Abstracts - faqs.org

Abstracts

Law

Search abstracts:
Abstracts » Law

Controlling Computer Crime, Where Do We Stand?

Article Abstract:

The data processing industry acknowledged the possibility of computer crime in the late sixties and early seventies. Early security measures were targeted at internal abuse. Publicity illustrated computer hacking to all of society. Federal legislation against computer crime has been proposed, but never passed. Currently, computer crime is rarely prosecuted or reported. Only a few states have passed their own computer crime legislation.

Author: Singer, T.
Publisher: American Society for Industrial Security
Publication Name: Security Management
Subject: Law
ISSN: 0145-9406
Year: 1984

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


ASIS Testifies on Capitol Hill

Article Abstract:

The American Society for Industrial Security testified at a Congressional hearing on computer crime. Others testifying were a hacker and two computer consultants. The American public will suffer from computer crime. What is needed are computer security measures and federal legislation. Business and government need the assistance of federal legislation to combat computer crime.

Publisher: American Society for Industrial Security
Publication Name: Security Management
Subject: Law
ISSN: 0145-9406
Year: 1984

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Computer Abuse: A Crime of the Times

Article Abstract:

The general public is becoming aware of computer abuse. Through media publicity, computer crime is becoming a recognized problem. Rectification can come from federal legislation. The problem can also be controlled by computer proprietors. Computer proprietors can initiate their own security measures to prevent computer crime.

Author: Mathias, Charles McC.
Publisher: American Society for Industrial Security
Publication Name: Security Management
Subject: Law
ISSN: 0145-9406
Year: 1984

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Subjects list: Computers, Safety and security measures, Laws, regulations and rules, Digital computers, Industry, Industries
Similar abstracts:
  • Abstracts: Conditional federal spending after Lopez. Gender-motivated violence and the Commerce Clause: the civil rights provision of the Violence Against Women Act after Lopez
  • Abstracts: Insider signaling and insider trading with repurchase tender offers. Civil procedure - D.C. Circuit rejects sliding scale approach to finding personal jurisdiction based on Internet contacts -GTE New Media Services v. BellSouth Corp
  • Abstracts: Extending PruneYard: citizens' right to demand public access cable channels. Siren songs and Amish children: autonomy, information, and law
  • Abstracts: Washington Items. IRS denies relief following financial planner's failure to deposit IRA-earmarked funds within 60 days
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2025 Advameg, Inc.