Journal article Open Access

System Trespasser Behavior after Exposure to Warning Messages at a Chinese Computer Network: An Examination

Howell, Christian J.; Maimon, David; Cochran, John K.; Jones, Hattie M.; Powers, Ráchael A.


JSON-LD (schema.org) Export

{
  "@context": "https://schema.org/", 
  "@id": "https://doi.org/10.5281/zenodo.495772", 
  "@type": "ScholarlyArticle", 
  "contributor": [
    {
      "@type": "Person", 
      "affiliation": "Raksha Shakti University", 
      "name": "K. Jaishankar"
    }
  ], 
  "creator": [
    {
      "@type": "Person", 
      "affiliation": "University of South Florida, United States of America", 
      "name": "Howell, Christian J."
    }, 
    {
      "@type": "Person", 
      "affiliation": "University of Maryland, United States of America", 
      "name": "Maimon, David"
    }, 
    {
      "@type": "Person", 
      "affiliation": "University of South Florida, United States of America", 
      "name": "Cochran, John K."
    }, 
    {
      "@type": "Person", 
      "affiliation": "BBP Law School, United Kingdom", 
      "name": "Jones, Hattie M."
    }, 
    {
      "@type": "Person", 
      "affiliation": "University of South Florida, United States of America", 
      "name": "Powers, R\u00e1chael A."
    }
  ], 
  "datePublished": "2017-04-09", 
  "description": "<p><em>System trespassing, which refers to the unauthorized access of computer systems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system trespassing little attention. The current study utilizes data gathered from a Chinese computer network to examine system trespasser behavior after exposure to three warning messages. Since the current study is the first known test of particularistic restrictive deterrence in cyberspace it informs those working in cyber security, whilst expanding the scope of the theory. </em></p>", 
  "headline": "System Trespasser Behavior after Exposure to Warning Messages at a Chinese Computer Network: An Examination", 
  "identifier": "https://doi.org/10.5281/zenodo.495772", 
  "image": "https://zenodo.org/static/img/logos/zenodo-gradient-round.svg", 
  "keywords": [
    "Anonymity, Cyber bullying, Demographics, Identity, Online Harassment, Perception, Psychological Stress, Social Networking Sites, Victimization."
  ], 
  "license": "http://creativecommons.org/licenses/by/4.0/legalcode", 
  "name": "System Trespasser Behavior after Exposure to Warning Messages at a Chinese Computer Network: An Examination", 
  "sameAs": [
    "http://www.cybercrimejournal.com/Stickellvol11issue1IJCC2017.pdf"
  ], 
  "url": "https://zenodo.org/record/495772"
}
10
2
views
downloads
All versions This version
Views 1010
Downloads 22
Data volume 1.2 MB1.2 MB
Unique views 1010
Unique downloads 22

Share

Cite as