skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 220368 Find in a Library
Title: Advanced Model of Hacking
Journal: Security Journal  Volume:20  Issue:4  Dated:October 2007  Pages:236-251
Author(s): Lara Rennie; Malcolm Shore
Date Published: October 2007
Page Count: 16
Publisher: http://www.palgrave.com/ 
Type: Literature Review
Format: Article
Language: English
Country: United States of America
Annotation: This paper reviews the literature on the motivations that encourage hacking, from the perspective of both informal observation and formal psychological theories.
Abstract: Contemporary theories of hacking have been investigated and both the Theory of Planned Behavior (suggesting that there are three determinants of intention: attitude to behavior, subjective norms, and perceived behavioral control which have implications for performing a behavior) and Flow Theory (state of consciousness that is intrinsically motivated; the energy invested in the experience is due to the enjoyment and inner harmony attained in the experience itself) have been discussed. However, the landscape of benign and malicious cyber hacking is more complex than the Flow Theory Model and the solution to the problem more difficult than that previously suggested. This paper presents an advanced model of cyber hacking which includes additional cyber actors, and control variables which influence the development of various aspects of this model which have been identified and discussed. A comprehensive program has been proposed which involves establishing an environment in which the factors that influence the start of hacking, and hence the initiation of the flow experience, can be controlled. Over the last 30 years the Internet has grown well beyond its design goals. With this unexpected growth, the potential opportunity for systems to be accessed without authorization has correspondingly increased. This form of behavior is commonly known as hacking. This paper examines the traditional explanations for the factors that drive people to break into computers and networks. It compares these to the more recent association of “flow theory” with computer attacks. The resulting model is assessed to determine the methods and control variables by which offenders can be discouraged from developing their skills and carrying out attacks. Tables, figures, references
Main Term(s): Computer related crime
Index Term(s): Behavior patterns; Behavior typologies; Computer abuse; Crime causes theory; Literature reviews
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=242182

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.