Cybertrespass

This chapter discusses cybertrespass (hacking). Few topics in cybercrime have experienced the variance in perception as cybertrespass, having been perceived as both a relatively harmless means of exploring the boundaries of digital infrastructures and the most egregious of violations into one's...

Descripción completa

Guardado en:  
Detalles Bibliográficos
Autor principal: Graham, Roderick 1975- (Autor)
Otros Autores: Smith, 'Shawn K.
Tipo de documento: Print Artículo
Lenguaje:Inglés
Publicado: 2024
En: Cybercrime and digital deviance
Año: 2024, Páginas: 24-43
Verificar disponibilidad: HBZ Gateway
Palabras clave:
Descripción
Sumario:This chapter discusses cybertrespass (hacking). Few topics in cybercrime have experienced the variance in perception as cybertrespass, having been perceived as both a relatively harmless means of exploring the boundaries of digital infrastructures and the most egregious of violations into one's personal domain. Designations of ownership and access rights hold much weight with this topic, and the reader is challenged to expand their perception of territoriality into the digital landscape. By doing so, it should become clear how the invasion of digital space is indeed an act both in and of itself a serious infraction and a gateway to additional violations (e.g., data theft, data manipulation, compromising functionality of operating systems).
Notas:Literaturverzeichnis: Seite 42-43
ISBN:9781032254524