Steven M. Furnell and Matthew J. Warren
Introduction
Global information networks are now an integral part of the way in which modern businesses and economies operate. One of the best examples of the trend, the Internet, is now estimated to extend to over one million computers, connecting 30 million users in more than 40 countries and is still increasing. A rudimentary comparison arising from this is that the “population” of the Internet now exceeds that of some industrialized nations. As a consequence there is now widespread dependence on computers and network technology, with the ability to communicate and receive information via these channels being recognized as an essential ingredient for competitiveness in the global market. The transition to the information society is being driven by the reduction in the costs of computing power and telecommunications. These factors, in combination with advances in the core technologies, are making information resources available to an increasing number of people. Leading industry figures are excited by this revolution, some predicting that its effects will be as far reaching as the introduction of electricity (Gates, 1995). The concept has also received significant publicity and backing from national governments in various developed countries with (for example) the USA pushing the information superhighway, an open network of information that will be as accessible as the conventional telephone system. It is, therefore, clear that this route is perceived to be an important element in insuring future national development and competitiveness. Unfortunately, within any sufficiently mature society there will always be a criminal or destructive element. The information society is no exception to this and the individuals involved have been collectively christened under various names, including “hackers,” “cyberpunks” and “phreakers.” However, a potential difference from the norm is
References: Audit Commission (1994), Opportunity Makes a Thief – an Analysis of Computer Abuse, HMSO Publications Centre, London. Collier, P.A. and Spaul, B.J. (1992), “The Woolwich Centre for Computer Crime Research: addressing the need for UK information,” Computer Fraud & Security Bulletin, August, pp. 8-12. Culf, A. (1996), “BBC acts to thwart political hackers,” The Guardian, February 9, p. 1. Evans, D. (1994), “BA in dock over hacking,” Computer Weekly, April 28, p. 6. The Sunday Times (1996), “City surrenders to £400m gangs,” June 2, pp. 1-24. Toffler, A. (1981), The Third Wave, Pan Books, London. Walker, C. (1996), “Brand leaders embrace Web,” Computer Weekly, January 11, p. 6. 66