Computer crime: Assessing the lawyer's perspective [Book Review]
David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Jack Alan Reynolds
Learn more about PhilPapers
Journal of Business Ethics 8 (4):243 - 251 (1989)
The past decade has seen a rapid development and proliferation of sophisticated computer systems in organizations. Designers, however, have minimized the importance of security control systems, (except for those systems where data security and access control have obviously been of major importance). The result is an increasing recognition that computer systems security is often easily compromised.This research will provide the initial step in assessing ways in which attorneys retained to prosecute computer crimes and computer people who discover these violations can work together to strengthen both our computer systems to thwart violators and the laws that are currently on the books that can be used to prosecute violators.
|Keywords||No keywords specified (fix it)|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
No citations found.
Similar books and articles
Philip Brey (2005). The Epistemology and Ontology of Human-Computer Interaction. Minds and Machines 15 (3-4):383-398.
William Rehg, Peter McBurney & Simon Parsons (2004). Computer Decision-Support Systems for Public Argumentation: Assessing Deliberative Legitimacy. [REVIEW] AI and Society 19 (3):203-228.
Alec Grierson, David Moore & Tangming Yuan (2011). Assessing Debate Strategies Via Computational Agents. Argument and Computation 1 (3):215-248.
Jan Doroszewski (1988). Ethical and Methodological Aspects of Medical Computer Data Bases and Knowledge Bases. Theoretical Medicine and Bioethics 9 (2).
Helen Nissenbaum (2005). Where Computer Security Meets National Security. Ethics and Information Technology 7 (2):61-73.
Deborah G. Johnson (2006). Computer Systems: Moral Entities but Not Moral Agents. [REVIEW] Ethics and Information Technology 8 (4):195-204.
Sara Franceschelli (2009). Computer Simulations as Experiments. Synthese 169 (3):557 - 574.
John D'Arcy & Anat Hovav (2009). Does One Size Fit All? Examining the Differential Effects of Is Security Countermeasures. Journal of Business Ethics 89 (1):59 - 71.
Added to index2009-01-28
Total downloads4 ( #264,689 of 1,100,143 )
Recent downloads (6 months)1 ( #304,144 of 1,100,143 )
How can I increase my downloads?