Cybertrespass

This chapter discusses cybertrespass (hacking). Few topics in cybercrime have experienced the variance in perception as cybertrespass, having been perceived as both a relatively harmless means of exploring the boundaries of digital infrastructures and the most egregious of violations into one's...

Full description

Saved in:  
Bibliographic Details
Main Author: Graham, Roderick 1975- (Author)
Contributors: Smith, 'Shawn K.
Format: Print Article
Language:English
Published: 2024
In: Cybercrime and digital deviance
Year: 2024, Pages: 24-43
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000naa a2200000 c 4500
001 191491239X
003 DE-627
005 20250116153834.0
007 tu
008 250116s2024 xx ||||| 00| ||eng c
020 |a 9781032254524 
035 |a (DE-627)191491239X 
035 |a (DE-599)KXP191491239X 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Graham, Roderick  |d 1975-  |e VerfasserIn  |0 (DE-588)1064862799  |0 (DE-627)815245432  |0 (DE-576)424211092  |4 aut 
109 |a Graham, Roderick 1975-  |a Graham, Roderick S. 1975-  |a Graham, Rod 1975- 
245 1 0 |a Cybertrespass  |c Roderick S. Graham, 'Shawn K. Smith 
264 1 |c 2024 
336 |a Text  |b txt  |2 rdacontent 
337 |a ohne Hilfsmittel zu benutzen  |b n  |2 rdamedia 
338 |a Band  |b nc  |2 rdacarrier 
500 |a Literaturverzeichnis: Seite 42-43 
520 |a This chapter discusses cybertrespass (hacking). Few topics in cybercrime have experienced the variance in perception as cybertrespass, having been perceived as both a relatively harmless means of exploring the boundaries of digital infrastructures and the most egregious of violations into one's personal domain. Designations of ownership and access rights hold much weight with this topic, and the reader is challenged to expand their perception of territoriality into the digital landscape. By doing so, it should become clear how the invasion of digital space is indeed an act both in and of itself a serious infraction and a gateway to additional violations (e.g., data theft, data manipulation, compromising functionality of operating systems). 
650 0 7 |0 (DE-588)4010452-7  |0 (DE-627)106357816  |0 (DE-576)208888128  |a Computerkriminalität  |2 gnd 
650 0 7 |0 (DE-588)7864395-8  |0 (DE-627)700634487  |0 (DE-576)363213635  |a Internetkriminalität  |2 gnd 
650 0 7 |0 (DE-588)4675192-0  |0 (DE-627)342829076  |0 (DE-576)214925358  |a Cracker  |g Computerkriminalität  |2 gnd 
650 4 |a Hacker 
700 1 |a Smith, 'Shawn K.  |e VerfasserIn  |0 (DE-588)119988894X  |0 (DE-627)1682065006  |4 aut 
773 0 8 |i Enthalten in  |a Graham, Roderick, 1975 -   |t Cybercrime and digital deviance  |b Second edition  |d New York : Routledge, 2024  |g (2024), Seite 24-43  |h 217 Seiten  |w (DE-627)1870283295  |z 9781032254524  |z 9781032249193  |7 nnam 
773 1 8 |g year:2024  |g pages:24-43 
776 1 |o 10.4324/9781003283256-2 
951 |a AR 
ELC |b 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4652645376 
LOK |0 003 DE-627 
LOK |0 004 191491239X 
LOK |0 005 20250116153354 
LOK |0 008 250116||||||||||||||||ger||||||| 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
ORI |a SA-MARC-krimdoka001.raw