Return to Article Details UNAUTHORIZED ACCESS TO COMPUTER INFORMATION: THE EMPIRICAL STUDY OF CHARACTERISTICS OF VICTIMS AND THEIR VICTIMIZATION Download Download PDF