• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • Tagged with
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level

Tsai, Ju-han 19 July 2010 (has links)
Given that computer hacking cause huge loss among firms, it¡¦s necessary to understand how individuals engage to commit it. Most of previous research on computer hacking, discuss the reasons by motivation, deterrence theory, moral intensity and social learning theory. However, those perspectives were adopted in researches independently. Thus, there is a need for research to combine these perspectives to create a completed, empirical model to explain the hacker¡¦s intention. Based on motivation theory, moral intensity, deterrence theory, and social learning theory, an empirical study of the intention of computer hacking was conducted. Moreover, we found the key factor ignored in the past, severity level of computer hacking, which will change the way of other factors affecting the intention. Data collected from 473 individuals in Taiwan confirmed our hypotheses and tested against the research model. The results support the proposed model in predicting intention to commit computer hacking. This study demonstrated that intrinsic motivation, extrinsic motivation, moral intensity, punishment certainty, punishment severity, and social influence were key factors that resulted in intention of computer hacking. In addition, severity level of computer hacking was a strongly significant moderator in all factors to intention. Lastly, several implications of information security management and direction to reduce computer hacking rate for practices are discussed.

Page generated in 0.0587 seconds