Can Computer Crime Be Stopped?
Article Abstract:
Information stored in computers is a valuable resource and the proliferation of microcomputers has brought new problems in protecting this information and computer systems. Automated aids to systems penetration, scanning, using microcomputers and modems can easily foil some of the largest systems. Password security is commonly used, but often can be easily broken. Trojan horses simulating the log-in program can provide trespassers with access to privileged areas of the system. Computer systems also can be penetrated using trap doors. Controls and cross-checking are used to detect crimes where data is modified even before entering the computer. Audit trails aid in tracking computer criminals. Such sophisticated investigation techniques are difficult for the average police officer and often cause complicated legal problems. Complicated security systems are available, but often are not used because they diminish the user- friendliness of the system. Sixteen specific computer crime incidents are reported. A diagram illustrates the vulnerability of modern computer systems. A table shows types and perpetrators of crimes, and a graph illustrates the growing incidence of such crimes.
Publication Name: IEEE Spectrum
Subject: Engineering and manufacturing industries
ISSN: 0018-9235
Year: 1984
User Contributions:
Comment about this article or add new information about this topic:
Company A: A Friendly Place ... But
Article Abstract:
A computer company's work environment was analyzed by interviewing and observing employees at work. The employees enjoyed working for the company and banded together in their project groups. Merit-pay increases pleased some employees, but others find them unrelated to productivity. Social satisfactions were the driving forces for accomplishing goals. Some believed that the freedom the management gave the engineers resulted in too loose a project with little direction. No one seemed to be making necessary decisions. A psychologist gives his analysis of the work environment.
Publication Name: IEEE Spectrum
Subject: Engineering and manufacturing industries
ISSN: 0018-9235
Year: 1983
User Contributions:
Comment about this article or add new information about this topic:
How Does Your Office Affect Your Work?
Article Abstract:
Four United States electronics companies were visited to view working conditions for engineers. One company had informal offices with group-oriented engineers and a high level of communication. Another company had high job security, strictly eight-to-five working conditions, and little communication between employees. A third company was highly competitive and a junglelike atmosphere prevailed. At the last company, a family approach to relations is standard and the management is in firm control.
Publication Name: IEEE Spectrum
Subject: Engineering and manufacturing industries
ISSN: 0018-9235
Year: 1983
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: Technology '84: Consumer Electronics. Company D: A Fortress Undisturbed
- Abstracts: Video Games: The Next Wave. Company B: The Competitive Edge
- Abstracts: The Automated Cockpit. International Data Wars Are Brewing
- Abstracts: Technology '84: Power and Energy. TMI Plus 5: Nuclear Power on the Ropes