Preview

Nn Fir Nn

Powerful Essays
Open Document
Open Document
3883 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nn Fir Nn
Computer abuse: vandalizing the information society
Steven M. Furnell and Matthew J. Warren

Introduction
Global information networks are now an integral part of the way in which modern businesses and economies operate. One of the best examples of the trend, the Internet, is now estimated to extend to over one million computers, connecting 30 million users in more than 40 countries and is still increasing. A rudimentary comparison arising from this is that the “population” of the Internet now exceeds that of some industrialized nations. As a consequence there is now widespread dependence on computers and network technology, with the ability to communicate and receive information via these channels being recognized as an essential ingredient for competitiveness in the global market. The transition to the information society is being driven by the reduction in the costs of computing power and telecommunications. These factors, in combination with advances in the core technologies, are making information resources available to an increasing number of people. Leading industry figures are excited by this revolution, some predicting that its effects will be as far reaching as the introduction of electricity (Gates, 1995). The concept has also received significant publicity and backing from national governments in various developed countries with (for example) the USA pushing the information superhighway, an open network of information that will be as accessible as the conventional telephone system. It is, therefore, clear that this route is perceived to be an important element in insuring future national development and competitiveness. Unfortunately, within any sufficiently mature society there will always be a criminal or destructive element. The information society is no exception to this and the individuals involved have been collectively christened under various names, including “hackers,” “cyberpunks” and “phreakers.” However, a potential difference from the norm is



References: Audit Commission (1994), Opportunity Makes a Thief – an Analysis of Computer Abuse, HMSO Publications Centre, London. Collier, P.A. and Spaul, B.J. (1992), “The Woolwich Centre for Computer Crime Research: addressing the need for UK information,” Computer Fraud & Security Bulletin, August, pp. 8-12. Culf, A. (1996), “BBC acts to thwart political hackers,” The Guardian, February 9, p. 1. Evans, D. (1994), “BA in dock over hacking,” Computer Weekly, April 28, p. 6. The Sunday Times (1996), “City surrenders to £400m gangs,” June 2, pp. 1-24. Toffler, A. (1981), The Third Wave, Pan Books, London. Walker, C. (1996), “Brand leaders embrace Web,” Computer Weekly, January 11, p. 6. 66

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    His 145 Matrix

    • 740 Words
    • 3 Pages

    From the 1960’s many scientific and military personnel wanted to create a way for computers to share information. Cool everyone thought! What a marvelous idea! That would mean no more dealing with paper work, no more filling out endless applications or forms on paper, clean office space with no more boxes of paper. It will be great! What society did not know is, how it will affect society as the internet kingdom continues to grow (Howe, 2010).…

    • 740 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The digital world is everywhere we look. The world revolves around technology, in particular phones, televisions, computers, and radios, that we rely heavily on for instantaneous communication and immediate access to media. Society has attached itself to the use of technology like cell phones, which have capabilities equivalent to those of computers possible because of the advancements of mobile and wireless technology (Porter 2009 p. 213). Because society is extensively surrounded by and embedded in technology and its digital presence, it is inescapable. As a result of technological advancements, the Internet does not need a physical place to be powerful, in that, it is portable and accessible. As Hess (2014) states, “The internet no longer appears as a place that is accessed from desktop computers; it is everywhere, in our pockets and always on” (p. 6). As most movements or innovations in the world require a physical and stationary platform to function and expand, the internet does not. Essentially, this makes the Internet indestructible and undefeatable, as there is not physical item to destroy. Nearly every teenager of adult owns a smart phone and never fails to travel or do anything without it, allowing people constant access to the Internet and communication with others using a simple Wi-Fi connection. The digital world’s mobility, in combination with our feeding dependence on it, provide technology with great power. This argument is not solely about the fact that the Internet has power, but the consequences of the Internet’s power. In society, there is minimal acknowledgment of the idea that the use of machines, like mobile phones, requires an Internet connection which billions of others users are connected to. The necessary connection requires that people all over the world cohere, creating a consequential web and…

    • 625 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The Internet has been designed as a ‘pool of endless information’ for anyone who has access. With its introduction in the mid 1990’s, it has vastly changed the way we do business, obtain all kinds of data and the way we communicate in the world today. With its sheer potential, we have created the most powerful tool of our modern day technology. In a series of memos that were first written in 1962, by an MIT expert of the name of J.C.R Licklider, he had envisioned a type of ‘network’ in which a set of computers were globally interconnected in sharing information and anyone could access data from anyone of these terminals (Leiner, Cerf, Kahn & Clark, 1962-1974).…

    • 1786 Words
    • 8 Pages
    Better Essays
  • Best Essays

    References: The Internet Revolution history and significance . (n.d.). SICS. Retrieved February 20, 2012, from http://www.sics.se/~psm/ar97/…

    • 1565 Words
    • 7 Pages
    Best Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Peter Krapp Analysis

