mathematical model and unitization for the behaviour of ...19).pdf · b. motivation and hackers:...

7
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 8 (September 2014) www.ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 132 Mathematical Model and Unitization for the Behaviour of the Intrinsic Recreation Hackers Dr. Esam Al Lawati Dr. M.S.Saleem Basha * Mrs. Gargi Bhattacharya Mr.Jameel Hashmi Department of Business Department of Computer Science Department of English Department of Computer Science Mazoon University College,Muscat, Oman. Abstract— In the twenty first century world hacking has emerged as an international phenomenon. Hacking has been attributed to several reasons such as recreation or entertainment, remuneration or financial success, the anxiety of revenge, some perverted satisfaction with this forbidden knowledge etc. This research paper will analyze the mathematical equation to represent the behavioral models of hacker's psychologies while considering it as a source of entertainment. This mathematical model will enable us to understand the public opinion about them within a socio- cultural context. Hacking often is taken as an innovative cultural activity for recreation and weird satisfaction. Millions of computer users are now connected to each other through a maze of network in an age of information revolution. Keywords—Psychology, Hacker, Intrinsic, Recreation, Motivation. I. INTRODUCTION “Motivation is a force that energizes, sustains and directs behavior toward a goal (Pintrich & Schunk, 2002), and researchers have found a positive and robust correlation between motivation and achievement” (Eggen & Kauchak, 2007). Motivation enables us to complete our tasks. A human without any inspiration to undergo an activity can be considered unmotivated, on the contrary, any person who is focused toward a fixed goal is considered to be motivated. So we can assume that people who work with others must be motivated. However, the intensity of motivation varies from one situation to another. Professionals from various fields are confronted with the perpetual task of harnessing more versus less focus/motivation among the people around them. There are multiple theories of motivation that discuss these issues by comprehending motivation as a single phenomenon. However, it depends from one situation to another how limited motivation can produce extraordinary results. It has been debated by various critics whether motivation is a unitary or multi-dimensional phenomenon. People have different levels and reasons behind motivation. The orientation of motivation or the types of motivation is the determining factor behind the attitudes or the aims of the motivated people, (Ryan & Deci, 2000). Psychologists studying motivation have focused on five basic questions: A. Intrinsic and Extrinsic Motivation: The idea of being motivated suggests to move enthusiastically toward a definite goal or to work sincerely, even if we feel the monotony of the task or function. It might come to our mined what energizes and directs our behavior? Indeed there are many factors which might explain it, such as incentives, values, beliefs, self confidence and more. As some psychologist believe, that motivation related with personal traits and for this. Some people have strong desire to achieve, or suffer from a fear psychosis related to darkness, or relentless interest in activates, so they work to the extreme level to avoid darkness, or spend much time to pursue their activities while others psychologist see the motivations as state or temporary situation, like when student reading for test or exam, so he/she motivated by situation. So as we see, some explanation of motivation relies on internal factors, such as values or beliefs. While other explanations relies on external factors which related with environment such as fear of darkness. Motivation can be distinguished between internal (intrinsic motivation) and external (extrinsic motivation). Intrinsic motivation is the spontaneous tendency to find out and overcome challenges as we pursue to achieve the goals and personal interests and to scientific excellence (Deci & Ryan, 2002). For example, when we help our parent or neighbors, we do need incentive or avoid punishment, because this type of activity itself rewarding. But when we do something to achieve a higher grade or to avoid punishment or for other reasons related to materialism which have little to do with the task itself, we are said to undergo through extrinsic motivation. B. Motivation and Hackers: The motivation of the hackers or the motives behind hacking are heterogeneous and offenders are from varied groups. Grabosky & Smith (1998) have given an overview of the probable interests of the hackers. They have defined hacking as illegal break through to semi-protected or unauthorized computer systems that hinders the operation or performance of a system or damages its contents that is popularly known as ‘vandalism.’ They have also pointed out the reasons given by hackers for their attempts at trespassing the legal frontiers in the world of technology. To justify the general suspicions

Upload: lyliem

Post on 24-Feb-2019

218 views

Category:

Documents


0 download

TRANSCRIPT

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 8 (September 2014) www.ijirae.com

