People steal confidential information of someone else without a permission of the owner
People disrespect others on the cyberspace for bad intention, social image and status disruption
People cause miscommunication to the established group of computers and digital devices in the organisation
People bypass the information of others without a permission of the owners