Description |
ix, 242 pages ; 24 cm |
Contents |
Introduction -- Part 1. Computer Crime: From Mythical To Mutual Communication -- 1. The Myth Of Computer Crime -- Jerry Schneider: The Impostor -- 2. A Victim Of The Myth Of Computer Crime -- Stanley Mark Rifkin : The Comical Criminal -- 3. Who Are The Computer Criminals? -- Marvin Maki : The Ordinary Computer Criminal -- 4. Who Are The Victims Of Computer Crime? -- Roy Houston: The Computerized Con -- 5. How-And Why-Do We Define Computer Crime? -- John Taber : The Lone Stranger -- Part 2. The Three Keys To Security -- 6. Awareness -- Harold Rossfields Smith : The Digital Devil -- 7. Technology -- Donald Burleson : The Computer Insecurity Director -- 8. Law -- Laurence Olson : The Computerized "Rogue" Cop -- Part 3. Responding To Irresponsible Computing 9. Prosecution -- Walter Moore: The Street Computer Criminal -- 10. Civil Litigation -- Bill Christison versus the Contagious Consultant -- 11. Civil Litigation II -- US Sprint versus the Lithe 0 Organized Computer Criminal -- 12. Ethics -- Kevin Mitnick : The Willie Horton of Computer Crime -- Part 4. The Road To Responsible Computing -- 13. Politics -- Katya Komisaruk: The "Princess" of Computing -- 14. Politics II -- Jan Hanasz : The Polish TV Pirate -- 15. Politics III -- Oliver North versus Tell-Tale Technology -- 16. Piracy -- Bert van den Berg versus the Pirates of UCLA -- 17. Piracy II -- Jerry Schneider : Protector of Users' Rights -- 18. The Crime-Fighting Community -- Robert Morris : The Sorcerer's Apprentice -- Conclusion : Towards Responsible Computing |
Notes |
Includes index |
Bibliography |
Includes bibliographical references |
Subject |
Computer crimes -- United States.
|
LC no. |
89025672 |
ISBN |
155623256X |
|