NCJ Number
220368
Journal
Security Journal Volume: 20 Issue: 4 Dated: October 2007 Pages: 236-251
Date Published
October 2007
Length
16 pages
Annotation
This paper reviews the literature on the motivations that encourage hacking, from the perspective of both informal observation and formal psychological theories.
Abstract
Contemporary theories of hacking have been investigated and both the Theory of Planned Behavior (suggesting that there are three determinants of intention: attitude to behavior, subjective norms, and perceived behavioral control which have implications for performing a behavior) and Flow Theory (state of consciousness that is intrinsically motivated; the energy invested in the experience is due to the enjoyment and inner harmony attained in the experience itself) have been discussed. However, the landscape of benign and malicious cyber hacking is more complex than the Flow Theory Model and the solution to the problem more difficult than that previously suggested. This paper presents an advanced model of cyber hacking which includes additional cyber actors, and control variables which influence the development of various aspects of this model which have been identified and discussed. A comprehensive program has been proposed which involves establishing an environment in which the factors that influence the start of hacking, and hence the initiation of the flow experience, can be controlled. Over the last 30 years the Internet has grown well beyond its design goals. With this unexpected growth, the potential opportunity for systems to be accessed without authorization has correspondingly increased. This form of behavior is commonly known as hacking. This paper examines the traditional explanations for the factors that drive people to break into computers and networks. It compares these to the more recent association of “flow theory” with computer attacks. The resulting model is assessed to determine the methods and control variables by which offenders can be discouraged from developing their skills and carrying out attacks. Tables, figures, references