Abstract
In this study hackers’ motivation is investigated, using the flow paradigm. It was hypothesized that flow increases with the increase of hackers’ competence in the IT use. An on-line research was administered within the Russian-speaking community (N=457). The hypothesis was not confirmed: the relationship between hackers’ experience and flow is more complicated than the straightforward correlation. Periods of flow experience are changed by periods of flow crisis and then - of flow renovation. A model of hackers’ motivational development was presented. Possible measures for preventing the criminal hacking were suggested.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Turkle Sh.: The second self: Computers and the Human Spirit, Simon & Schuster (1984)
Shinder, D.L., Tittel E.: Scene of the Cybercrime: Computer Forensics Handbook. Syngress Media Inc. (2002)
Alves-Foss J.: Computer Crime and Security. Department of Computer Science University of Idaho. (1998) [www-document]: http://www.cs.uidaho.edu/~jimaf/cs442f99/lectures/crime-talk/
Nicholson L.J., Shebar T.F., Weinberg M.R.: Computer crimes. American Criminal Law Review. (2000) [www-document]: http://www.albany.edu/acc/courses/acc680.spring2001/curtin101.ppt
Rodgers M.: A new hackers’ taxonomy. Graduate Studies, Dept. of Psychology, (1999) University of Manitoba. [WWW document]: http://www.mts.net/~mkr/hacker.doc
Hafner K., Markoff J.: Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon and Schuster (1992)
Ward, M.: Employees seen as computer saboteurs. BBC News online (29 April, (2002) [www document]: http://news.bbc.co.uk/1/hi/sci/tech/1946368.stm)
Sterling B.: The hacker crackdown: Law and Disorder on the Electronic Frontier. London: Penguin. (1992) Available at: http://www.hackzone.ru/underground/crackdown/
Taylor P.: Hackers. Crime in the Digital Sublime. London: Routledge (2000)
Shellby D.D.: The Viral Mind: Understanding the Motives of Malicious Coders // Security Focus Online: (2002) [www document]: http://online.securityfocus.com/infocus/1583
McGuire Sh., D’Amico E., Tomlinson K., Brown S.: Teenagers self-reported motivations for participating in computer crime. In: 8th International Conference on Motivation (Workshop on Achievement and Task Motivation). Abstracts. Moscow. (2002) 72–73
Voiskounsky, A.E., Babaeva, J.D., & Smyslova, O.V.: Attitudes towards computer hacking in Russia. In: D. Thomas and B. D. Loader (Eds.). Cybercrime: Law enforcement, security and surveillance in the information age. L. & N.Y.: Routledge (2000) 56–84
Csikszentmihalyi, M.: Beyond boredom and anxiety: The experience of play in work and games. San Francisco: Jossey-Bass. (1975)
Csikszentmihalyi, M.: Beyond Boredom and Anxiety: Experiencing Flow in Work and Play. San-Francisco: Jossey-Bass (2000)
Novak T.P., Hoffman D.L.: Measuring the Flow Experience Among Web Users. (1997) [www document]: http://ecommerce.vanderbilt.edu/papers.html
Repman J., Chan T. S.: Flow in Web Based Instructional Activity: An Exploratory Research Project. Texas Tech University, Georgia Southern University (1998)
Trevino L. K., Webster L.: Flow in Computer-Mediated Communication. In: Communication Research. (1992) Vol. 19(5) 539–573
McKenna K., Lee S.: A Love Affair with Muds: Flow and Social Interaction in Multy-User Dungeons. (1995) [www-document] http://oak.eats.ohiou.edu/~sl302186/mud.htm
Beveren J.V.: A Conceptual Model for Hacker Development and Motivations//Journal of E-Business. 1.2. (2001) [www-document] http://www.ecob.iup.edu/jeb/December2001-issue/Beveren%20article2.pdf
Psychological Experiments on the Internet. Ed. by M.H. Birnbaum. Academic Press (2002)
Kohlberg L. The meaning and measurement of moral development. — Clark University Press (1981)
Smyslova O.V. Analiz motivatsii hakerov (Hackers’ motivation analysis) // Proceedings of the Conference “Social and psychological consequences of the informational technologies usage” Ed. by A.E. Voiskounsky. Moscow Public Science Foundation Publ. pp. 47–58 (In Russian)
Voiskounsky A.E., Petrenko V.F., Smyslova O.V. Motivatsija hakerov: psikhosemanticheskoe issledovanije. (Hackers’ motivation: psychosemantic research). Psykhologicheskij Zhurnal. (2003) V. 24.,1 pp. 103–118 (in Russian)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Voiskounsky, A.E., Smyslova, O.V. (2003). Flow in Computer Hacking: A Model. In: Chung, CW., Kim, CK., Kim, W., Ling, TW., Song, KH. (eds) Web and Communication Technologies and Internet-Related Social Issues — HSI 2003. HSI 2003. Lecture Notes in Computer Science, vol 2713. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45036-X_18
Download citation
DOI: https://doi.org/10.1007/3-540-45036-X_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40456-9
Online ISBN: 978-3-540-45036-8
eBook Packages: Springer Book Archive