Currently, very limited research is available to help researchers and firms understand the behavior of hackers. As a result, misconceptions about hackers are formed based on lack of understanding about technology and failure in recognizing the differences among hackers. We use addiction, intrinsic motivation (state), and self-monitoring (trait) theories to explain hacking. We obtained 62 usable responses from hackers who completed our online research instrument. Our findings showed that intrinsically motivated hackers were less discouraged by the possibility of being discovered and the rules imposed by regulatory authorities; however, no significant result was reported for rules imposed by the profession. Individuals with high motivat...
With the advent of computer crime, law enforcement agencies and investigators have been required to ...
There are various challenges with online data collection, from participant recruitment to ensuring ...
The hacker is the epitome of a cybersecurity threat and the embodied misuse of the Internet. However...
Although much has been written on topic of hacker motivations, little empirical research has been co...
This paper investigates the psychological traits of individuals’ attraction to engaging in hacking b...
The damage caused by illegal hacking has become one of the serious problems facing society. Based on...
In this work, we aim to better understand outsider perspectives of the hacker community through a se...
The importance of securing the cyberspace is higher than ever along with the evolution of cyber atta...
Hacking is an ethically and legally ambiguous area, often associated with cybercrime and cyberattack...
The current study combined the hacker taxonomies presented by Loper (2000), Parker (1998), Rege-Patw...
There remains a lack of understanding on the social factors that influence the behaviours and belief...
We conducted an exploratory study to enhance understanding on systems security and hacker hiring. I...
Recently, it seems as if hacking-related stories can be found in the news every day. To study, and h...
Hackers pose a continuous and unrelenting threat to organizations. Industry and academic researchers...
Studies on hacking have typically focused on motivational aspects and general personality traits of ...
With the advent of computer crime, law enforcement agencies and investigators have been required to ...
There are various challenges with online data collection, from participant recruitment to ensuring ...
The hacker is the epitome of a cybersecurity threat and the embodied misuse of the Internet. However...
Although much has been written on topic of hacker motivations, little empirical research has been co...
This paper investigates the psychological traits of individuals’ attraction to engaging in hacking b...
The damage caused by illegal hacking has become one of the serious problems facing society. Based on...
In this work, we aim to better understand outsider perspectives of the hacker community through a se...
The importance of securing the cyberspace is higher than ever along with the evolution of cyber atta...
Hacking is an ethically and legally ambiguous area, often associated with cybercrime and cyberattack...
The current study combined the hacker taxonomies presented by Loper (2000), Parker (1998), Rege-Patw...
There remains a lack of understanding on the social factors that influence the behaviours and belief...
We conducted an exploratory study to enhance understanding on systems security and hacker hiring. I...
Recently, it seems as if hacking-related stories can be found in the news every day. To study, and h...
Hackers pose a continuous and unrelenting threat to organizations. Industry and academic researchers...
Studies on hacking have typically focused on motivational aspects and general personality traits of ...
With the advent of computer crime, law enforcement agencies and investigators have been required to ...
There are various challenges with online data collection, from participant recruitment to ensuring ...
The hacker is the epitome of a cybersecurity threat and the embodied misuse of the Internet. However...