This paper investigates the psychological traits of individuals’ attraction to engaging in hacking behaviors (both ethical and illegal/unethical) upon entering the workforce. We examine the role of the Dark Triad, Opposition to Authority and Thrill-Seeking traits as regards the propensity of an individual to be interested in White Hat, Black Hat, and Grey Hat hacking. A new set of scales were developed to assist in the delineation of the three hat categories. We also developed a scale to measure each subject’s perception of the probability of being apprehended for violating privacy laws. Engaging in criminal activity involves a choice where there are consequences and opportunities, and individuals perceive them differently, but they can be...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
Human hacking is a nontechnical kind of intrusion that relies heavily on human manipulation. Its imp...
Insiders can engage in malicious activities against organizations such as data theft and sabotage. P...
This paper investigates the psychological traits of individuals’ attraction to engaging in hacking b...
This paper integrates dark personality traits with the economics of crime and rational choice theori...
Currently, very limited research is available to help researchers and firms understand the behavior ...
There remains a lack of understanding as to what determines the path which a young person takes when...
This study proposes that individual personality characteristics and behavioral triggering effects co...
In this work, we aim to better understand outsider perspectives of the hacker community through a se...
Despite the increasingly serious and common acts of crime by employees towards their organizations, ...
Hacking is an ethically and legally ambiguous area, often associated with cybercrime and cyberattack...
The damage caused by illegal hacking has become one of the serious problems facing society. Based on...
There remains a lack of understanding on the social factors that influence the behaviours and belief...
The term hacker has undergone a transformation over the past two decades. While the term held a po...
Although much has been written on topic of hacker motivations, little empirical research has been co...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
Human hacking is a nontechnical kind of intrusion that relies heavily on human manipulation. Its imp...
Insiders can engage in malicious activities against organizations such as data theft and sabotage. P...
This paper investigates the psychological traits of individuals’ attraction to engaging in hacking b...
This paper integrates dark personality traits with the economics of crime and rational choice theori...
Currently, very limited research is available to help researchers and firms understand the behavior ...
There remains a lack of understanding as to what determines the path which a young person takes when...
This study proposes that individual personality characteristics and behavioral triggering effects co...
In this work, we aim to better understand outsider perspectives of the hacker community through a se...
Despite the increasingly serious and common acts of crime by employees towards their organizations, ...
Hacking is an ethically and legally ambiguous area, often associated with cybercrime and cyberattack...
The damage caused by illegal hacking has become one of the serious problems facing society. Based on...
There remains a lack of understanding on the social factors that influence the behaviours and belief...
The term hacker has undergone a transformation over the past two decades. While the term held a po...
Although much has been written on topic of hacker motivations, little empirical research has been co...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
Human hacking is a nontechnical kind of intrusion that relies heavily on human manipulation. Its imp...
Insiders can engage in malicious activities against organizations such as data theft and sabotage. P...