    • 703 Words
    • 3 Pages

    Peter Krapp builds a well-constructed argument designed to persuade readers that computer hacking is a danger that steals our most valuable possession—personal information—from our most vulnerable people--students. The article focuses on personal information about college students stolen from college computer networks. The writer builds his argument brick by brick. He starts by giving an example of student data stolen from a college by hackers in China, relating his topic to an event that really happened. The writer quickly establishes himself as an expert in the topic so readers can trust his information. Krapp asks and answers questions about the theft of data, goes into more depth about the type of information stolen from college networks, and then briefly touches on the laws, or the lack of laws, to protect students. He points out that data is stolen from students by not only foreign hackers, but also by American companies. The writer finishes with a call for colleges to protect student data, clearly stating his purpose.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer crimes are criminal activities that involve using a computer and a network to gain unauthorized access with the intent of deleting, altering, or damaging computer data. Due to them being extremely versatile, establishing criminal and noncriminal behavior when in use can be very difficult at times. “According to the U.S. Uniform Crime Reporting Statistics, by 2000 more than 300 million users around the globe accessed the World Wide Web. Of those, at least 1 million were engaged in illegal Internet activities (computer crime or "cyber-crime"). Cyber-crimes include Internet-related forgery, embezzlement, fraud, vandalism, and the disposal of stolen goods. The potential threat to the overall development of e-commerce was serious—so much that online security expenditures were expected to double to $30 billion in 2004” (Computer Crime – Definitions). The four most common categories of computer crimes are infrastructure attacks, technological facilitation, information attacks, and promotion.…

    • 733 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The greatest impact that the world today has experienced is the advancement of the information and communication technology (ICT). ICT has catapulted the world’s economy to heights that could not have been ever anticipated. (Allen B.A et al, 2001) Through the broad spectrum of ICT the world has been turned into a “global village” where at a click of a button, trade or transfer of information is exchanged from one end of the globe to the other effortlessly. The speed with which this industry has grown has astounded many, with close to a billion people predicted to go online by the end of next year. Already the global online population today stands at over 200 million, generating close to over 1.2 million jobs and raking in over $301.4 billion to the economy of U.S alone. (Allen B.A et al, 2001)…

    • 2393 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Humanities Course Paper

    • 1596 Words
    • 7 Pages

    Through the past several decades the advancement of technology has evolved. Among one of the advancements was the Internet. The Internet is a worldwide of networks connecting millions of computers. Through the Internet countries are able to exchange data, news and opinions. It started in the 1960’s when the internet was originally being used for government which later evolved to the world (Computer history museum, 2006). Over the past forty years the internet has changed technology of computers and how the world communicates, online banking, social networking, and online shopping. The Internet we know today grew from seeds planted by the U.S. Government. The Department of Defense issued a twenty thousand dollar contract on December 6, 1967 for the purpose of studying the design and specification of a computer network (Internet History from ARPANET to Broadband, 2007). It was conceived by the Advanced Research Projects Agency (ARPA) of the U.S. government in 1969 and was first known as the ARPANet (Computer history museum, 2006). The ARPA laid the groundwork which later became the internet. By 1992 the Internet has one million hosts (Ganna, 2006). Through the years the Internet has changed the way people live and run businesses. My project will walk through the discovery and evolution of the Internet.…

    • 1596 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Some think that the access to the Internet is a basic component of civil life that some developed countries aim to guarantee for their citizens. An important fact seems to be that much vital information for people's career, civic life, safety, etc. are increasingly provided via the Internet. Even social welfare services are sometimes administered and offered electronically. Today only about half of all Americans are connected to high speed internet, although this number is rising, the world is outpacing us. Over the last decade America has dropped from 4th in broadband to 22nd in the world in total usage. This is causing a major problem because today people are asked to apply for Jobs online as well as government services online, this means that there is a huge population of people who do not…

    • 922 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Cybercrime: Hacking

    • 1198 Words
    • 4 Pages

    With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world.…

    • 1198 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Concerns of Online Dating

    • 990 Words
    • 4 Pages

    The internet is a worldwide system of computers that are connected to one another. It is a public, cooperative, uncensored and self-sustaining facility (Harris, 2007) and more than two billion people have access to the system. White (2006) states that it is an “information superhighway” and part of the “global village” (p. 83). The internet’s sinister side is full of uncensored pornography and recipes for bomb making. However the internet is also used for educational information and social and practical issues of the community. This essay will describe a concern which has become a problem for users of the internet, how it has become a concern, why it is a concern and who suffers as a result of this concern.…

    • 990 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Good afternoon, today I will be talking about technology. Sure it can be useful and convenient sometimes. But the real question is does it really make our lives better? I believe it doesn’t. Technology plays a big part in our lives; we can literally find it anywhere, in houses, shops, on the streets, in schools, and even in our pockets. Just because we have technology nowadays, it doesn’t mean we have a better life.…

    • 633 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Internet has now become integrated in human society and the range of Internet applications have broadened and the users have become more sophisticated. With the broaden appeal of the internet greater risk has followed. These risks have led to the introduction of cyber-crime and the copyright infringement issues that plaque many businesses. Many argued that the absence of global legislation was turning the cyberspace into a place where there would be increasing worries and dangers. The legal system of today has had challenges in keeping pace with the growth of the Internet and its impact it’s had on business on the Internet. The expectation of most was that there was a need for the cyber-laws to govern the new virtual world. The aim of the cyber laws is to work in concert with the existing laws and to lessen the legal issues in the future. One notable legal issue is the ownership of information or the legal protection of the data. The illicit use of copyright material is common place on the internet as well as the spread of false and malicious information.…

    • 701 Words
    • 3 Pages
    Good Essays