首页 | 本学科首页   官方微博 | 高级检索  
     


Computer Crime: A Technology Gap
Authors:JAMES A. FAGIN
Affiliation:Chaminade University of Honolulu
Abstract:A review of current industrial practices, litigation trends, and the growing use of computer data banks and networks leads to the following conclusions about computer crime: data security and integrity are frequently compromised by lax security practices and operating procedures. Frequently the perceived but erroneous assumption that the inherent difficulty of the computer operating system will detour would-be violators is the only security a system has. This article describes methods commonly used to attack data bases and operating systems. The conclusion is that computer crime is an international phenomenon and investigation and prosecution are complex matters. For example, an examination of the copyright laws as they relate to computer crime indicates that there are frequent violations. International violators of the copyright laws frequently distribute bootleg copies of software worldwide. The article concludes that there is a gap between technology and law in the field of computer crimes. International cooperation is needed to define copyright laws and promote investigation and prosecution of international violators.
Keywords:
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号