior (Atti) | 0.802 | 0.627 |
Perceived effectiveness of bug bounty programs (PEFF) | 0.752 | 0.667 |
Exposure (SE) | 0.531 | 0.515 |
ATTI | BEH | CUR | PEFF | PEM | PIM | SELF | |
---|---|---|---|---|---|---|---|
ATTI | |||||||
BEH | 0.819 | ||||||
CUR | 0.921 | 0.821 | |||||
PEFF | 0.825 | 0.844 | 0.850 | ||||
PEM | 0.828 | 0.846 | 0.779 | 0.827 | |||
PIM | 0.893 | 0.840 | 0.897 | 0.908 | 0.787 | ||
SELF | 0.714 | 0.882 | 0.757 | 0.782 | 0.770 | 0.692 |
ATTI | BEH | CUR | PEFF | PEM | PIM | SELF | |
---|---|---|---|---|---|---|---|
ATTI | 0.802 | ||||||
BEH | 0.681 | 0.819 | |||||
CUR | 0.736 | 0.667 | 0.777 | ||||
PEFF | 0.676 | 0.704 | 0.680 | 0.796 | |||
PEM | 0.671 | 0.696 | 0.619 | 0.673 | 0.792 | ||
PIM | 0.704 | 0.675 | 0.692 | 0.720 | 0.615 | 0.817 | |
SELF | 0.474 | 0.587 | 0.488 | 0.513 | 0.507 | 0.441 | 0.717 |
Original Sample | Sample Mean | Standard Deviation | T Statistic | p-Values | |
---|---|---|---|---|---|
ATTI -> BEH | 0.657 | 0.659 | 0.038 | 17.518 | <0.001 |
Age -> BEH | 0.086 | 0.086 | 0.041 | 2.108 | 0.035 |
CUR -> BEH | 0.662 | 0.661 | 0.054 | 12.189 | <0.001 |
Experience -> BEH | 0.092 | 0.092 | 0.039 | 2.371 | 0.018 |
PEFF -> PEM | 0.673 | 0.674 | 0.034 | 19.535 | <0.001 |
PEFF -> PIM | 0.720 | 0.722 | 0.026 | 28.066 | <0.001 |
PEM -> CUR | 0.311 | 0.312 | 0.063 | 4.930 | <0.001 |
PIM -> CUR | 0.500 | 0.500 | 0.060 | 8.280 | <0.001 |
SELF -> ATTI | 0.151 | 0.154 | 0.050 | 3.042 | 0.002 |
Appendix B
Variable | Definition | Survey Questions | Source |
---|---|---|---|
Perceived effectiveness of bug bounty programs | The extent to which a person believes that using a specific system will improve their job performance. | My job would be difficult to perform without bug bounty programs. The use of bug bounty programs was highly effective. Bug bounty programs are perceived to be effective by bug hunters. I enjoyed being a member of bug bounty programs. | [76] [77] |
Perceived intrinsic motivation | Participants’ desire to continue working on the task, level of interest in the activity, perceived level of challenge, and task satisfaction. | I like bug hunting. I hate bug hunting. I wish we had more bug bounty programs. In the future I would like to learn more about bug hunting. | [78] [79] |
Perceived extrinsic motivation | Obtaining satisfaction that is independent of the activity’s content. | I am keenly aware of the income goals I have for myself if I learn business and technical knowledge about bug hunting. I am strongly motivated by the money I can earn if I learn business and technical knowledge about bug hunting. I am strongly motivated by the recognition I can earn from other people for learning business and technical knowledge about bug hunting. I have to feel that I am earning something for learning business and technical knowledge about bug hunting. | [80] [81] |
Curiosity of bug hunters | The extent to which an individual’s sensory and cognitive curiosity is piqued. | Interacting with bug hunters makes me curious. Finding bugs makes me curious. Finding bugs arouses my imagination. I am curious to find other bug hunters | [82] [81] |
Attitude towards the behavior | Attitude toward bug hunters. | When I address bugs with bug hunters, I do something good for society. When I address bugs with bug hunters, I enjoy it. When I address bugs with bug hunters, I do something which will satisfy myself. When I address bugs with bug hunters, bug hunters will be pleased with it. | [83] |
Exposure | The perception of a bug hunter that information and technology resources at work are vulnerable to security risks and threats. | I have been hacked at least once. I have never been hacked. I refuse to believe that I can be hacked. I have a strategy for not being exposed. | [84] |
