System trespassing by computer intruders is a growing concern among millions of Internet users. However, little research has employed criminological insights to explore the effectiveness of security means to deter unauthorized access to computer systems. Drawing on the deterrence perspective, we employ a large set of target computers built for the sole purpose of being attacked and conduct two independent experiments to investigate the influence of a warning banner on the progression, frequency, and duration of system trespassing incidents. In both experiments, the target computers (86 computers in the first experiment and 502 computers in the second) were set either to display or not to display a warning banner once intruders had successfu...
We describe a new class of tools for protecting computer systems from security attacks. Their distin...
Recent academic investigations of computer security policy violations have largely focused on non-ma...
Recent academic investigations of computer security policy violations have largely focused on non-ma...
System trespassing by computer intruders is a growing concern among millions of Internet users. Howe...
Objectives: Test whether the presence of a surveillance message on an attacked computer system influ...
Computer system trespassing is a growing concern, but it has received little criminological attentio...
System trespassing, which refers to the unauthorized access of computer systems, has rapidly become ...
Research Summary: The results of previous research indicate that the presentation of deterring situa...
Can computing environments deter system trespassers and increase intruders’ likelihood to cover thei...
System trespassing, which refers to the unauthorized access of computer systems, has rapidly become ...
Despite the fact that a number of technical counter-measures do exist to mitigate the risks related ...
We employ knowledge regarding the early phases of system trespassing events and develop a contextrel...
Scholars have raised concerns about potential significant physical and financial damages that can be...
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significa...
ABSTRACT. Research from the fields of criminology and social psychology suggests that the deterrent ...
We describe a new class of tools for protecting computer systems from security attacks. Their distin...
Recent academic investigations of computer security policy violations have largely focused on non-ma...
Recent academic investigations of computer security policy violations have largely focused on non-ma...
System trespassing by computer intruders is a growing concern among millions of Internet users. Howe...
Objectives: Test whether the presence of a surveillance message on an attacked computer system influ...
Computer system trespassing is a growing concern, but it has received little criminological attentio...
System trespassing, which refers to the unauthorized access of computer systems, has rapidly become ...
Research Summary: The results of previous research indicate that the presentation of deterring situa...
Can computing environments deter system trespassers and increase intruders’ likelihood to cover thei...
System trespassing, which refers to the unauthorized access of computer systems, has rapidly become ...
Despite the fact that a number of technical counter-measures do exist to mitigate the risks related ...
We employ knowledge regarding the early phases of system trespassing events and develop a contextrel...
Scholars have raised concerns about potential significant physical and financial damages that can be...
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significa...
ABSTRACT. Research from the fields of criminology and social psychology suggests that the deterrent ...
We describe a new class of tools for protecting computer systems from security attacks. Their distin...
Recent academic investigations of computer security policy violations have largely focused on non-ma...
Recent academic investigations of computer security policy violations have largely focused on non-ma...