“…Computer systems and any device that operates on software and has access to a network are on target, vulnerable, and thereby open to exploit, misuse, and manipulation. Abnormal behaviors (Illankoon et al 2019), data access interruptions, delays, data modifications, fabrications, losses, leakages, or other problems in these systems and devices emanate from both human and nonhuman motives and causes. Such motives and causes, in general terms, consist of user error, defects in code, malicious acts, hardware failure, and acts of nature (Strebe 2002).…”