Journal article Open Access

System Trespasser Behavior after Exposure to Warning Messages at a Chinese Computer Network: An Examination

Howell, Christian J.; Maimon, David; Cochran, John K.; Jones, Hattie M.; Powers, Ráchael A.


JSON-LD (schema.org) Export

{
  "@context": "https://schema.org/", 
  "@id": "https://doi.org/10.5281/zenodo.495772", 
  "@type": "ScholarlyArticle", 
  "contributor": [
    {
      "@type": "Person", 
      "affiliation": "Raksha Shakti University", 
      "name": "K. Jaishankar"
    }
  ], 
  "creator": [
    {
      "@type": "Person", 
      "affiliation": "University of South Florida, United States of America", 
      "name": "Howell, Christian J."
    }, 
    {
      "@type": "Person", 
      "affiliation": "University of Maryland, United States of America", 
      "name": "Maimon, David"
    }, 
    {
      "@type": "Person", 
      "affiliation": "University of South Florida, United States of America", 
      "name": "Cochran, John K."
    }, 
    {
      "@type": "Person", 
      "affiliation": "BBP Law School, United Kingdom", 
      "name": "Jones, Hattie M."
    }, 
    {
      "@type": "Person", 
      "affiliation": "University of South Florida, United States of America", 
      "name": "Powers, R\u00e1chael A."
    }
  ], 
  "datePublished": "2017-04-09", 
  "description": "<p><em>System trespassing, which refers to the unauthorized access of computer systems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system trespassing little attention. The current study utilizes data gathered from a Chinese computer network to examine system trespasser behavior after exposure to three warning messages. Since the current study is the first known test of particularistic restrictive deterrence in cyberspace it informs those working in cyber security, whilst expanding the scope of the theory. </em></p>", 
  "headline": "System Trespasser Behavior after Exposure to Warning Messages at a Chinese Computer Network: An Examination", 
  "identifier": "https://doi.org/10.5281/zenodo.495772", 
  "image": "https://zenodo.org/static/img/logos/zenodo-gradient-round.svg", 
  "keywords": [
    "Anonymity, Cyber bullying, Demographics, Identity, Online Harassment, Perception, Psychological Stress, Social Networking Sites, Victimization."
  ], 
  "license": "https://creativecommons.org/licenses/by/4.0/", 
  "name": "System Trespasser Behavior after Exposure to Warning Messages at a Chinese Computer Network: An Examination", 
  "sameAs": [
    "http://www.cybercrimejournal.com/Stickellvol11issue1IJCC2017.pdf"
  ], 
  "url": "https://zenodo.org/record/495772"
}
7
0
views
downloads
All versions This version
Views 78
Downloads 00
Data volume 0 Bytes0 Bytes
Unique views 78
Unique downloads 00

Share

Cite as