Welcome to Essay Galaxy!
Home Essay Topics Join Now! Support
Essay Topics
American History
Arts and Movies
Biographies
Book Reports
Computers
Creative Writing
Economics
Education
English
Geography
Health and Medicine
Legal Issues
Miscellaneous
Music and Musicians
Poetry and Poets
Politics and Politicians
Religion
Science and Nature
Social Issues
World History
Members
Username: 
Password: 
Support
Contact Us
Got Questions?
Forgot Password
Terms of Service
Cancel Membership



Enter your query below to search our database containing over 50,000+ essays and term papers

Search For:
Match Type: Any All

Search results 11 - 20 of 4442 matching essays
< Previous Pages: 1 2 3 4 5 6 7 8 9 10 Next >

11: Computer Crime
Computer Crime A young man sits illuminated only by the light of a computer screen. His fingers dance across the keyboard. While it appears that he is only word processing or playing a game, he may be committing a felony. In the state of Connecticut, computer crime is ...
12: The Computer Underground
The Computer Underground NORTHERN ILLINOIS UNIVERSITY THE SOCIAL ORGANIZATION OF THE COMPUTER UNDERGROUND A THESIS SUBMITTED TO THE GRADUATE SCHOOL IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE MASTER OF ARTS DEPARTMENT OF SOCIOLOGY BY %CompuServe: 72307,1502% %GEnie: GRMEYER% DEKALB, ILLINOIS ABSTRACT Mame: Gordon R. Meyer Department: Sociology Title: The Social Organization of the Computer Underground Major: Criminology Degree: M.A. Aproved by: Date: _____________________________________ ___________ Tesis Director NORTHERN ILLINOIS UNIVERSITY ABSTRACT This paper examines the social organization of the "computer underground" (CU). The CU is composed of actors in three ...
13: Computer Crime
Computer Crime Advances in telecommunications and in computer technology have brought us to the information revolution. The rapid advancement of the telephone, cable, satellite and computer networks, combined with the help of technological breakthroughs in computer processing speed, and information storage, has ...
14: The Computer Underground
The Computer Underground Department of Sociology Northern Illinois University DeKalb, IL 60115 (5 March, 1990) THE BAUDY WORLD OF THE BYTE BANDIT: A POSTMODERNIST INTERPRETATION OF THE COMPUTER UNDERGROUND An earlier version of this paper was presented at the American Society of Criminology annual meetings, Reno (November 9, 1989). are listed in alphabetical order. Address correspondence to Jim Thomas. We are indebted to the numerous anonymous computer underground participants who provided information. Special acknowledgement goes to Hatchet Molly, Jedi, The Mentor, Knight Lightning, and Taran King. ABSTRACT The criminalization of "deviant acts" transforms social meanings into legal ones. Yet, legal meanings ...
15: Hackers
TABLE OF CONTENTS Introduction . . . . . . . . . . . . . . . . . . . 1 Methodology . . . . . . . . . . . . . . . . . . . 6 What is the Computer Underground? . . . . . . . . 11 Topography of the Computer Underground . . . . . . 20 Hacking . . . . . . . . . . . . . . . . . 20 Phreaking . . . . . . . . . . . . . . . . . . 21 Pirating . . . . . . . . . . . . . . . . . 24 Social Organization and Deviant Associations . . . 28 Mutual Association . . . . . . . . . . . . . . . . 31 The Structure of the Computer Underground . . . . 33 Bulletin Board Systems . . . . . . . . . . 33 Towards a BBS Culture . . . . . . . . . 37 Bridges, Loops, and Voice Mail Boxes . . . 53 Summary . . . . . . . . . . . . . . . . . . 57 Mutual Participation . . . . . . . . . . . . . . . 59 Pirate Groups . . . . . . . . . . . . . . . 63 Phreak/hack groups . . . . . . . . . . . . 64 Summary . . . . . . . . . . . . . . . . . . 67 Conclusion . . . . . . . . . . . . . . . . . . . . 69 ...
16: The Computer Underground.
The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence of home computers has been accompanied by corresponding social problems involving the activities of so-called "computer hackers," or better referred to as the computer underground (CU). The CU is composed of computer aficionados who stay on the fringes of legality. The CU is composed of relatively intelligent people, in contrast to the media's description of the ultra ...
17: Laws Must Be Passed To Address The Increase In The Number And Types Of Computer Crimes
Laws Must Be Passed To Address The Increase In The Number And Types Of Computer Crimes Over the last twenty years, a technological revolution has occurred as computers are now an essential element of today's society. Large computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses because more and more people now have computers at home and at the office. People commit computer crimes because of society's declining ethical standards more than any economic need. According to experts, gender is the only bias. The profile of today's non-professional thieves crosses all races, age groups and economic strata. Computer criminals tend to be relatively honest and in a position of trust: few would do anything to harm another human, and most do not consider their crime to be truly dishonest. Most are males: ...
18: Computer Crime In The 1990's
Computer Crime In The 1990's We're being ushered into the digital frontier. It's a cyberland with incredible promise and untold dangers. Are we prepared ? It's a battle between modern day computer cops and digital hackers. Essentially just think what is controlled by computer systems, virtually everything. By programming a telephone voice mail to repeat the word yes over and over again a hacker has beaten ...
19: Computer Ethics: A Review
Computer Ethics: A Review Computer Ethics by Tom Forester and Perry Morrison is a very interesting book about social problems and ethical dilemmas created by computers. Computer crime may include something as innocent as copying software to using a computer to electronically steal money. The invasion of privacy is also a major issue that raises social problems and ethical decisions. Also, ...
20: Computer Crime in the 90's
Computer Crime in the 90's It's the weekend, you have nothing to do so you decide to play around on your computer. You turn it on and then start up, you start calling people with your modem, connecting to another world, with people just like you at a button press away. This is all fine but ...


Search results 11 - 20 of 4442 matching essays
< Previous Pages: 1 2 3 4 5 6 7 8 9 10 Next >

 Copyright © 2003 Essay Galaxy.com. All rights reserved