Cybertrespass
This chapter discusses cybertrespass (hacking). Few topics in cybercrime have experienced the variance in perception as cybertrespass, having been perceived as both a relatively harmless means of exploring the boundaries of digital infrastructures and the most egregious of violations into one's...
Main Author: | |
---|---|
Contributors: | |
Format: | Print Article |
Language: | English |
Published: |
2024
|
In: |
Cybercrime and digital deviance
Year: 2024, Pages: 24-43 |
Check availability: | HBZ Gateway |
Keywords: |
MARC
LEADER | 00000naa a2200000 c 4500 | ||
---|---|---|---|
001 | 191491239X | ||
003 | DE-627 | ||
005 | 20250116153834.0 | ||
007 | tu | ||
008 | 250116s2024 xx ||||| 00| ||eng c | ||
020 | |a 9781032254524 | ||
035 | |a (DE-627)191491239X | ||
035 | |a (DE-599)KXP191491239X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a 2,1 |2 ssgn | ||
100 | 1 | |a Graham, Roderick |d 1975- |e VerfasserIn |0 (DE-588)1064862799 |0 (DE-627)815245432 |0 (DE-576)424211092 |4 aut | |
109 | |a Graham, Roderick 1975- |a Graham, Roderick S. 1975- |a Graham, Rod 1975- | ||
245 | 1 | 0 | |a Cybertrespass |c Roderick S. Graham, 'Shawn K. Smith |
264 | 1 | |c 2024 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a Literaturverzeichnis: Seite 42-43 | ||
520 | |a This chapter discusses cybertrespass (hacking). Few topics in cybercrime have experienced the variance in perception as cybertrespass, having been perceived as both a relatively harmless means of exploring the boundaries of digital infrastructures and the most egregious of violations into one's personal domain. Designations of ownership and access rights hold much weight with this topic, and the reader is challenged to expand their perception of territoriality into the digital landscape. By doing so, it should become clear how the invasion of digital space is indeed an act both in and of itself a serious infraction and a gateway to additional violations (e.g., data theft, data manipulation, compromising functionality of operating systems). | ||
650 | 0 | 7 | |0 (DE-588)4010452-7 |0 (DE-627)106357816 |0 (DE-576)208888128 |a Computerkriminalität |2 gnd |
650 | 0 | 7 | |0 (DE-588)7864395-8 |0 (DE-627)700634487 |0 (DE-576)363213635 |a Internetkriminalität |2 gnd |
650 | 0 | 7 | |0 (DE-588)4675192-0 |0 (DE-627)342829076 |0 (DE-576)214925358 |a Cracker |g Computerkriminalität |2 gnd |
650 | 4 | |a Hacker | |
700 | 1 | |a Smith, 'Shawn K. |e VerfasserIn |0 (DE-588)119988894X |0 (DE-627)1682065006 |4 aut | |
773 | 0 | 8 | |i Enthalten in |a Graham, Roderick, 1975 - |t Cybercrime and digital deviance |b Second edition |d New York : Routledge, 2024 |g (2024), Seite 24-43 |h 217 Seiten |w (DE-627)1870283295 |z 9781032254524 |z 9781032249193 |7 nnam |
773 | 1 | 8 | |g year:2024 |g pages:24-43 |
776 | 1 | |o 10.4324/9781003283256-2 | |
951 | |a AR | ||
ELC | |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4652645376 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 191491239X | ||
LOK | |0 005 20250116153354 | ||
LOK | |0 008 250116||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-2619 |c DE-627 |d DE-2619 | ||
LOK | |0 092 |o n | ||
LOK | |0 852 |a DE-2619 | ||
LOK | |0 852 1 |9 00 | ||
ORI | |a SA-MARC-krimdoka001.raw |