Human Resources and their Tendency to Information Security Crimes Based on Holland Theory

Human Resources and their Tendency to Information Security Crimes Based on Holland Theory

Mahmoud Mohammad Al-Ajlouni
Copyright: © 2018 |Pages: 15
DOI: 10.4018/IRMJ.2018100103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Security systems are often the target of cyber-criminals and professional hackers, but often they fail in hiding all traces of the attack, thereby leaving critical evidence that could lead to identifying and arresting the criminal. However, hacking skills vary from one hacker to another depending on the hacker's personal traits, behavior, and intellectual tendencies. The aim of this study is to develop a proposed descriptive model of the behavioral patterns and motives of hackers based on programmable psychological theories, modeled using object-oriented programming models. The study proposes a descriptive model of an inverse algorithm that simulates Holland's Theory of Behavioral Patterns. Findings show that this descriptive model is applicable to be produced as a code map for the human resources of an investigative nature.
Article Preview
Top

Introduction

International cybercrimes committed by young people in the Arab region are punishable by law. However, cybercrime has become a prevailing harmful phenomenon where many Internet users suffer from, and today eliminating it is a necessity. Currently, several professional agencies are diligently working on this phenomenon following different methods such as setting up electronic tracking systems, detecting suspicious activities of a number of amateur and professional cybercriminals and increasing the protection and security levels for protecting intellectual and physical property rights. However, few researchers focus on the behavioral aspect of cybercriminals, and how to deal with them based on their professional abilities, skills, and experience in cybersecurity. This study is a novel scientific initiative to link the behavioral aspect and personal traits with personal skills. The purpose of this study is to predict students’ tendencies and inclinations towards committing acts of cybercrimes. However, to develop a descriptive model of behavioral patterns of cybercriminals, and their motives based on psychological theories. Moreover, the expected model could be modeled using object-oriented programming methods.

The use of the individual characteristics of Internet users is a modern topic of technology in the late second millennium. However, the adoption of behavioral characteristics in the classification of cybercriminal led many authors in applying the concept of characterization in continuous stereotyping over years ago, but as a methodology of using object-oriented programming of algorithms still not mature according to Wori (2014).

This research is unique due to the unavailability of similar studies that investigate how to identify or predict the personal traits of a cybercriminal by evaluating individual skills and abilities based on individual behavior and personality using programmable model. Furthermore, this research addresses the variations in the level of professional skills of cybercriminals depending on their personality, behavior and intellectual tendencies.

The purpose of this research is to reach a conceptual descriptive model of an algorithm that simulates Holland Occupational Themes (RIASEC). The model expected to be capable of identifying the personal traits of university students who could be inclined to commit a security breach, predicting the characteristics of a cybercriminal or a hacker, and producing a map of codes for the results of the analysis.

Research Questions

The research aims at answering the following queries:

  • 1.

    What are the behavioral patterns of investigative personalities as per Holland’s classification?

  • 2.

    What are the skills that characterize such behavioral patterns?

  • 3.

    Is it possible to propose a diagram for the process of classifying skills based on such behavioral patterns?

  • 4.

    How compatible is the diagram with the computer algorithm?

  • 5.

    How are behavioral patterns reversely checked to determine the skills of - both genders- student who commits a cybercrime?

Top

Literature Review

In the 1950s, (John)developed a theory titled in his name. The core idea of his theory is how to select employees based on their experience and cognitive skills. He stated that such traits are measurable if they categorized into classifiable groups. Based on this categorization, Holland classified employees’ behavioral patterns into six types and is commonly abbreviated with the acronym (RIASEC). Each letter in the acronym represents each category of the behavioral patterns as follows: R-Realistic, I-Investigative, A-Artistic, S-Social, E-Enterprising, and C-Conventional. Several researchers availed themselves of this theory by examining every characteristic or skill to make a new addition to Holland’s model. Holland’s theory used in many studies such as determining the duality features of the employee to determine duality impact on employee's satisfaction with working place as mentioned by Phan and Rounds (2017).

Complete Article List

Search this Journal:
Reset
Volume 37: 1 Issue (2024)
Volume 36: 1 Issue (2023)
Volume 35: 4 Issues (2022): 3 Released, 1 Forthcoming
Volume 34: 4 Issues (2021)
Volume 33: 4 Issues (2020)
Volume 32: 4 Issues (2019)
Volume 31: 4 Issues (2018)
Volume 30: 4 Issues (2017)
Volume 29: 4 Issues (2016)
Volume 28: 4 Issues (2015)
Volume 27: 4 Issues (2014)
Volume 26: 4 Issues (2013)
Volume 25: 4 Issues (2012)
Volume 24: 4 Issues (2011)
Volume 23: 4 Issues (2010)
Volume 22: 4 Issues (2009)
Volume 21: 4 Issues (2008)
Volume 20: 4 Issues (2007)
Volume 19: 4 Issues (2006)
Volume 18: 4 Issues (2005)
Volume 17: 4 Issues (2004)
Volume 16: 4 Issues (2003)
Volume 15: 4 Issues (2002)
Volume 14: 4 Issues (2001)
Volume 13: 4 Issues (2000)
Volume 12: 4 Issues (1999)
Volume 11: 4 Issues (1998)
Volume 10: 4 Issues (1997)
Volume 9: 4 Issues (1996)
Volume 8: 4 Issues (1995)
Volume 7: 4 Issues (1994)
Volume 6: 4 Issues (1993)
Volume 5: 4 Issues (1992)
Volume 4: 4 Issues (1991)
Volume 3: 4 Issues (1990)
Volume 2: 4 Issues (1989)
Volume 1: 1 Issue (1988)
View Complete Journal Contents Listing