Вы находитесь на странице: 1из 1

Conceptual Framework

Inputs
Technological
literate/skilled

person
Adequate resources
and facilities
Motivation or
support for criminal
acts

Process

Output

Program hacking
Malicious application
production and
replication
Website security
breach
Precious information
gathering/dispersal

Taking advantage of

anonymity

Figure 1.1 Paradigm for the execution of criminal acts within the cyber-verse

Criminal perpetration
Business/web
account mishaps

Вам также может понравиться