Behavioral intention to bug hunt | The extent to which a person has made conscious plans to perform or refrain from performing a specific future behavior. | I intend to continue using bug bounty programs. I predict I will continue using bug bounty programs. If everything goes as I plan, I will bug hunt daily. I intend to bug hunt daily. | [85] |
Experience (Years) | Count |
---|---|
Almost none | 151 |
Somewhat | 177 |
Medium | 44 |
Much | 12 |
A lot of experience | 2 |
Age Group | Count |
---|---|
18–24 | 95 |
25–34 | 148 |
35+ | 141 |
Country | Count |
---|---|
United States | 190 |
Netherlands | 74 |
United Kingdom | 70 |
Canada | 31 |
India | 6 |
Other countries | 15 |
References
- Al-Somali, S.A.; Saqr, R.R.; Asiri, A.M.; Al-Somali, N.A. Organizational cybersecurity systems and sustainable business performance of small and medium enterprises (SMEs) in Saudi Arabia: The mediating and moderating role of cybersecurity resilience and organizational culture. Sustainability 2024, 16, 1880. [Google Scholar] [CrossRef]
- Arce, D.G. Cybersecurity and platform competition in the cloud. Comput. Secur. 2020, 93, 101774. [Google Scholar] [CrossRef]
- Akdemir, N.; Lawless, C.J. Exploring the human factor in cyber-enabled and cyber-dependent crime victimisation: A lifestyle routine activities approach. Internet Res. 2020, 30, 1665–1687. [Google Scholar] [CrossRef]
- Ahmad, A.; Rachelle, B.; Rens, S. Protecting organizational competitive advantage: A knowledge leakage perspective. Comput. Secur. 2014, 42, 27–39. [Google Scholar] [CrossRef]
- Asbaş, C.; Tuzlukaya, Ş. Cyberattack and cyberwarfare strategies for businesses. In Conflict Management in Digital Business; Emerald Publishing Limited: Leeds, UK, 2022; pp. 303–328. [Google Scholar]
- McFadden, C. The Origin of the Term ‘Computer Bug’; Interesting Engineering, Inc.: New York, NY, USA, 2020; Available online: https://interestingengineering.com/innovation/the-origin-of-the-term-computer-bug (accessed on 20 March 2022).
- McLaughlin, M.D.; Gogan, J. Challenges and best practices in information security management. MIS Q. Exec. 2018, 17, 12. [Google Scholar]
- Malladi, S.S.; Subramanian, H.C. Bug bounty programs for cybersecurity: Practices, issues, and recommendations. IEEE Softw. 2019, 37, 31–39. [Google Scholar] [CrossRef]
- Oltsik, J. The life and times of cybersecurity professionals 2018. ESG Res. Rep. 2019, 2, 2020. [Google Scholar]
- Zhao, M.; Grossklags, J.; Liu, P. An empirical study of web vulnerability discovery ecosystems. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12–16 October 2015; pp. 1105–1117. [Google Scholar]
- Laszka, A.; Zhao, M.; Malbari, A.; Grossklags, J. The rules of engagement for bug bounty programs. In Proceedings of the Financial Cryptography and Data Security: 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, 26 February–2 March 2018; Revised Selected Papers 22. Springer: Berlin/Heidelberg, Germany, 2018; pp. 138–159. [Google Scholar]
- Arshad, J.; Talha, M.; Saleem, B.; Shah, Z.; Zaman, H.; Muhammad, Z. A Survey of Bug Bounty Programs in Strengthening Cybersecurity and Privacy in the Blockchain Industry. Blockchains 2024, 2, 195–216. [Google Scholar] [CrossRef]
- Winder, D. These Hackers Have Made $100 Million and Could Earn $1 Billion by 2025. Forbes, 29 May 2020. [Google Scholar]
- Durward, D.; Blohm, I.; Leimeister, J.M. The nature of crowd work and its effects on individuals’ work perception. J. Manag. Inf. Syst. 2020, 37, 66–95. [Google Scholar] [CrossRef]
- Guo, W.; Straub, D.; Zhang, P.; Cai, Z. How Trust Leads To Commitment On Microsourcing Platforms: Unraveling The Effects of Governance and Third-Party Mechanisms on Triadic Microsourcing Relationships. MIS Q. 2021, 45, 3. [Google Scholar] [CrossRef]
