The typical computer felons are usually persons with which of the following characteristics?

A.
They have had previous contact with law enforcement
B.
They conspire with others
C.
They hold a position of trust
D.
They deviate from the accepted norms of security