DOI QR코드

DOI QR Code

Prediction Model for Deviant Hacking Behavior and Hacking Type in Hackers Based on Psychological Variable

해커들의 심리변인에 기반한 탈선적 해킹활동 및 해킹타입 예측 모델

  • Received : 2016.02.19
  • Accepted : 2016.04.19
  • Published : 2016.04.30

Abstract

Despite the extant quantum communication technology that does not allow copying, wiretapping, and/or monitoring, cyber-terror-attempts from hackers with unconscientious purposes and motives are prospected to persist. Hence, it is imperative and necessary to invest in studies geared toward understanding the psychology of hackers. The current study referred to Beebe & Clark (2006) and sought out the psychological variables in hackers involved in deviant hacking activities, measured the purpose of hacking and actual hacking experiences, and constructed a predictive model that can categorize hacker types based on their intentions.

정보복제 및 도/감청이 기술적으로 불가능한 양자통신의 출현에도 불구하고, 일부 해커들의 부적절한 동기와 목적에 의한 사이버테러(cyber-terror)는 지속적으로 시도될 것으로 예상된다. 따라서 해킹의 주체인 해커들의 심리적 관점에 대한 연구의 중요성과 필요성이 더욱 커지고 있다. 본 연구는 Beebe & Clark(2006)의 연구를 보완하여, 탈선적 해킹에 관련된 해커들의 주요한 심리적 독립변수가 무엇인지 탐색하고, 그에 따른 해킹의도와 실제 해킹경험을 종속변수로 측정하였다. 본 연구의 결과로서, 해킹의도와 해커들의 타입을 구분해서 예측할 수 있는 모델을 도출하였으며, 이 결과는 향상된 사이버 보안을 위한 인적 관리에 응용할 수 있음을 제안하였다.

Keywords

References

  1. F. Xu, B. Qi, and H. K. Lo, "Experimental demonstration of phase-remapping attack in a practical quantum key distribution system," New J. Physics, vol. 12, no. 11, pp. 14-28, Nov. 2010.
  2. L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov, "Hacking commercial quantum cryptography systems by tailored bright illumination," Nature Photonics, vol. 4, no. 10, pp. 686-689, Aug. 2010. https://doi.org/10.1038/nphoton.2010.214
  3. I. Gerhardt, Q. Liu, A. Lamas-Linares, J. Skaar, C. Kurtsiefer, and V. Makarov, "Full-field implementation of a perfect eavesdropper on a quantum cryptography system," Nature Commun., vol. 2, no. 349, Jun. 2011.
  4. N. Jain, C. Wittmann, L. Lydersen, C. Wiechers, D. Elser, C. Marquardt, and G. Leuchs, "Device calibration impacts security of quantum key distribution," Physical Rev. Lett., vol. 107, no. 11, pp. 110501(1-5), Sept. 2011. https://doi.org/10.1103/PhysRevLett.107.110501
  5. Y. Liu, Y. Cao, M. Curty, S. K. Liao, J. Wang, K. Cui, and H. F. Zhang, "Experimental unconditionally secure bit commitment," Physical Rev. Lett., vol. 112, no. 1, pp. 010504(1-5), Jan. 2014. https://doi.org/10.1103/PhysRevLett.112.010504
  6. M. Rogers, Preliminary findings: understanding criminal computer behavior: a personality trait and moral choice analysis, Retrieved June, 27, 2009, from http://homes.cerias.purdue.edu/-mkr/CPA.doc
  7. G. Rose, H. Khoo, and D. W. Straub, "Current technological impediments to business-to-consumer electronic commerce," Commun. AIS (CAIS), vol. 1, no. 16, Jun. 1999.
  8. K. Buyens, B. D. Win, and W. Joosen, "Empirical and statistical analysis of risk analysis-driven techniques for threat management," in Proc. IEEE ARES 2007, pp. 1034-1041, Vienna, Austria, Apr. 2007.
  9. N. L. Beebe and J. Guynes, "A model for predicting hacker behavior," in Proc. AMCIS 2006, vol. 409, Acapulco, Mexico, Dec. 2006.
  10. D. R. Forsyth, "A taxonomy of ethical ideologies," J. Personality and Social Psychology, vol. 39, no. 1, pp. 175-184, Jul. 1980. https://doi.org/10.1037/0022-3514.39.1.175
  11. H. J. Woo, "A study on the relationship between hackers' psychological variables and hacking activities," Korean J. Journalism & Commun. Stud., vol. 48, no. 3, pp. 90-115, Jun. 2004.
  12. M. Bachmann, "The risk propensity and rationality of computer hackers," The Int. J. Cyber Criminology, vol. 4, no. 1-2, pp. 643-656, 2010.
  13. M. Rogers, N. D. Smoak, and J. Liu, "Self-reported deviant computer behavior: a big-5, moral choice, and manipulative exploitive behavior analysis," Deviant Behavior, vol. 27, no. 3, pp. 245-268, 2006. https://doi.org/10.1080/01639620600605333
  14. S. A. Jackson and H. W. Marsh, "Development and validation of a scale to measure optimal experience: The flow state scale," J. Sport and Exercise Psychology, vol. 18, no. 1, pp. 17-35, Dec. 1996. https://doi.org/10.1123/jsep.18.1.17
  15. C. D. Spielberger, G. Jacobs, S. Russell, and R. S. Crane, "Assessment of anger: The state-trait anger scale," in Advances in Personality Assessment, vol. 2, pp. 161-189, Lawrence Erlbaum Associates, 1983.
  16. E. S. Knowles, H. S. Cutter, D. H. Walsh, and N. A. Casey, "Risk-taking as a personality trait," Social Behavior and Personality: an Int. J., vol. 1, no. 2, pp. 123-136, Jan. 1973. https://doi.org/10.2224/sbp.1973.1.2.123
  17. J. Y. Hong and Y. H. Cho, "A study the impacts of gamblers' risk taking and maladaptive beliefs on the gambling behavior," J. Tourism Sci., vol. 35, no. 8, pp. 367-388, Oct. 2011.
  18. L. R. Goldberg, "The development of markers for the Big-Five factor structure," Psychological assessment, vol. 4, no. 1, pp. 26-42, Mar. 1992. https://doi.org/10.1037/1040-3590.4.1.26
  19. M. Fishbein and I. Azjen, Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Addison-Wesley, 1975.
  20. L. K. Trevino, "Moral reasoning and business ethics: Implications for research, education and management," J. Business Ethics, vol. 11, no. 5, pp. 445-464, May 1992. https://doi.org/10.1007/BF00870556
  21. H. J. Eysenck and M. W. Eysenck, Personality and Individual Differences, Plenum Press, 1985.