- Banda, R.; Phiri, J.; Nyirenda, M.; Kabemba, M.M. Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools. Zamb. ICT J. 2019, 3, 40–51. [Google Scholar] [CrossRef]
- Al-Banna, M.; Benatallah, B.; Schlagwein, D.; Bertino, E.; Barukh, M.C. Friendly Hackers to the Rescue: How Organizations Perceive Crowdsourced Vulnerability Discovery. In Proceedings of the PACIS, Yokohama, Japan, 26–30 June 2018; p. 230. [Google Scholar]
- Li, Y.; Zhao, L. Collaborating with bounty hunters: How to encourage white hat hackers’ participation in vulnerability crowdsourcing programs through formal and relational governance. Inf. Manag. 2022, 59, 103648. [Google Scholar] [CrossRef]
- Walshe, T.; Simpson, A. An empirical study of bug bounty programs. In Proceedings of the 2020 IEEE 2nd International Workshop on Intelligent Bug Fixing (IBF), London, ON, Canada, 18 February 2020; IEEE: New York, NY, USA, 2020; pp. 35–44. [Google Scholar]
- Ajzen, I. The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 1991, 50, 179–211. [Google Scholar] [CrossRef]
- Amabile, T.M. Motivational synergy: Toward new conceptualizations of intrinsic and extrinsic motivation in the workplace. Hum. Res. Manag. Rev. 1993, 3, 185–201. [Google Scholar] [CrossRef]
- Amabile, T.M.; Pratt, M.G. The dynamic componential model of creativity and innovation in organizations: Making progress, making meaning. Res. Organ. Behav. 2016, 36, 157–183. [Google Scholar] [CrossRef]
- Amankwa, E.; Loock, M.; Kritzinger, E. The determinants of an information security policy compliance culture in organisations: The combined effects of organisational and behavioural factors. Inf. Comput. Secur. 2022, 30, 583–614. [Google Scholar] [CrossRef]
- Karlsson, F.; Åström, J.; Karlsson, M. Information security culture–state-of-the-art review between 2000 and 2013. Inf. Comput. Secur. 2015, 23, 246–285. [Google Scholar] [CrossRef]
- Harnesk, D.; Lindström, J. Shaping security behaviour through discipline and agility: Implications for information security management. Inf. Manag. Comput. Secur. 2011, 19, 262–276. [Google Scholar] [CrossRef]
- Okere, I.; Van Niekerk, J.; Carroll, M. Assessing information security culture: A critical analysis of current approaches. In 2012 Information Security for South Africa; IEEE: New York, NY, USA, 2012; pp. 1–8. [Google Scholar]
- Ramachandran, S.; Rao, S.V.; Goles, T. Information security cultures of four professions: A comparative study. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), Waikoloa, HI, USA, 7–10 January 2008; IEEE: New York, NY, USA, 2008; p. 454. [Google Scholar]
- Da Veiga, A.; Eloff, J.H. A framework and assessment instrument for information security culture. Comput. Secur. 2010, 29, 196–207. [Google Scholar] [CrossRef]
- Chia, P.A.; Maynard, S.B.; Ruighaver, A.B. Understanding organizational security culture. In Proceedings of the PACIS2002, Tokyo, Japan, 5–9 July 2002; p. 158. [Google Scholar]
- Koh, K.; Ruighaver, A.B.; Maynard, S.B.; Ahmad, A. Security governance: Its impact on security culture. In Proceedings of the 3rd Australian Information Security Management Conference, Perth, Australia, 30 September 2005. [Google Scholar]
- Nicho, M. A process model for implementing information systems security governance. Inf. Comput. Secur. 2018, 26, 10–38. [Google Scholar] [CrossRef]
- Parsons, K.M.; Young, E.; Butavicius, M.A.; McCormac, A.; Pattinson, M.R.; Jerram, C. The influence of organizational information security culture on information security decision making. J. Cogn. Eng. Decis. Mak. 2015, 9, 117–129. [Google Scholar] [CrossRef]