_________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 132

Mathematical Model and Unitization for the Behaviour of the Intrinsic Recreation Hackers

Dr. Esam Al Lawati Dr. M.S.Saleem Basha* Mrs. Gargi Bhattacharya Mr.Jameel Hashmi Department of Business Department of Computer Science Department of English Department of Computer Science

Mazoon University College,Muscat, Oman. Abstract— In the twenty first century world hacking has emerged as an international phenomenon. Hacking has been attributed to several reasons such as recreation or entertainment, remuneration or financial success, the anxiety of revenge, some perverted satisfaction with this forbidden knowledge etc. This research paper will analyze the mathematical equation to represent the behavioral models of hacker's psychologies while considering it as a source of entertainment. This mathematical model will enable us to understand the public opinion about them within a socio-cultural context. Hacking often is taken as an innovative cultural activity for recreation and weird satisfaction. Millions of computer users are now connected to each other through a maze of network in an age of information revolution.

Keywords—Psychology, Hacker, Intrinsic, Recreation, Motivation.

I. INTRODUCTION “Motivation is a force that energizes, sustains and directs behavior toward a goal (Pintrich & Schunk, 2002), and

researchers have found a positive and robust correlation between motivation and achievement” (Eggen & Kauchak, 2007).

Motivation enables us to complete our tasks. A human without any inspiration to undergo an activity can be considered unmotivated, on the contrary, any person who is focused toward a fixed goal is considered to be motivated. So we can assume that people who work with others must be motivated. However, the intensity of motivation varies from one situation to another. Professionals from various fields are confronted with the perpetual task of harnessing more versus less focus/motivation among the people around them. There are multiple theories of motivation that discuss these issues by comprehending motivation as a single phenomenon. However, it depends from one situation to another how limited motivation can produce extraordinary results. It has been debated by various critics whether motivation is a unitary or multi-dimensional phenomenon. People have different levels and reasons behind motivation. The orientation of motivation or the types of motivation is the determining factor behind the attitudes or the aims of the motivated people, (Ryan & Deci, 2000).

Psychologists studying motivation have focused on five basic questions:

A. Intrinsic and Extrinsic Motivation:

The idea of being motivated suggests to move enthusiastically toward a definite goal or to work sincerely, even if we feel the monotony of the task or function. It might come to our mined what energizes and directs our behavior? Indeed there are many factors which might explain it, such as incentives, values, beliefs, self confidence and more. As some psychologist believe, that motivation related with personal traits and for this. Some people have strong desire to achieve, or suffer from a fear psychosis related to darkness, or relentless interest in activates, so they work to the extreme level to avoid darkness, or spend much time to pursue their activities while others psychologist see the motivations as state or temporary situation, like when student reading for test or exam, so he/she motivated by situation. So as we see, some explanation of motivation relies on internal factors, such as values or beliefs. While other explanations relies on external factors which related with environment such as fear of darkness. Motivation can be distinguished between internal (intrinsic motivation) and external (extrinsic motivation). Intrinsic motivation is the spontaneous tendency to find out and overcome challenges as we pursue to achieve the goals and personal interests and to scientific excellence (Deci & Ryan, 2002). For example, when we help our parent or neighbors, we do need incentive or avoid punishment, because this type of activity itself rewarding. But when we do something to achieve a higher grade or to avoid punishment or for other reasons related to materialism which have little to do with the task itself, we are said to undergo through extrinsic motivation. B. Motivation and Hackers:

The motivation of the hackers or the motives behind hacking are heterogeneous and offenders are from varied groups. Grabosky & Smith (1998) have given an overview of the probable interests of the hackers. They have defined hacking as illegal break through to semi-protected or unauthorized computer systems that hinders the operation or performance of a system or damages its contents that is popularly known as ‘vandalism.’ They have also pointed out the reasons given by hackers for their attempts at trespassing the legal frontiers in the world of technology. To justify the general suspicions

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 8 (September 2014) www.ijirae.com

_________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -133

against the hackers’ actions we must evaluate their justifications and explanations behind such forbidden actions. Let us consider the entire range of interests and motives that are relegated to such prohibited attitudes.

