Journal article Open Access

System Trespasser Behavior after Exposure to Warning Messages at a Chinese Computer Network: An Examination

Howell, Christian J.; Maimon, David; Cochran, John K.; Jones, Hattie M.; Powers, Ráchael A.


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">Anonymity, Cyber bullying, Demographics, Identity, Online Harassment, Perception, Psychological Stress, Social Networking Sites, Victimization.</subfield>
  </datafield>
  <controlfield tag="005">20170908080534.0</controlfield>
  <controlfield tag="001">495772</controlfield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">University of Maryland, United States of America</subfield>
    <subfield code="a">Maimon, David</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">University of South Florida, United States of America</subfield>
    <subfield code="a">Cochran, John K.</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">BBP Law School, United Kingdom</subfield>
    <subfield code="a">Jones, Hattie M.</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">University of South Florida, United States of America</subfield>
    <subfield code="a">Powers, Ráchael A.</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Raksha Shakti University</subfield>
    <subfield code="4">edt</subfield>
    <subfield code="a">K. Jaishankar</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">587809</subfield>
    <subfield code="z">md5:2491b86fb3ea975f37e938f0aa815849</subfield>
    <subfield code="u">https://zenodo.org/record/495772/files/Howelletalvol11issue1IJCC2017.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2017-04-09</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="o">oai:zenodo.org:495772</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="4">
    <subfield code="v">11</subfield>
    <subfield code="p">International Journal of Cyber Criminology</subfield>
    <subfield code="n">1</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">University of South Florida, United States of America</subfield>
    <subfield code="a">Howell, Christian J.</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">System Trespasser Behavior after Exposure to Warning Messages at a Chinese Computer Network: An Examination</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">https://creativecommons.org/licenses/by/4.0/</subfield>
    <subfield code="a">Creative Commons Attribution 4.0</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;&lt;em&gt;System trespassing, which refers to the unauthorized access of computer systems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system trespassing little attention. The current study utilizes data gathered from a Chinese computer network to examine system trespasser behavior after exposure to three warning messages. Since the current study is the first known test of particularistic restrictive deterrence in cyberspace it informs those working in cyber security, whilst expanding the scope of the theory. &lt;/em&gt;&lt;/p&gt;</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">url</subfield>
    <subfield code="i">isIdenticalTo</subfield>
    <subfield code="a">http://www.cybercrimejournal.com/Stickellvol11issue1IJCC2017.pdf</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.5281/zenodo.495772</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">article</subfield>
  </datafield>
</record>
7
0
views
downloads
All versions This version
Views 77
Downloads 00
Data volume 0 Bytes0 Bytes
Unique views 77
Unique downloads 00

Share

Cite as