- Guan, B.; Hsu, C. The role of abusive supervision and organizational commitment on employees’ information security policy noncompliance intention. Internet Res. 2020, 30, 1383–1405. [Google Scholar] [CrossRef]
- Chen, Y.; Ramamurthy, K.; Wen, K.W. Organizations’ information security policy compliance: Stick or carrot approach? J. Manag. Inf. Syst. 2012, 29, 157–188. [Google Scholar] [CrossRef]
- Glaspie, H.W.; Karwowski, W. Human factors in information security culture: A literature review. In Proceedings of the Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, Los Angeles, CA, USA, 17−21 July 2017; The Westin Bonaventure Hotel: Los Angeles, CA, USA; Springer International Publishing: Berlin/Heidelberg, Germany, 2018; Volume 8, pp. 269–280. [Google Scholar]
- Farahmand, F.; Atallah, M.J.; Spafford, E.H. Incentive alignment and risk perception: An information security application. IEEE Trans. Eng. Manag. 2012, 60, 238–246. [Google Scholar] [CrossRef]
- Vance, A.; Siponen, M.; Pahnila, S. Motivating IS security compliance: Insights from habit and protection motivation theory. Inf. Manag. 2012, 49, 190–198. [Google Scholar] [CrossRef]
- Ganye, D.; Smith, K. Examining the effects of cognitive load on information systems security policy compliance. Internet Res. 2024, 35, 380–418. [Google Scholar] [CrossRef]
- Vakani, F.; Sheerani, M. How to gain consensus from a group of non-experts—An educationist perspective on using the Delphi technique. Dev. Learn. Organ. Int. J. 2012, 26, 20–22. [Google Scholar] [CrossRef]
- Skinner, R.; Nelson, R.R.; Chin, W.W.; Land, L. The Delphi Method Research Strategy in Studies of Information Systems. Commun. Assoc. Inf. Syst. 2015, 37, 2. [Google Scholar] [CrossRef]
- Alarabiat, A.; Ramos, I. The Delphi Method in Information Systems Research (2004–2017). Electron. J. Bus. Res. Methods 2019, 17, 86–99. [Google Scholar] [CrossRef]
- Slack, M.K.; Draugalis, J.R. Establishing the internal and external validity of experimental studies. Am. J. Health-Syst. Pharm. 2001, 58, 2173–2181. [Google Scholar] [CrossRef]
- Daoud, M. Improving External Validity May Jeopardize Internal Validity. Anesthesiology 2019, 130, 508–509. [Google Scholar] [CrossRef]
- Owen, K.D. Motivation and Demotivation of Hackers in The Selection of A Hacking Task—A Contextual Approach. Ph.D Dissertation, McMaster University, Hamilton, ON, Canada, 2016. [Google Scholar]
- Madden, T.J.; Ellen, P.S.; Ajzen, I. A Comparison of the Theory of Planned Behavior and the Theory of Reasoned Action. Pers. Soc. Psychol. Bull. 1992, 18, 3–9. [Google Scholar] [CrossRef]
- Ajzen, I.; Madden, T. Prediction of Goal-Directed Behavior: Attitudes, Intentions, and Perceived Behavioral Control. J. Exp. Soc. Psychol. 1986, 22, 453–474. [Google Scholar] [CrossRef]
- Zhao, M.; Laszka, A.; Grossklags, J. Devising effective policies for bug-bounty platforms and security vulnerability discovery. J. Inf. Policy 2017, 7, 372–418. [Google Scholar] [CrossRef]
- Oluoha, O.U.; Yange, T.S.; Okereke, G.E.; Bakpo, F.S. Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey. J. Inf. Secur. 2021, 12, 250–269. [Google Scholar] [CrossRef]
- Ransbotham, S.; Mitra, S.; Ramsey, J. Are Markets for Vulnerabilities Effective? MIS Q. 2012, 36, 21. [Google Scholar] [CrossRef]
- Venkatesh, V.; Morris, M.G.; Davis, G.B.; Davis, F.D. User acceptance of information technology: Toward a unified view. MIS Q. 2003, 27, 425–478. [Google Scholar] [CrossRef]
- Chickowski, E. You Break, It, They Buy It: Economics, Motivations Behind Bug Bounty Hunting. Dark Reading. Available online: https://www.darkreading.com/threat-intelligence/you-break-it-they-buy-it-economics-motivations-behind-bug-bounty-hunting (accessed on 19 January 2018).