Hacking is commonly known as an attempt to access secured computer networks without authorization, or using the internet to promote terrorism, vandalism, purloining credit card details, identity phishing, theft of intellectual property, etc. This also includes gripping the control of a remote computer through fraudulent network access or software cracking. The performers of these types of activities which genuinely harm or damage the society are called black- hat hackers, crackers or simply criminals. Sometimes intelligent hackers help the government or institutions to break the chain of crackers’ attacks and to identify them even. They may be termed as “Ethical Hackers” because they have a noble purpose behind such unauthenticated intrusions.

The history of hacking may be traced back to the second half of the twentieth century. Initially hackers were known as researchers or experimenters in universities or corporate International Technology Research Centres. However, with the release of the film, “War Games,” in 1983, different views on hacking highlighted its darker aspects. It was the general notion that a hacker understands computers, phones and other similar devices better, solely to satisfy their thirst of knowledge. They are incredibly inquisitive about the functioning of the devices and are motivated by their curiosity. Their purpose is never to damage the system or to gratify materialism. Herein remains the main difference between ‘hackers’ and ‘crackers.’ Usually a hacker is an expert in understanding a system and can efficiently deal with the details of the input data and the final output. In the contemporary era hacking has been confused with cracking to give it an unethical or rather criminal orientation. Different user-friendly hacking tools are at the ready disposal of the criminal-minded people which are misused to damage social integrity.

The main motives of the hackers are enlisted as follows:

A. Recreation/Entertainment:

This is an intrinsic motivation or undertaking the hacking activity for the sake of fun or to prove technical efficiency. B. Remuneration:

This involves materialistic gains related to transfer of funds to one’s own accounts or being hired by others to break unauthorized networks. C. Revenge:

This implies motive of retaliation from dissatisfied employees, maltreated customers, disgruntled competitors etc.

Previously exploited employees do hacking to revenge upon employers. Professional hackers do it for money. Students do hacking for knowledge and revenge terrorist do hacking to break government security codes. In conclusion, motives of hacking vary as per situations. There are various motives for hackers to do such illegal breakthroughs. To ratify their malevolent intentions sometimes they create computer viruses. Black hat hackers are relentlessly increasing in number and have technologically outpaced white hats. They often manage to find the path with least resistance, whether due to human error or non-performance, or with a new type of experimental attack. To differentiate their identity hacking purists often use the term “crackers” to refer to black hat hackers who are driven by monetary motivation or seek other material benefits. This is a derogatory term with negative connotations as discussed before. Some activists in the arena of hacking are governed by religious biases, while some others desire to expose the wrong deeds. Few take a perverse pleasure in hackling their targets which may be regarded as a sort of sadistic entertainment.

Different governments around the world have unanimously agreed on the necessity to be well-protected online, especially with military interactions. Previously the common proverb used to be, “He who controls the seas controls the world.” Later, it was altered to the modern adage, “He who controls the air controls the world.” Modern generation is concerned with controlling cyberspace. Government sponsored hackers spend enormous time and money to target opponent civilians and enemy governments or corporations.

There are some sub-categories of malicious and ignoble hackers:

A. Spy Hackers:

Organizations hire hackers to break and reveal trade secrets. They operate either from within or from outside of such corporations. They are motivated by the needs of their clients and cater to their requirements. B. Cyber Terrorists:

These hackers are governed by religious biases and political diplomacy. They want to rule by disrupting infrastructures. Their activities may have fatal consequences and they generate fear psychosis among civilians.

Thus the intentions of the hackers may be either good or malicious and they may vary in various degrees. The white hat hackers are concerned with assisting public or private institutions. Sometimes they create better security systems because they are better aware of the ways of fraudulence. They experiment on a continuous basis to prevent the technological maladies and the disruptive attempts of the black hat criminals.

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 8 (September 2014) www.ijirae.com

_________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -134

II. INTRINSIC RECREATING MODEL Intrinsic recreation is one of the hacking category of the computing and information system. In other words we can say

that it is the act of jacking the system with result of intrinsic motivation. There are many factors that influences the intrinsic motivation and they are:

1. Self Interest 2. Situation 3. Outcome 4. Reveal himself as special 5. Time Pass 6. Research Keeping all these factors as a one parameter into consideration we can say that the behaviour of the intrinsic recreation

hacker's as shown in the graph below with respect to time and the magnitude of the hacking process.

