Detering Highly Motivated Computer Abusers: A Field Experiment in Computer Security