JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Prediction Model for Deviant Hacking Behavior and Hacking Type in Hackers Based on Psychological Variable
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Prediction Model for Deviant Hacking Behavior and Hacking Type in Hackers Based on Psychological Variable
Park, Chan Hyun; Song, In Uk; Kim, Min Ji; Chang, Eun Hee; Heo, Jun; Kim, Hyun Taek;
  PDF(new window)
 Abstract
Despite the extant quantum communication technology that does not allow copying, wiretapping, and/or monitoring, cyber-terror-attempts from hackers with unconscientious purposes and motives are prospected to persist. Hence, it is imperative and necessary to invest in studies geared toward understanding the psychology of hackers. The current study referred to Beebe & Clark (2006) and sought out the psychological variables in hackers involved in deviant hacking activities, measured the purpose of hacking and actual hacking experiences, and constructed a predictive model that can categorize hacker types based on their intentions.
 Keywords
Hacker;Psychology;Security;Prediction model;Cybercriminology;
 Language
Korean
 Cited by
 References
1.
F. Xu, B. Qi, and H. K. Lo, "Experimental demonstration of phase-remapping attack in a practical quantum key distribution system," New J. Physics, vol. 12, no. 11, pp. 14-28, Nov. 2010.

2.
L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov, "Hacking commercial quantum cryptography systems by tailored bright illumination," Nature Photonics, vol. 4, no. 10, pp. 686-689, Aug. 2010. crossref(new window)

3.
I. Gerhardt, Q. Liu, A. Lamas-Linares, J. Skaar, C. Kurtsiefer, and V. Makarov, "Full-field implementation of a perfect eavesdropper on a quantum cryptography system," Nature Commun., vol. 2, no. 349, Jun. 2011.

4.
N. Jain, C. Wittmann, L. Lydersen, C. Wiechers, D. Elser, C. Marquardt, and G. Leuchs, "Device calibration impacts security of quantum key distribution," Physical Rev. Lett., vol. 107, no. 11, pp. 110501(1-5), Sept. 2011. crossref(new window)

5.
Y. Liu, Y. Cao, M. Curty, S. K. Liao, J. Wang, K. Cui, and H. F. Zhang, "Experimental unconditionally secure bit commitment," Physical Rev. Lett., vol. 112, no. 1, pp. 010504(1-5), Jan. 2014. crossref(new window)

6.
M. Rogers, Preliminary findings: understanding criminal computer behavior: a personality trait and moral choice analysis, Retrieved June, 27, 2009, from http://homes.cerias.purdue.edu/-mkr/CPA.doc

7.
G. Rose, H. Khoo, and D. W. Straub, "Current technological impediments to business-to-consumer electronic commerce," Commun. AIS (CAIS), vol. 1, no. 16, Jun. 1999.

8.
K. Buyens, B. D. Win, and W. Joosen, "Empirical and statistical analysis of risk analysis-driven techniques for threat management," in Proc. IEEE ARES 2007, pp. 1034-1041, Vienna, Austria, Apr. 2007.

9.
N. L. Beebe and J. Guynes, "A model for predicting hacker behavior," in Proc. AMCIS 2006, vol. 409, Acapulco, Mexico, Dec. 2006.

10.
D. R. Forsyth, "A taxonomy of ethical ideologies," J. Personality and Social Psychology, vol. 39, no. 1, pp. 175-184, Jul. 1980. crossref(new window)

11.
H. J. Woo, "A study on the relationship between hackers' psychological variables and hacking activities," Korean J. Journalism & Commun. Stud., vol. 48, no. 3, pp. 90-115, Jun. 2004.

12.
M. Bachmann, "The risk propensity and rationality of computer hackers," The Int. J. Cyber Criminology, vol. 4, no. 1-2, pp. 643-656, 2010.

13.
M. Rogers, N. D. Smoak, and J. Liu, "Self-reported deviant computer behavior: a big-5, moral choice, and manipulative exploitive behavior analysis," Deviant Behavior, vol. 27, no. 3, pp. 245-268, 2006. crossref(new window)

14.
S. A. Jackson and H. W. Marsh, "Development and validation of a scale to measure optimal experience: The flow state scale," J. Sport and Exercise Psychology, vol. 18, no. 1, pp. 17-35, Dec. 1996. crossref(new window)

15.
C. D. Spielberger, G. Jacobs, S. Russell, and R. S. Crane, "Assessment of anger: The state-trait anger scale," in Advances in Personality Assessment, vol. 2, pp. 161-189, Lawrence Erlbaum Associates, 1983.

16.
E. S. Knowles, H. S. Cutter, D. H. Walsh, and N. A. Casey, "Risk-taking as a personality trait," Social Behavior and Personality: an Int. J., vol. 1, no. 2, pp. 123-136, Jan. 1973.

17.
J. Y. Hong and Y. H. Cho, "A study the impacts of gamblers' risk taking and maladaptive beliefs on the gambling behavior," J. Tourism Sci., vol. 35, no. 8, pp. 367-388, Oct. 2011.

18.
L. R. Goldberg, "The development of markers for the Big-Five factor structure," Psychological assessment, vol. 4, no. 1, pp. 26-42, Mar. 1992. crossref(new window)

19.
M. Fishbein and I. Azjen, Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Addison-Wesley, 1975.

20.
L. K. Trevino, "Moral reasoning and business ethics: Implications for research, education and management," J. Business Ethics, vol. 11, no. 5, pp. 445-464, May 1992. crossref(new window)

21.
H. J. Eysenck and M. W. Eysenck, Personality and Individual Differences, Plenum Press, 1985.