Fig. 1 Behaviour of the Intrinsic Recreation Hackers The above graph shows that, at any instance of time t0, when the hacker is in the act of intrinsic recreation hacking

under a study state of mind without any internal or external disturbance i.e the line of “Intrinsic” motivation. The perpendicular line joining at the time t0 to the line of Intrinsic motivation (lm) is pessimistic line and the length of

the pessimistic line is 'x'. Gross effect due to “Intrinsic” motivation is Ge(x) from the initial point until time t0. If consider a small increment in

the value of 'x' after the time t0, then that small increment in 'x' is written as '∆x' and the gross effect due to this small increment of 'x' can be said as ∆Ge(x), which intern called as current increment of Ge(x).

Then, the total gross effect of intrinsic motivation Gt(x) is the sum of gross effect Ge(x) and the ∆Ge(x),

G (x) = G (x) + ∆G (x) (1) Where ‘x’ can be derived at the time to

푥 = (푙푚 −푡 )½ (2)

Where, 푙푚 is the line of motivation at the time t0 G (푥) = (푙푚 −푡 )½ + ∆G (x) (3) ∆G (x) = x + ∆x (4) Substituting equation (4) in equation (3), we get ∆G (x) = (푙푚 −푡 )½ + (푙푚∆ −∆푡 )½

(5) Therefore, G (x) = (푙푚 −푡 )½ + (푙푚 −푡 )½ + (푙푚∆ −∆푡 )½ (6) G (x) = 2(푙푚 −푡 )½ + (푙푚∆ −∆푡 )½

t

x

∆x

Line of motivation (lm) ∆x

Mag

nitu

de o

f Hac

king

t0

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 8 (September 2014) www.ijirae.com

_________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -135

G (x) = 2((푙푚 + t )(푙푚 − t )) G (x) = 2(푙푚 −푡 )½ + ((푙푚∆ + ∆t )(푙푚∆ − ∆t ))½

G (x) = (4(푙푚 −푡 ))½ + ((푙푚∆ + ∆t )(푙푚∆ − ∆t ))½

We have, t = t0 + ∆t0 ∆t0 = t - t0 and lm = lmt0 + lm∆t0 lm∆t0 = lm - lmt0 Therefore the above equation becomes G (x) = (4(푙푚 −푡 ) + (푙푚∆ + t − t )(푙푚∆ − t + t ))½

(7)

G (x) = (4(푙푚 −푡 ) + (푙푚 − 푙푚 + t − t )(푙푚 − 푙푚 − t + t ))½

G (x) = (4(푙푚 −푡 ) + (푙푚 − 푙푚 푙푚− 푙푚푡 + 푙푚t − 푙푚 푙푚+ 푙푚 − 푙푚 푡 − 푙푚 푡 + 푙푚푡 − 푙푚 푡 − 푡 + ½(02ݐ−t0ݐ+0t0ݐ+t0−t0ݐ G (x) = (4(푙푚 −푡 ) + (푙푚 − 2푙푚 푙푚 + 푙푚 − 2푙푚t 푡 − 푙푚 푡 − 푡 + 2푡t − 푡 ))½

