Browse > Article
http://dx.doi.org/10.7840/kics.2016.41.4.489

Prediction Model for Deviant Hacking Behavior and Hacking Type in Hackers Based on Psychological Variable  

Park, Chan Hyun (Dep. of Psychology, Korea University)
Song, In Uk (Dep. of Psychology, Korea University)
Kim, Min Ji (Dep. of Psychology, Korea University)
Chang, Eun Hee (Dep. of Psychology, Korea University)
Heo, Jun (School of Electrical Engineering, Korea University)
Kim, Hyun Taek (Dep. of Psychology, Korea University)
Abstract
Despite the extant quantum communication technology that does not allow copying, wiretapping, and/or monitoring, cyber-terror-attempts from hackers with unconscientious purposes and motives are prospected to persist. Hence, it is imperative and necessary to invest in studies geared toward understanding the psychology of hackers. The current study referred to Beebe & Clark (2006) and sought out the psychological variables in hackers involved in deviant hacking activities, measured the purpose of hacking and actual hacking experiences, and constructed a predictive model that can categorize hacker types based on their intentions.
Keywords
Hacker; Psychology; Security; Prediction model; Cybercriminology;
Citations & Related Records
연도 인용수 순위
  • Reference
1 F. Xu, B. Qi, and H. K. Lo, "Experimental demonstration of phase-remapping attack in a practical quantum key distribution system," New J. Physics, vol. 12, no. 11, pp. 14-28, Nov. 2010.
2 L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov, "Hacking commercial quantum cryptography systems by tailored bright illumination," Nature Photonics, vol. 4, no. 10, pp. 686-689, Aug. 2010.   DOI
3 I. Gerhardt, Q. Liu, A. Lamas-Linares, J. Skaar, C. Kurtsiefer, and V. Makarov, "Full-field implementation of a perfect eavesdropper on a quantum cryptography system," Nature Commun., vol. 2, no. 349, Jun. 2011.
4 N. Jain, C. Wittmann, L. Lydersen, C. Wiechers, D. Elser, C. Marquardt, and G. Leuchs, "Device calibration impacts security of quantum key distribution," Physical Rev. Lett., vol. 107, no. 11, pp. 110501(1-5), Sept. 2011.   DOI
5 Y. Liu, Y. Cao, M. Curty, S. K. Liao, J. Wang, K. Cui, and H. F. Zhang, "Experimental unconditionally secure bit commitment," Physical Rev. Lett., vol. 112, no. 1, pp. 010504(1-5), Jan. 2014.   DOI
6 M. Rogers, Preliminary findings: understanding criminal computer behavior: a personality trait and moral choice analysis, Retrieved June, 27, 2009, from http://homes.cerias.purdue.edu/-mkr/CPA.doc
7 G. Rose, H. Khoo, and D. W. Straub, "Current technological impediments to business-to-consumer electronic commerce," Commun. AIS (CAIS), vol. 1, no. 16, Jun. 1999.
8 K. Buyens, B. D. Win, and W. Joosen, "Empirical and statistical analysis of risk analysis-driven techniques for threat management," in Proc. IEEE ARES 2007, pp. 1034-1041, Vienna, Austria, Apr. 2007.
9 N. L. Beebe and J. Guynes, "A model for predicting hacker behavior," in Proc. AMCIS 2006, vol. 409, Acapulco, Mexico, Dec. 2006.
10 D. R. Forsyth, "A taxonomy of ethical ideologies," J. Personality and Social Psychology, vol. 39, no. 1, pp. 175-184, Jul. 1980.   DOI
11 H. J. Woo, "A study on the relationship between hackers' psychological variables and hacking activities," Korean J. Journalism & Commun. Stud., vol. 48, no. 3, pp. 90-115, Jun. 2004.
12 M. Bachmann, "The risk propensity and rationality of computer hackers," The Int. J. Cyber Criminology, vol. 4, no. 1-2, pp. 643-656, 2010.
13 M. Rogers, N. D. Smoak, and J. Liu, "Self-reported deviant computer behavior: a big-5, moral choice, and manipulative exploitive behavior analysis," Deviant Behavior, vol. 27, no. 3, pp. 245-268, 2006.   DOI
14 S. A. Jackson and H. W. Marsh, "Development and validation of a scale to measure optimal experience: The flow state scale," J. Sport and Exercise Psychology, vol. 18, no. 1, pp. 17-35, Dec. 1996.   DOI
15 C. D. Spielberger, G. Jacobs, S. Russell, and R. S. Crane, "Assessment of anger: The state-trait anger scale," in Advances in Personality Assessment, vol. 2, pp. 161-189, Lawrence Erlbaum Associates, 1983.
16 E. S. Knowles, H. S. Cutter, D. H. Walsh, and N. A. Casey, "Risk-taking as a personality trait," Social Behavior and Personality: an Int. J., vol. 1, no. 2, pp. 123-136, Jan. 1973.   DOI
17 J. Y. Hong and Y. H. Cho, "A study the impacts of gamblers' risk taking and maladaptive beliefs on the gambling behavior," J. Tourism Sci., vol. 35, no. 8, pp. 367-388, Oct. 2011.
18 L. R. Goldberg, "The development of markers for the Big-Five factor structure," Psychological assessment, vol. 4, no. 1, pp. 26-42, Mar. 1992.   DOI
19 M. Fishbein and I. Azjen, Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Addison-Wesley, 1975.
20 L. K. Trevino, "Moral reasoning and business ethics: Implications for research, education and management," J. Business Ethics, vol. 11, no. 5, pp. 445-464, May 1992.   DOI
21 H. J. Eysenck and M. W. Eysenck, Personality and Individual Differences, Plenum Press, 1985.