495772
doi
10.5281/zenodo.495772
oai:zenodo.org:495772
K. Jaishankar
Raksha Shakti University
Maimon, David
University of Maryland, United States of America
Cochran, John K.
University of South Florida, United States of America
Jones, Hattie M.
BBP Law School, United Kingdom
Powers, Ráchael A.
University of South Florida, United States of America
System Trespasser Behavior after Exposure to Warning Messages at a Chinese Computer Network: An Examination
Howell, Christian J.
University of South Florida, United States of America
url:http://www.cybercrimejournal.com/Stickellvol11issue1IJCC2017.pdf
info:eu-repo/semantics/openAccess
Creative Commons Attribution 4.0 International
https://creativecommons.org/licenses/by/4.0/legalcode
Anonymity, Cyber bullying, Demographics, Identity, Online Harassment, Perception, Psychological Stress, Social Networking Sites, Victimization.
<p><em>System trespassing, which refers to the unauthorized access of computer systems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system trespassing little attention. The current study utilizes data gathered from a Chinese computer network to examine system trespasser behavior after exposure to three warning messages. Since the current study is the first known test of particularistic restrictive deterrence in cyberspace it informs those working in cyber security, whilst expanding the scope of the theory. </em></p>
Zenodo
2017-04-09
info:eu-repo/semantics/article
794789
1579534777.47578
587809
md5:2491b86fb3ea975f37e938f0aa815849
https://zenodo.org/records/495772/files/Howelletalvol11issue1IJCC2017.pdf
public
http://www.cybercrimejournal.com/Stickellvol11issue1IJCC2017.pdf
Is identical to
url
isVersionOf
doi
International Journal of Cyber Criminology
11
1
2017-04-09