Responsive image
博碩士論文 etd-0719110-162237 詳細資訊
Title page for etd-0719110-162237
論文名稱
Title
探討個人動機、道德強度、嚇阻及社會學習等觀點對駭客行為意圖影響之綜效─以情節輕重程度為調節變數
Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
64
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2010-06-18
繳交日期
Date of Submission
2010-07-19
關鍵字
Keywords
懲罰的必然性、懲罰的嚴重性、駭客行為之情節輕重、社會學習理論、電腦駭客、道德強度、外在動機、內在動機
Severity Level of Computer Hacking, Punishment Certainty, Punishment Severity, Moral Intensity, Social Learning Theory, Intrinsic Motivation, Computer Hacking, Extrinsic Motivation
統計
Statistics
本論文已被瀏覽 5847 次,被下載 1447
The thesis/dissertation has been browsed 5847 times, has been downloaded 1447 times.
中文摘要
有鑑於電腦駭客行為在企業間造成鉅額的損失,因此我們非常需要了解個人為何想做駭客行為,尋找有效的方式防範以降低犯罪率。過去,在駭客行為的研究當中常以動機、嚇阻理論、道德強度以及社會學習觀點來討論這個問題的答案。然而,過去的研究都是單獨的引用這些觀點,並沒有一個較完整且經過實證的研究模式來解釋是什麼原因影響駭客的行為意圖。以激勵理論、嚇阻理論、道德強度以及社會學習理論為基礎,本研究將建構一個完整的研究模式來解釋駭客的行為意圖,並且實際驗證。而且,我們發現有一個應該重視的因素被過去相關研究所忽略,那就是該駭客行為之情節輕重。我們認為在情節輕重不一樣的駭客行為中,各個因素影響行為意圖的程度將會不一樣。
本研究於台灣區採集了473個有效樣本驗證此研究模式,其結果支持我們所作的推論,外在動機、內在動機、道德強度、懲罰的必然性、懲罰的嚴重性以及社會影響都是影響潛在駭客決定是否採取駭客行為的因素,而且,在兩個情節輕重不一樣的駭客行為之間比較,上述的各個因素對於駭客行為意圖的影響有顯著差異。
總而言之,本篇研究整合了過去幾個較常被拿來討論網路駭客行為的觀點,並且提出一個更為整合且清楚的研究模式來解釋「網路駭客行為意圖」,更證實了影響此行為意圖的不只上述各觀點,還關乎於該網路駭客行為的情節輕重程度為何。
Abstract
Given that computer hacking cause huge loss among firms, it’s necessary to understand how individuals engage to commit it. Most of previous research on computer hacking, discuss the reasons by motivation, deterrence theory, moral intensity and social learning theory. However, those perspectives were adopted in researches independently. Thus, there is a need for research to combine these perspectives to create a completed, empirical model to explain the hacker’s intention. Based on motivation theory, moral intensity, deterrence theory, and social learning theory, an empirical study of the intention of computer hacking was conducted. Moreover, we found the key factor ignored in the past, severity level of computer hacking, which will change the way of other factors affecting the intention. Data collected from 473 individuals in Taiwan confirmed our hypotheses and tested against the research model. The results support the proposed model in predicting intention to commit computer hacking. This study demonstrated that intrinsic motivation, extrinsic motivation, moral intensity, punishment certainty, punishment severity, and social influence were key factors that resulted in intention of computer hacking. In addition, severity level of computer hacking was a strongly significant moderator in all factors to intention. Lastly, several implications of information security management and direction to reduce computer hacking rate for practices are discussed.
目次 Table of Contents
Chapter 1 Introduction 1
Chapter 2 Theoretical Foundation and Literature Review 4
2.1 Hacking in the computer world 4
2.2 Motivation Theory 6
2.3 Deterrence Theory 9
2.4 Moral Intensity 12
2.5 Social Learning Theory 16
2.6 The Different Severity level of Computer Hacking 20
2.7 Conceptual Research Model 22
Chapter 3 Research Analysis 23
3.1 Subject 23
3.1.1 Research Design 23
3.1.2 Sampling 23
3.1.3 Demographic Analysis 24
3.2 Constructs and Measurements 28
3.2.1 Non Response Bias 30
3.2.2 Questionnaire Internal Reliability 31
3.3 Measurement Model 33
3.3.1 Common Method Variance 33
3.3.2 Reliability and Validity 34
3.4 Structural Model 39
3.4.1 Structural Main Model 39
3.4.2 The Effect of Moderating 41
Chapter 4 Discussion of Results 43
Chapter 5 Implications for Practice and Academy 46
5.1 Practical Implications 46
5.2 Academic Implications 47
Chapter 6 Limitation and Conclusion 49
6.1 Limitation and Suggestions for Future Study 49
6.2 Conclusion 49
Reference 50
Appendix: Questionnaire A 54
Appendix: Questionnaire B 57
參考文獻 References
Akers, R. "Deviant behavior: A social learning approach,") 1985.
Akers, R. "Rational choice, deterrence, and social learning theory in criminology: The path not taken," J. Crim. L. & Criminology (81) 1990, p 653.
Akers, R. Criminological theories Routledge, 1999.
Akers, R. Social learning and social structure: A general theory of crime and deviance Transaction Pub, 2009.
Akers, R., Krohn, M., Lanza-Kaduce, L., and Radosevich, M. "Social learning and deviant behavior: A specific test of a general theory," American Sociological Review (44:4) 1979, pp 636-655.
Akers, R., and LaGreca, A. "Alcohol use among the elderly: Social learning, community context, and life events," Society, culture, and drinking patterns reexamined) 1991, pp 242-262.
