Defining and Characterizing Reward Hacking