Positive Alternatives to Computer Misuse: A Report of the Proceedings of an ACM Panel on Hacking
dc.contributor.author | Lee, John A. N. | en |
dc.contributor.author | Steier, Roz | en |
dc.contributor.author | Segal, Gerald | en |
dc.contributor.department | Computer Science | en |
dc.date.accessioned | 2013-06-19T14:35:39Z | en |
dc.date.available | 2013-06-19T14:35:39Z | en |
dc.date.issued | 1986-04-01 | en |
dc.description.abstract | If one believes press reports, the misuse of computers is rampant. The same the many other misuses have gone unreported as a result of the embarrassment and loss of image/integrity of those affected (as victims) and the belief that to expose misuses will lead to further problems and expense, as well as encourage copy-cat crimes. Much of the press coverage of computer misuse has centered on the younger members of computing community using inexpensive personal computer systems. The placement of powerful tools into the hands of adolescents without imposing the appropriate control would appear to be a contributing factor to their unfettered use of computers and communications systems. Such usage ranges from benign exploration of the powers of computational and communication systems, through the malicious use of those devices for personal aggrandisement, to the use of computers for distinctly criminal activities. At present there are no technological or ethical barriers that separate the explorer from the criminal; possibly the prospect of being able to perform more and more complex projects can innocently lead the benign learner into improper activities. Conversely the blame for breaches of security and the infiltration of personal, private systems, is sometimes placed on the backs of the owners of those systems for maintaining an attractive nuisance. Concern must also be expressed about the community-developing attractive nuisances of bulletin boards (BBS's), many of which are benign, but too many of which are used to extend the fringe area of illegality in exchanging pirated software, providing message systems for immoral or illegal purposes, and revealing cracks in governmental and commercial security. | en |
dc.format.mimetype | application/pdf | en |
dc.identifier | http://eprints.cs.vt.edu/archive/00000016/ | en |
dc.identifier.sourceurl | http://eprints.cs.vt.edu/archive/00000016/01/TR-86-09.pdf | en |
dc.identifier.trnumber | TR-86-09 | en |
dc.identifier.uri | http://hdl.handle.net/10919/19541 | en |
dc.language.iso | en | en |
dc.publisher | Department of Computer Science, Virginia Polytechnic Institute & State University | en |
dc.relation.ispartof | Historical Collection(Till Dec 2001) | en |
dc.rights | In Copyright | en |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | en |
dc.title | Positive Alternatives to Computer Misuse: A Report of the Proceedings of an ACM Panel on Hacking | en |
dc.type | Technical report | en |
dc.type.dcmitype | Text | en |
Files
Original bundle
1 - 1 of 1