G (x) = (4(푙푚 −푡 ) + (푙푚 − 푙푚 ) − 2푙푚 푡 − (푡 − t ) )½

G (x) = (4(푙푚 −푡 ) + (푙푚 − 푙푚 ) − (푡 − t ) − 2푙푚 푡)½

(8) Similarly, the total gross effect can be derived from integrating ∆G (x) with respect to ‘x’ and can be written as follows: G (x) = ∫ ∆G (x)d(x) (9) G (x) = ∫ (푙푚 −푡 )½ + (푙푚∆ −∆푡 )½d(x) (10) G (x) = ∫ (푙푚 −푡 )½ + ((푙푚∆ + ∆t )(푙푚∆ − ∆t ))½d(x) G (x) = ∫ (푙푚 −푡 )½ + ((푙푚 − 푙푚 + t− t )(푙푚 − 푙푚 − t + t ))½d(x) G (x) = ∫ (푙푚 −푡 )½ + (푙푚 − 푙푚 푙푚− 푙푚푡 + 푙푚t − 푙푚 푙푚+ 푙푚 − 푙푚 푡 − 푙푚 푡 + 푙푚푡 − 푙푚 푡 − 푡 + d(x) ½02ݐ−t0ݐ+0t0ݐ+t0−t0ݐ G (x) = ∫ (푙푚 −푡 )½ + (푙푚 − 2푙푚 푙푚+ 푙푚 − 푡 + 2푡t − 푡 )½d(x) = 푘G (x) (11) where k is the integral constant G (x) = ∫ (푙푚 −푡 )½ + (푙푚 − 푙푚 ) − (푡 − t ) )½d(x) = 푘G (x) (12) Simplifying the above equation we get,

푘 = (푙푚t02 −푡0

2)+(푙푚−푙푚푡0)2−(푡−t0)2

(푙푚t02 −푡0

2) (13)

Therefore,

G (x) = ( ) ( ) ( )( )

[(푙푚 −푡 )] (14)

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 8 (September 2014) www.ijirae.com

_________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -136

G (x) = (푙푚 −푡 ) + (푙푚 − 푙푚 ) − (푡 − t ) G (x) = 2푙푚 − 2푡 + 푙푚 − 푡 − 2푙푚푙푚 + 2푡t G (x) = 2(푙푚 −푡 ) + 푙푚 − 푡 − 2푙푚푙푚 + 2푡t (15) The value of Equation (8) and (15) are equals and can be equated as below 2(푙푚 −푡 ) + 푙푚 − 푡 − 2푙푚푙푚 + 2푡t = (4(푙푚 −푡 ) + (푙푚 − 푙푚 ) − (푡 − t ) − 2푙푚 푡)½

(16) Squaring both side on equation above, which yields (2(푙푚 −푡 ) + 푙푚 − 푡 − 2푙푚푙푚 + 2푡t ) = (푙푚 − 푙푚 ) − (푡 − t ) − 2푙푚 푡) (17) Then, closer look at the equation (1), (2), (3) and (4), it was revealed that these two equation depends on the value of 'x', so the total gross effect of intrinsic motivation Gt(x) depends on the value of 'lm' and time ‘t’.

Further, the value of 'x' is absolutely depends on the time factor. Finally we can conclude that the Gross effect due to Intrinsic motivation is Ge(x) is the function of time factor and the value of 'x'. This function can be written as shown below. G = G (t, x) (18) The equation (17) represents the act of behaving as intrinsic motivated recreation hackers from time t=0 to the end the hacking process t=t0. But in closer look to the behaviour of the hacking process we can say that at the initial and the final stage of hacking is not an 100% motivational act of hacking instead it is a general browsing in the network of systems. Therefore

G = G (t, x) = ϕ((푙푚t02 −푡0

2)+(푙푚−푙푚푡0)2−(푡−t0)2

(푙푚t02 −푡0

2)t + x) (19)

And hence, at this point of time gross effect of hacking of the system must be equals to G = G (t, x) + ∆G (t, x) (20)

III. ANALYSIS The “Intrinsic Recreational Model,” (IRM) points out the fact that hackers take some perverse pleasure in manifesting

their skills in this forbidden sphere of knowledge. An analysis of the psychological behaviour reveals a strategy to concentrate our investigations on the specific motivations of the individuals. The mental state is captured through psychological variables such as amusement, anger, self-esteem that represent both cognition and personality. As observed by the Palo Alto Research Center (PARC), “These personal variables help to determine how external events trigger changes in emotional state, and how changes in emotional state affect the likelihood that an insider will begin or continue a threatening activity,”[1]. In the above discussed recreational model it may be pointed out that the hacker’s motivation is directed towards the feeling of being special, being recognized and being regarded as genius. The hackers’ sense of self-aggrandizement may lead to their narcissistic aptitudes and most often they are incapable of recognizing the consequences of their actions. They turn insensitive to the effects of their actions on others. The dearth of investigations on hacking attitudes makes the legal system unable to find effective solutions to these challenging attacks. It can be noted that some hackers are highlighted as dangerous criminals though they receive no financial gains from such prohibited activities. For example Kevin Mitnick was labeled as a “darkside hacker,” though he received no financial gains from his hacking. Thoughts related to hacking have changed as well. In 1984 the word was only initiating to metamorphose from its original meaning as "computer enthusiast" into the more specialized "network adventurer". However, in the more recent years, media and popular press have began to equate "hacker" with "computer criminal" or "computer fraudster," [2].

