Defining the boundaries of computer crime: piracy, break-ins, and sabotage in cyberspace

Acm Sigcas Computers and Society 30 (3):3-9 (2000)
  Copy   BIBTEX

Abstract

This article has no associated abstract. (fix it)

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 90,221

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Analytics

Added to PP
2013-11-01

Downloads
32 (#429,411)

6 months
5 (#244,526)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

Some ethical reflections on cyberstalking.Frances S. Grodzinsky & Herman T. Tavani - 2002 - Acm Sigcas Computers and Society 32 (1):22-32.

Add more citations

References found in this work

What is computer ethics?James H. Moor - 1985 - Metaphilosophy 16 (4):266-275.
Reason, relativity, and responsibility in computer ethics.James H. Moor - 1998 - Acm Sigcas Computers and Society 28 (1):14-21.

Add more references