Paper Details  
 
   

Has Bibliography
9 Pages
2262 Words

 
   
   
    Filter Topics  
 
     
   
 

Social Control of Cyber Space

Social Control of Cyberspace B. PereyraOur nation's infrastructure is daily becoming much more of an abstract environment due to the use of organized cyber criminals hacking away at our super computer information systems. They are generating unpredictable challenges for law enforcement in discovering the unethical abuse on computer systems and a concentration on the young topic of cyber terrorism threatening our criminal justice system. Our law enforcement continues to invent newer methods to function and learn from this new social phenomenon and define cyber terrorism activity as motivation by the rapid growth of technology as a challenge, dominance, and as pleasure to obtain privileged information for illegal use to intentionally harm others and our information networks as well. Therefore, it is of relevance to explore the behavior of a computer hacker and a cracker; including the control, response, and the appropriate measures to combat this new crime wave, and how the academic community, courts, police, and the scientific government are approaching this radical form of crime. On October 25th, 1983, a hearing was formed by the U.S. Congress on the issue of computer security in the federal government and the private sector. The hearing discussed the level of importance on how serious the United States Government must become in learning to monitor the use of computers and Internet through several knowledgeable witnesses. Susan H. Nycum, an attorney representing Gaston, Snow and Ely Barlett firm's computer high technology group defined computer crime as: "…any illegal act where a special knowledge of computer technology is essential for its perpetration, investigation, or prosecution” (Nycum, 15). Nycum also added before the committee that computer abuse falls into four categories that follow.The first category is abuse like financial fra...

Page 1 of 9 Next >

    More on Social Control of Cyber Space...

    Loading...
 
Copyright © 1999 - 2024 CollegeTermPapers.com. All Rights Reserved. DMCA