Users with this model often focus on the identity of the hacker. This identity {a young computer geek with poor morals {is much more developed in their mind than the resulting behavior of the hacker. As such, people with this model can usually talk clearly and give examples of who hackers are, but seem less confident in information about the resulting break-ins that happen.