Paper Details  
 
   

Has Bibliography
9 Pages
2159 Words

 
   
   
    Filter Topics  
 
     
   
 

None Provided

Jones Telecommunications & Multimedia Encyclopedia If cyberspace is a type of community, a giant neighborhood made up of networked computer users around the world, then it seems natural that many elements of a traditional society can be found taking shape as bits and bytes. With electronic commerce comes electronic merchants, plugged-in educators provide networked education, and doctors meet with patients in offices on-line. It should come as no surprise that there are also cybercriminals committing cybercrimes. As an unregulated hodgepodge of corporations, individuals, governments, educational institutions, and other organizations that have agreed in principle to use a standard set of communication protocols, the Internet is wide open to exploitation. There are no sheriffs on the Information Superhighway waiting to zap potential offenders with a radar gun or search for weapons if someone looks suspicious. By almost all accounts, this lack of "law enforcement" leaves net users to regulate each other according to the reigning norms of the moment. Community standards in cyberspace appear to be vastly different from the standards found at the corner of Main Street and Elm in Any City, USA. Unfortunately, cyberspace is also a virtual tourist trap where faceless, nameless con artists can work the crowds. Mimicking real life, crimes and criminals come in all varieties on the Internet. The FBI's National Computer Crime Squad is dedicated to detecting and preventing all types of computer-related crimes. Some issues being carefully studied by everyone from Net veterans and law enforcement agencies to radical pundits include: Computer network break-ins Industrial espionage Software piracy Child pornography E-mail bombings Password sniffers Spoofing Credit card fraud Computer network break-ins Using software tools installed on a computer in a remote location, hackers can break into computer systems to steal data, plant viruses or...

Page 1 of 9 Next >

    More on None Provided...

    Loading...
 
Copyright © 1999 - 2024 CollegeTermPapers.com. All Rights Reserved. DMCA