Abuse of computer systems

Experimental visualization of narrower problems
Other Names:
Abuse of information systems
Misuse of computer databases
Computer network abuse

Abuse ranges from game-playing on office computers to unauthorized access into computer systems (hacking), possibly with the intent to commit a crime, to engage in some form of espionage, or to sabotage data. Sabotage, with the deliberate destruction of computer files, tends to result from disgruntled employees. Misuse may also take the form of improper disclosure of information to other parties.

Computer pornography
Problem Type:
D: Detailed problems
Date of last update
07.03.2021 – 01:21 CET