Alexander, C., and Becker, H. "The use of vignettes in survey research," Public opinion quarterly (42:1) 1978, p 93.
Antunes, G., and Hunt, A. "The impact of certainty and severity of punishment on levels of crime in American states: An extended analysis," Journal of Criminal Law and Criminology) 1973, pp 486-493.
Bachman, R., Paternoster, R., and Ward, S. "The rationality of sexual offending: Testing a deterrence/rational choice conception of sexual assault," Law & Society Review (26:2) 1992, pp 343-372.
Calder, B., and Staw, B. "Self-perception of intrinsic and extrinsic motivation," Journal of personality and social psychology (31:4) 1975, pp 599-605.
Chantler, N. "Profile of a computer hacker," Faculty of Law, Queensland University of Technology, Australia) 1996.
Chin, W. "Partial least squares for IS researchers: an overview and presentation of recent advances using the PLS approach," International Conference on Information Systems; 1997, 2000, pp. 741-742.
Davis, F., Bagozzi, R., and Warshaw, P. "Extrinsic and Intrinsic Motivation to Use Computers in the Workplace1," Journal of Applied Social Psychology (22:14) 2006, pp 1111-1132.
Deci, E. Intrinsic motivation Plenum Press New York, 1975.
Dejoie, R., Fowler, G., and Paradice, D. Ethical issues in information systems: a book of readings South-Western Publishing Co. Cincinnati, OH, USA, 1991.
Denning, D. "Information warfare and security," EDPACS (27:9) 2000, pp 1-2.
Ehrlich, I. "Crime, punishment, and the market for offenses," The Journal of Economic Perspectives) 1996, pp 43-67.
Ford, M. Motivating humans: Goals, emotions, and personal agency beliefs Sage Publications, Inc, 1992.
Harrington, S. "The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions," Mis Quarterly (20:3) 1996, pp 257-278.
Hollinger, R. "Computer hackers follow a Guttman-like progression," Sociology and social research (72:3) 1988, pp 199-200.
Jones, T. "Ethical decision making by individuals in organizations: An issue-contingent model," Academy of Management Review (16:2) 1991, pp 366-395.
Jones, T., and Huber, V. "Issue contingency in ethical decision making," 1992, pp. 156–166.
Krohn, M., Skinner, W., Massey, J., and Akers, R. "Social learning theory and adolescent cigarette smoking: A longitudinal study," Social Problems (32:5) 1985, pp 455-473.
Kruglanski, A. "The endogenous-exogenous partition in attribution theory," Psychological review (82:6) 1975, pp 387-406.
Kshetri, N. "Pattern of global cyber war and crime: A conceptual framework," Journal of International Management (11:4) 2005, pp 541-562.
Lepper, M., and Greene, D. The hidden costs of reward: New perspectives on the psychology of human motivation L. Erlbaum Associates; New York: distributed by Halsted Press, 1978.
Levy, S. Hackers: Heroes of the computer revolution Anchor Press/Doubleday Garden City, NY, 1984.
Locke, E., Cartledge, N., and Koeppel, J. "Motivational effects of knowledge of results: A goal-setting phenomenon?," Psychological Bulletin (70:6 Pt 1) 1968, pp 474-485.
Maslow, A. "A theory of human motivation," Psychological review (50:4) 1943, pp 370-396.
Parker, D. Ethical conflicts in computer science and technology Afips press, 1979.
Parker, D. Fighting computer crime: A new framework for protecting information J. Wiley, 1998.
Paulhus, D. "Paulhus deception scales PDS: The balanced inventory of desirable responding-7 manual," Toronto, ON: Multi-Health Systems) 1998.
Peace, A., Galletta, D., and Thong, J. "Software piracy in the workplace: A model and empirical test," Journal of Management Information Systems (20:1) 2003, pp 153-177.
Post, J. "The dangerous information system insider: Psychological perspectives," Available HTTP: Hostname: infowar. com) 1996.
Rest, J. Moral development: Advances in research and theory Praeger New York, 1983.
Rogers, M. "Psychology of computer criminals," 1999b.
Sacco, V., and Zureik, E. "Correlates of computer misuse: Data from a self-reporting sample," Behaviour & Information Technology (9:5) 1990, pp 353-369.
Silberman, M. "Toward a theory of criminal deterrence," American Sociological Review (41:3) 1976, pp 442-461.
Skinner, W., and Fream, A. "A social learning theory analysis of computer crime among college students," Journal of Research in Crime and Delinquency (34:4) 1997, p 495.
Soma, J., Smith, P., and Sprague, R. "Legal Analysis of Electronic Bulletin Board Activites," W. New Eng. L. Rev. (7) 1984, p 571.
Spafford, E. "Are computer hacker break-ins ethical?," Journal of Systems and Software (17:1) 1992, pp 41-47.
Straub, D. "Validating instruments in MIS research," Mis Quarterly (13:2) 1989, pp 147-169.
Straub Jr, D. "Effective IS Security," Information Systems Research (1:3) 1990, pp 255-276.
Sutherland, E., and Cressey, D. "Criminology (9th edn)," Philadelphia, PA: Lippincott, 1974.
Tittle, C. Sanctions and social deviance: The question of deterrence Praeger Publishers, 1980.
Vernon, M. Human motivation CUP Archive, 1969.
Voiskounsky, A., and Smyslova, O. "Flow-based model of computer hackers' motivation," CyberPsychology & behavior (6:2) 2003, pp 171-180.
Williams, K., and Hawkins, R. "Perceptual research on general deterrence: A critical review," Law and Society Review (20:4) 1986, pp 545-572.

電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內立即公開,校外一年後公開 off campus withheld
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code