Against the popular notion of vandalism and malicious invasions of privacy, some people or rather enthusiasts use the term, “hacking” as a recreational and educational sport where unofficial entry can be made into unauthorized computers. It may be noted:

The sport's aims and purposes have been widely misunderstood; most hackers are not interested in perpetrating massive frauds, modifying their personal banking,… [2].

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 8 (September 2014) www.ijirae.com

_________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -137

IV. CONCLUSIONS Many crtics have agreed that “hacking” may be observed as a gradual extension of our obsession and fascination with

computer systems, networks, electronic devices and new innovations in technology. “Breaking into areas where [someone] was supposed to be forbidden has always been part of the testing the capability of a machine and its operators,” [2]. Some critics have distinguished between “hackers” and “crackers” on the basis of their intentions to poach into restricted information territories [3] [4]. While the former highlights the idea of sheer pleasure or elite meritocracy, the latter manifests a criminal intent. It is alarming how cyber crimes have increased in this century. The Distribution of Attacks chart manifests that 67% of attacks are carried on for criminal purposes. It is particularly interesting to know that 11% of reported attacks are related to Cyber Espionage, while 22% shows for sportive experiments [5].

Fig. 2 Motivation Behind Attacks

It is alarming that cybercrimes has been on the rise; however the percentage of recreational hackers has been relatively

low. This paper has successfully has made a survey of the major motivations of the hackers while considering this activity for non-profit, enthusiastic motives.

Sometimes hackers are even hired by the corporate world to learn about the secret of the trade and to prevent themselves from crackers. The IT professionals made a survey to reveal that white hat hackers who hacked for intrinsic reasons and reformed hackers were reported to support various corporations & organizations [6] [7]. Extrinsic motivation is mainly governed by the person’s excessive orientation toward money, power and completion against intrinsic motivation which is for sheer pleasure and entertainment [8]. Some instances are noteworthy in this context of hiring hackers. Weinstein has mentioned how a reformed hacker became a chief security officer of a security products company in Westboro [9]. This mitigates the commonly perceived negative opinions about packers. Law enforcement officials find it difficult to understand the co-relation between advancement of technology and punishment [10]. This paper is an attempt to focus on the intrinsic recreational motivations of the hackers while considering them in a favourable light as compared to malicious crackers.

REFERENCES

[1] Oliver Brdiczka, Juan Liu, Bob Price, Jianqiang Shen, “Proactive insider Threat Detection through Graph Learning & Psychological Context,” Palo Alto Research Center. http://www.ieee-security.org/TC/SPW2012/proceedings/4740a142.pdf (Retrieved July 5, 2014).

[2] Cornwall, Hugo, “The Hacker’s Handbook”. U.K.: Electronic Research Edition, pp.7. 1994. www.pmsommer.com/hackershandbook_e.doc (Retrieved July 3, 2014).

[3] Anonymous, “The Difference Between Hackers and Crackers,” Maximum Security, Indiana: Pearson/ Que, 2002. http://www.informit.com/articles/article.aspx?p=30048 (Retrieved July 3, 2014).

[4] Chad Perrin, “Hacker vs. cracker,” TechRepublic, 2009. http://www.techrepublic.com/blog/it-security/hacker-vs-cracker/ (Retrieved July 3, 2014).

[5] Paolo Passeri, “May 2014 Cyber Attack Statistics,” Hackmageddon.com, 2014. http://hackmageddon.com/ (Retrieved July 4, 2014).

