Positive Alternatives to Computer Misuse: A Report of the Proceedings of an ACM Panel on Hacking

dc.contributor.authorLee, John A. N.en
dc.contributor.authorSteier, Rozen
dc.contributor.authorSegal, Geralden
dc.contributor.departmentComputer Scienceen
dc.date.accessioned2013-06-19T14:35:39Zen
dc.date.available2013-06-19T14:35:39Zen
dc.date.issued1986-04-01en
dc.description.abstractIf one believes press reports, the misuse of computers is rampant. The same the many other misuses have gone unreported as a result of the embarrassment and loss of image/integrity of those affected (as victims) and the belief that to expose misuses will lead to further problems and expense, as well as encourage copy-cat crimes. Much of the press coverage of computer misuse has centered on the younger members of computing community using inexpensive personal computer systems. The placement of powerful tools into the hands of adolescents without imposing the appropriate control would appear to be a contributing factor to their unfettered use of computers and communications systems. Such usage ranges from benign exploration of the powers of computational and communication systems, through the malicious use of those devices for personal aggrandisement, to the use of computers for distinctly criminal activities. At present there are no technological or ethical barriers that separate the explorer from the criminal; possibly the prospect of being able to perform more and more complex projects can innocently lead the benign learner into improper activities. Conversely the blame for breaches of security and the infiltration of personal, private systems, is sometimes placed on the backs of the owners of those systems for maintaining an attractive nuisance. Concern must also be expressed about the community-developing attractive nuisances of bulletin boards (BBS's), many of which are benign, but too many of which are used to extend the fringe area of illegality in exchanging pirated software, providing message systems for immoral or illegal purposes, and revealing cracks in governmental and commercial security.en
dc.format.mimetypeapplication/pdfen
dc.identifierhttp://eprints.cs.vt.edu/archive/00000016/en
dc.identifier.sourceurlhttp://eprints.cs.vt.edu/archive/00000016/01/TR-86-09.pdfen
dc.identifier.trnumberTR-86-09en
dc.identifier.urihttp://hdl.handle.net/10919/19541en
dc.language.isoenen
dc.publisherDepartment of Computer Science, Virginia Polytechnic Institute & State Universityen
dc.relation.ispartofHistorical Collection(Till Dec 2001)en
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.titlePositive Alternatives to Computer Misuse: A Report of the Proceedings of an ACM Panel on Hackingen
dc.typeTechnical reporten
dc.type.dcmitypeTexten

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TR-86-09.pdf
Size:
3.63 MB
Format:
Adobe Portable Document Format