develop a context-related, theoretically driven study that explores computer networks' social
vulnerabilities to remote system trespassing events. Drawing on the routine activities
perspective, we raise hypotheses regarding the role of victim client computers in
determining the geographical origins and temporal trends of (1) successful password
cracking attempts and (2) system trespassing incidents. We test our hypotheses by …