[6] Siew H. Chan, “An Empirical Investigation Of Hacking Behaviour,” The Review of Business Information Systems, Volume 9, Issue 4, pp. 42, 2005.

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 8 (September 2014) www.ijirae.com

_________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -138

[7] S. H. Chan and Yao, L.J. “An Exploratory Study on Systems Security and Hacker Hiring,” The Review of Business Information Systems, Volume 8, pp. 17-28, 2004.

[8] T.M. Amabile, K.G. Hill, B.A. Hennessey, and E.M. Tighe, “The Work Preference Inventory: Assessing intrinsic and extrinsic motivational orientations,” Journal of Personality and Social Psychology, Volume 66, pp. 950-967, 1994.

[9] B. Weinstein, “Should you hire an ex-hacker?” http://www.builder.com (Retrieved July 4, 2014). [10] D. Thomas, “Hacker Culture” U.S.: University of Minnesota Press, 2002. [11] Eggen, Paul & Kauchak, Don (2007). Educational Psychology: Window on Classrooms. Merrill/Prentice Hall, New

Jersey. [12] Grabosky P & Smith R 1998. Crime in the Digital Age: Controlling Telecommunications and Cyberspace

Illegalities. Sydney: The Federation Press [13] Pintrich, P. R., & Schunk, D.H. (2002). Motivation In education: Theory, research, and applications (2nd ed.).

Upper Saddle River, NJ: Merrill/Prentice-Hall. [14] Ryan, R. M., & Deci, E. L. (2000). Self-determination theory and the facilitation of intrinsic motivation, social

development, and well-being. American Psychologist, 55, 68– 78. [15] Ryan, R. M., & Deci, E. L. (2002). An overview of self-determination theory: An organismic dialectical

perspective. In E. L. Deci & R. M. Ryan (Eds.), Handbook of self-determination research (pp. 3-33). Rochester, NY: University of Rochester.

ABOUT THE AUTHOR(S) Dr. Esam Abulmajeed Al-lawati has completed PhD in educational psychology field (2012) from Mohammed Alkhams University in Morocco and complete master in educational psychology field (2005) from sultan Qaboos University in sultanate of Oman and complete High Diploma in educational administration(2000) from sultan Qaboos University in sultanate of Oman and also complete High Diploma in Educational qualification (1989) from Jordan University in Jordan and complete bachelor in history and education (1988) from Yarmook University in Jordan. He currently works in field of psychology field as assistant professor in psychology department in Mazoon College in sultanate of Oman. He Present and participates in many conferences and

published many researches papers in different National and International journals. Dr. Saleem Basha.M.S is working as Assistant Professor in the Department of Computer Science, Mazoon University College, Sultanate of Oman. He has obtained B.E in the field of Electrical and Electronics Engineering, Bangalore University, Bangalore, India and M.E in the field of Computer Science and Engineering, Anna University, Chennai, India and Ph.D. in the field of Computer Science and Engineering in Pondicherry University, India. He is currently working in the area of Hackers psychology, SDLC specific effort estimation models and web service modelling systems. He has published more than 70 research papers in National and International journals and conferences. Gargi Bhattacharya Chattopadhyay has completed PhD. Submission in 2014. M.A.in English with First class, B.A. (hons) First class, First Rank. Qualified National Eligibility test in India with University Grants Commission Research Fellowship. Achieved 7 years of college teaching experience. Presented and published articles in several national and international conferences, published articles in peer-reviewed & indexed journals, participated in PAL (Perspectives in American Literature) Project with Dr. Paul Reuben, State University of California, working as an Associate editor for International Journal of Humanities, Common Ground Publishing, Illinois, U.S.A, Literary Confluence & International advisory member of Langlit, International journal. She

wrote introduction to the American Poet, Baron James’ The Floating Raft, printed in The United States of America.

Mr. Mohamed Jameel Hashmi is working as Deputy HOD in the Department of Computer Science, Mazoon University College, Muscat, Sultanate of Oman. He has obtained MCA Osmania University, Hyderabad, India and Pursuing Ph.D. in the field of Computer Science from India. He is currently working in the area of Network Security specific Intrusion detections Systems and software Engineering. He has published more than 15 research papers in National and International journals and conferences.