- Herzberg, F. Work and the Nature of Man; Ty Crowell: New York, NY, USA, 1966. [Google Scholar]
- Maw, W.H.; Maw, E.W. Self-appraisal of Curiosity. J. Educ. Res. 1968, 61, 462–465. [Google Scholar] [CrossRef]
- Loewenstein, G. The psychology of curiosity: A review and reinterpretation. Psychol. Bull. 1994, 116, 75–98. [Google Scholar] [CrossRef]
- Vidler, D.C.; Curiosity, I.S.B. (Eds.) Motivation in Education; Academic Press: New York, NY, USA, 1977. [Google Scholar]
- Stoner, S.B.; Spencer, W.B. Age and Sex Differences on the State-Trait Personality Inventory. Psychol. Rep. 1986, 59, 1315–1319. [Google Scholar] [CrossRef]
- Menon, S.; Soman, D. Managing the power of curiosity for effective web advertising strategies. J. Advert. 2002, 31, 1–14. [Google Scholar] [CrossRef]
- Shoham, A.; Pesämaa, O. Gadget loving: A test of an integrative model. Psychol. Mark. 2013, 30, 247–262. [Google Scholar] [CrossRef]
- Hill, K.M.; Fombelle, P.W.; Sirianni, N.J. Shopping under the influence of curiosity: How retailers use mystery to drive purchase motivation. J. Bus. Res. 2016, 69, 1028–1034. [Google Scholar] [CrossRef]
- Thomas, V.L.; Vinuales, G. Understanding the role of social influence in piquing curiosity and influencing attitudes and behaviors in a social network environment. Psychol. Mark. 2017, 34, 884–893. [Google Scholar] [CrossRef]
- Maddux, J.E.; Rogers, R.W. Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. J. Exp. Soc. Psychol. 1983, 19, 469–479. [Google Scholar] [CrossRef]
- Astremska, I. Influence of Self-Attitude and Attitude to Others on the Success of Representatives of Professions “Person-Person” Type; Psychology Series; Scientific Notes of Ostroh Academy National University: Ostroh, Oekraïne, 2020; Volume 1, pp. 4–8. [Google Scholar]
- Park, J.; Son, J.Y.; Suh, K.S. Fear appeal cues to motivate users’ security protection behaviors: An empirical test of heuristic cues to enhance risk communication. Internet Res. 2022, 32, 708–727. [Google Scholar] [CrossRef]
- Bechler, C.J.; Tormala, Z.L.; Rucker, D.D. The attitude–behavior relationship revisited. Psychol. Sci. 2021, 32, 1285–1297. [Google Scholar] [CrossRef]
- van Oosten, J.M.; Peter, J.; Boot, I. Exploring associations between exposure to sexy online self-presentations and adolescents’ sexual attitudes and behavior. J. Youth Adolesc. 2015, 44, 1078–1091. [Google Scholar] [CrossRef]
- Kuehn, A.; Mueller, M. Analyzing Bug Bounty Programs: An Institutional Perspective on the Economics of Software Vulnerabilities. In 2014 TPRC Conference Paper; SSRN: Arlington, VA, USA, 2014. [Google Scholar]
- Delmas, C. Is hacktivism the new civil disobedience? Raisons Polit. 2018, 69, 63–81. [Google Scholar] [CrossRef]
- Scheuerman, W.E. Digital disobedience and the law. New Political Sci. 2016, 38, 299–314. [Google Scholar] [CrossRef]
- Sauter, M. The Coming Swarm: DDOS Actions, Hacktivism, and Civil Disobedience on the Internet; Bloomsbury Academic: London, UK, 2014; p. 208. [Google Scholar]
- Bellaby, R.W. An ethical framework for hacking operations. In The Ethics of Hacking; Bristol University Press: Bristol, UK, 2023; pp. 32–52. [Google Scholar]
- Hata, H.; Guo, M.; Babar, M.A. Understanding the heterogeneity of contributors in bug bounty programs. In Proceedings of the 2017 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), Toronto, ON, Canada, 9–10 November 2017; IEEE: New York, NY, USA, 2017; pp. 223–228. [Google Scholar]
- Magalhães, J.P. Bug Bounties: Ethical and Legal Aspects. In Legal Developments on Cybersecurity and Related Fields; Springer International Publishing: Cham, Switzerland, 2024; pp. 235–250. [Google Scholar]
- Del-Real, C.; Rodriguez Mesa, M.J. From black to white: The regulation of ethical hacking in Spain. Inf. Commun. Technol. Law 2022, 32, 207–239. [Google Scholar] [CrossRef]
- ISO/IEC 29147:2018; Information Technology—Security Techniques—Vulnerability Disclosure (2nd ed.). ISO: Geneva, Switzerland, 2018. Available online: https://www.iso.org/standard/72311.html (accessed on 14 March 2022).
