Here are entered works on unauthorized changes to computer files, systems, or networks as well as to works on third-party programmatic changes to a file, network, game, or other electronic device.
Here are entered works on the human factors in computer systems. Works on computer systems operating in a real-time environment are entered under Interactive computer systems.