Please use this identifier to cite or link to this item:
|Title:||MOTIVATION AND DEMOTIVATION OF HACKERS IN THE SELECTION OF A HACKING TASK – A CONTEXTUAL APPROACH|
|Abstract:||This research explores hacker motivation, demotivation and task selection through the lenses of the Theory of Reasoned Action (TRA) and General Deterrence Theory (GDT). The research also explores how context surrounding individual and task characteristics affects a hacker’s decision making process in selecting a hacking task. To build a solid foundation on which to understand and combat threats to information systems, researchers need to look past the technical issues of data security and explore why hackers do what they do. This research addresses this gap by understanding why hackers identify and assess hacking tasks. It is hoped that by investigating the motivations of these highly skilled Information Systems (IS) users, new insights into how to avoid becoming a hacker target might be developed. Participants in this study were individuals who self-identify as hackers. They completed a survey to validate the proposed model and answered open-ended questions to provide further insights. The quantitative data was analysed using Structured Equation Modelling; classical content analysis was conducted to examine the qualitative data. This research was successful in identifying the role of TRA and GDT in hacker task selection. The research confirmed the importance of mastery, curiosity, and task complexity in a hacker's evaluation process and provided enticing clues for further research into the role of task complexity in a hacker’s task evaluation process. The research also confirmed that subjective norms play an important part in shaping behavioural intentions towards engaging in a hacking task. Additionally, a clear linkage was identified between perceived certainty of sanction and behavioural intention. Contributions of this research to both academia and practice are outlined as well as potential limitations and areas for future research.|
|Appears in Collections:||Open Access Dissertations and Theses|
Files in This Item:
|Owen_Kenneth_D_201604_PhD -Business-Admin.pdf||Dissertation for Ken Owen||3.8 MB||Adobe PDF||View/Open|
Items in MacSphere are protected by copyright, with all rights reserved, unless otherwise indicated.