- Japan Computer Emergency Response Team Coordination Center (JPCERT/CC) and Information-Technology Promotion Agency (IPA). Japan Vulnerability Notes (JVN). Available online: https://jvn.jp/en/ (accessed on 14 March 2022).
- Jim, S.; Gallupe, R.B. Using Electronic Meeting Technology to Support Economic Policy Development in New Zealand: Short-Term Re-sults. J. Manag. Inf. Syst. 1993, 10, 97–116. [Google Scholar]
- Alan, R.D.; Valacich, J.S.; Connolly, T. Process Structuring in Electronic Brainstorming. Inf. Syst. Res. 1996, 7, 268–277. [Google Scholar]
- Mossholder, K.W. Effects of externally mediated goal setting on intrinsic motivation: A labora-tory experiment. J. Appl. Psychol. 1980, 65, 202–210. [Google Scholar] [CrossRef]
- Marsh, H.W. Self- De-Scription Questionnaire II: A Theoretical and Empirical Basis for the Measurement of Multiple Dimensions of Adolescent Self-Concept: An Interest Manual and a Research Monograph; Psychological Corporstion: San Antonio, TX, USA, 1990. [Google Scholar]
- Dong-Gil, K. Anteced-ents of knowledge transfer from consultants to clients in enterprise system implementations. MIS Q. 2005, 29, 59–85. [Google Scholar]
- Amabile, T. The Work Preference Inventory: Assessing Intrinsic and Extrinsic Motiva-tional Orientations. J. Personal. Soc. Psychol. 1993, 66, 950–967. [Google Scholar] [CrossRef]
- Ritu, A.; Kara-hanna, E. Time Flies When You’re Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage. MIS Q. 2000, 24, 665–694. [Google Scholar]
- Leurs, M.T.; Bessems, K.; Schaalma, H.P.; de Vries, H. Schaal-ma. Focus points for school health promotion im-provements in Dutch primary schools. Health Educ. Res. 2007, 22, 58–69. [Google Scholar] [CrossRef]
- Carver, C.S.; Scheier, M.F.; Weintraub, J.K. Assessing coping strategies: A theoretically based approach. J. Personal. Soc. Psychol. 1989, 56, 267–283. [Google Scholar] [CrossRef]
- Warshaw, P.R. Disentangling behavioral intention and behavioral expectations. J. Exp. Soc. Psychol. 1985, 21, 213–228. [Google Scholar] [CrossRef]
Expert | Role | Expertise |
---|---|---|
Expert 1 | Ex-member of Dutch institute for vulnerability disclosure. | Knowledge about vulnerabilities. |
Expert 2 | Bug bounty hunter (Contractor). | Knowledge about bugs. |
Expert 3 | Bug bounty hunter (Contractor). | Knowledge about bugs. |
Expert 4 | Bug bounty researcher. | Knowledge about the motivation of bug hunters. |
Relationship | Result |
---|---|
H1: Perceived effectiveness of bug bounty programs -> Perceived intrinsic motivation | Supported |
H2: Perceived effectiveness of bug bounty programs -> Perceived extrinsic motivation | Supported |
H3: Perceived intrinsic motivation -> Curiosity | Supported |
H4: Perceived extrinsic motivation -> Curiosity | Supported |
H5: Curiosity -> Attitude towards behavior | Supported |
H6: Exposure -> Attitude towards behavior | Supported |
H7: Attitude towards behavior -> behavioral intention to bug hunt | Supported |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Barre, G. From Breakers to Builders: The Role of Bug Bounty Hunters in Strengthening Organizational Cybersecurity. Information 2025, 16, 209. https://doi.org/10.3390/info16030209
Barre G. From Breakers to Builders: The Role of Bug Bounty Hunters in Strengthening Organizational Cybersecurity. Information. 2025; 16(3):209. https://doi.org/10.3390/info16030209
Chicago/Turabian StyleBarre, Gulet. 2025. "From Breakers to Builders: The Role of Bug Bounty Hunters in Strengthening Organizational Cybersecurity" Information 16, no. 3: 209. https://doi.org/10.3390/info16030209
APA StyleBarre, G. (2025). From Breakers to Builders: The Role of Bug Bounty Hunters in Strengthening Organizational Cybersecurity. Information, 16(3), 209. https://doi.org/10.3390/info16030209