Cybertrespass

This chapter discusses cybertrespass (hacking). Few topics in cybercrime have experienced the variance in perception as cybertrespass, having been perceived as both a relatively harmless means of exploring the boundaries of digital infrastructures and the most egregious of violations into one's...

Full description

Saved in:  
Bibliographic Details
Authors: Graham, Roderick 1975- (Author) ; Smith, 'Shawn K. (Author)
Format: Print Article
Language:English
Published: 2024
In: Cybercrime and digital deviance
Year: 2024, Pages: 24-43
Check availability: HBZ Gateway
Keywords:
Description
Summary:This chapter discusses cybertrespass (hacking). Few topics in cybercrime have experienced the variance in perception as cybertrespass, having been perceived as both a relatively harmless means of exploring the boundaries of digital infrastructures and the most egregious of violations into one's personal domain. Designations of ownership and access rights hold much weight with this topic, and the reader is challenged to expand their perception of territoriality into the digital landscape. By doing so, it should become clear how the invasion of digital space is indeed an act both in and of itself a serious infraction and a gateway to additional violations (e.g., data theft, data manipulation, compromising functionality of operating systems).
Item Description:Literaturverzeichnis: Seite 42-43
ISBN:9781032254524