References


 * 1) Blankenship, L. (aka The Mentor) (1986). The Conscience of a Hacker (The Hacker Manifesto it.). Archives of the underground ezine Phrack. Retrieved January 3, 2007, https://webspace.utexas.edu/rws382/www/hacking/introduction.html.
 * 2) Chiesa, R., Ducci, S. & Ciappi, S. (2009). Profiling Hackers: The science of criminal profiling as apply to the world of hacking. Boca Raton, FL: Auerbach Publications.
 * 3) Csikszentmihalyi, M. (1996). Creativity: Flow and the Psychology of Discovery and Invention. New York: HarperCollins.
 * 4) Deci, E. L., Koestner, R., & Ryan, R. M. (1999). A meta-analytic review of experiments examining the effects of extrinsic rewards on intrinsic motivation. Psychological Bulletin, 125, 627–688.
 * 5) Goleman, D. (2006). Social Intelligence. New York: Bantam Dell.
 * 6) Hafner, K., & Markoff, J. (1995). Cyberpunks: Outlaws and hackers on the computer frontier. Toronto: Simon and Schuster.
 * 7) Harris, S., Harper, A., Ness, N & Williams, T., (2011) Gray Hat Hacking: The Ethical Hacker's Handbook (3rd ed.).' Emeryville, CA: McGraw-Hill/Osborne Media.    
 * 8) Jordan, T., & Taylor, P. (1998). A sociology of hackers. The Sociological Review, 46, 757.
 * 9) Kirwan, G. (2010). CyberPsychology An overview of emerging research in emerging environments. The Irish Journal of Psychology, 31, 157-172.
 * 10) Kirvan, G. & Power, A. (2012). The Psychology of Cyber Crime. Concepts and Principles. Hersey, Pa. IGI Global.
 * 11) Maslow, A. H. (1958). A dynamic theory of human motivation. In C. L. Stacy & M. Demartino, (Eds.), Understanding human motivation, (pp. 26–47), Cleveland, OH: Howard Allen Publishers.
 * 12) Maverick, The. (2005). An Interview with Linus Torvalds. Retrieved January 21, 2013, from http://hs.riverdale.k12.or.us/maverick/?q=node/257/91
 * 13) .Mitnick, K.D. & Simon,W.L. (2005). The Art Of Intrusion: The Real Story Behind the Exploit of Hackers, Intruders and Deceivers. Indianapolis, IN: Wesley Publishing Inc.
 * 14) Onorato, R. S., & Turner, J. C. (2004). Fluidity in the self-concept: The shift from personal to social identity. European Journal of Social Psychology, 34, 257–278.
 * 15) Raymond, E. S. (2004). The on-line hacker Jargon Fil, version 4.4.7. Retrived February 12, 2013, from http://www.catb.org/jargon/html/.
 * 16) Rogers, M. (2002). A New Hacker Taxonomy. Retrieved December 27, 2006, from www.dvara.net/hk/taxonomy.doc
 * 17) Schneier, B. (2000). Secrets & Lies: Digital Security in a Networked World. New York: John Wiley & Sons.
 * 18) Steele, G. L., Woods, D. R., Finkel, R. A., Crispin, M. R., Stallman, R. M. & Goodfellow, G. S. (1983). The Hacker's Dictionary. A Guide to the World of Computer Wizards. Retrived 23 January 2013 http://jargon-file.org/archive/jargon-1.5.0.dos.txt
 * 19) Taylor, P. (1999). Hachers: crime in the digital sublime, New York, Routledge.
 * 20) Torvalds, L., & Diamond, D. (2001). Just for Fun (The Story of an Accidental Revolutionary). New York: Collins.
 * 21) Voiskounsky, A. E., & Smyslova, O. V. (2003). Flow-based models of computer hackers’ motivation, CyberPsychology & Behavior, 6, 171–180.
 * 22) Wark, M. (2004). A Hacker Manifesto. Cambridge, MA.: Harvard University Press.