Reference

Blankenship, L. (aka The Mentor) (1986). The Conscience of a Hacker (The Hacker Manifesto it.). Archives of the underground ezine Phrack. Retrieved January 3, 2013, https://webspace.utexas.edu/rws382/www/hacking/introduction.html.

Chiesa, R., Ducci, S. & Ciappi, S. (2009). Profiling Hackers: The science of criminal profiling as apply to the world of hacking. Boca Raton, FL: Auerbach Publications.

Csikszentmihalyi, M. (1996). Creativity: Flow and the Psychology of Discovery and Invention. New York: HarperCollins.

Deci, E. L., Koestner, R., & Ryan, R. M. (1999). A meta-analytic review of experiments examining the effects of extrinsic rewards on intrinsic motivation. Psychological Bulletin, 125, 627–688.

Goleman, D. (2006). Social Intelligence. New York: Bantam Dell. Hafner, K., & Markoff, J. (1995). Cyberpunks: Outlaws and hackers on the computer frontier. Toronto: Simon and Schuster.

Harris, S., Harper, A., Ness, N & Williams, T., (2011) Gray Hat Hacking: The Ethical Hacker's Handbook (3rd ed.).' Emeryville, CA: McGraw-Hill/Osborne Media.

Jordan, T., & Taylor, P. (1998). A sociology of hackers. The Sociological Review, 46, 757.

Kilger, M., Stutzman, J., & Arkin, O. (2004). Profiling. In The Honeynet Project (2nd Ed.), Know your enemy. Addison Wesley Professional.

Kirwan, G. (2010). CyberPsychology An overview of emerging research in emerging environments. The Irish Journal of Psychology, 31, 157-172.

Kirvan, G. & Power, A. (2012). ''The Psychology of Cyber Crime. Concepts and Principles''. Hersey, Pa. IGI Global.

Maslow, A. H. (1958). A dynamic theory of human motivation. In C. L. Stacy & M. Demartino, (Eds.), Understanding human motivation, (pp. 26–47), Cleveland, OH: Howard Allen Publishers.

Maverick, The. (2005). An Interview with Linus Torvalds. Retrieved January 21, 2013, from  http://hs.riverdale.k12.or.us/maverick/?q=node/257/91

Mitnick, K.D. & Simon,W.L. (2005). The Art Of Intrusion: The Real Story Behind the Exploit of Hackers, Intruders and Deceivers. Indianapolis, IN: Wesley Publishing Inc.

Onorato, R. S., & Turner, J. C. (2004). Fluidity in the self-concept: The shift from personal to social identity. European Journal of Social Psychology, 34, 257–278.

Raymond, E. S. (2004). The on-line hacker Jargon Fil, version 4.4.7. Retrived February 12, 2013, from http://www.catb.org/jargon/html/.

Rogers, M. (2002). A New Hacker Taxonomy. Retrieved December 27, 2006, from www.dvara.net/hk/taxonomy.doc

Schneier, B. (2000). Secrets & Lies: Digital Security in a Networked World. New York: John Wiley & Sons.

Symantec Corporation, 2012 Norton Cybercrime Report, September 2012: http://www.norton.com/2012cybercrimereport

Steele, G. L., Woods, D. R., Finkel, R. A., Crispin, M. R., Stallman, R. M. & Goodfellow, G. S. (1983). The Hacker's Dictionary. A Guide to the World of Computer Wizards. Retrived 23 January 2013 http://jargon-file.org/archive/jargon-1.5.0.dos.txt

Taylor, P. (1999). Hachers: crime in the digital sublime, New York, Routledge.

Torvalds, L., & Diamond, D. (2001). Just for Fun (The Story of an Accidental Revolutionary). New York: Collins.

Voiskounsky, A. E., & Smyslova, O. V. (2003). Flow-based models of computer hackers’ motivation, CyberPsychology & Behavior, 6, 171–180.

Wark, M. (2004). A Hacker Manifesto. Cambridge, MA.: Harvard University Press. 