Computer Crimes

This chapter surveys the history and examples of computer crimes, their types, costs to society, and strategies of detection and prevention. In the discussion, it is noted that a great number of computer attacks fall into two categories: penetration and d

  • PDF / 3,428,951 Bytes
  • 380 Pages / 439.43 x 683.15 pts Page_size
  • 112 Downloads / 212 Views

DOWNLOAD

REPORT


Joseph Migga Kizza

Ethical and Social Issues in the Information Age Fifth Edition

Texts in Computer Science Editors David Gries Fred B. Schneider

For further volumes: http://www.springer.com/series/3191

Joseph Migga Kizza

Ethical and Social Issues in the Information Age Fifth Edition

Joseph Migga Kizza Department of Computer Science and Engineering University of Tennessee Chattanooga, TN USA Series Editors: David Gries Department of Computer Science Cornell University Ithaca, NY USA

Fred B. Schneider Department of Computer Science Cornell University Ithaca, NY USA

ISSN 1868-0941 ISSN 1868-095X (electronic) ISBN 978-1-4471-4989-7 ISBN 978-1-4471-4990-3 (eBook) DOI 10.1007/978-1-4471-4990-3 Springer London Heidelberg New York Dordrecht Library of Congress Control Number: 2013934588 © Springer-Verlag London 2013 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)

Preface to the Fifth Edition

We may have experienced the fastest growth of technology in the last 10 years than ever before. Tremendous technological advances have been registered across the board from telecommunication with jaw-dropping developments in computing and telecommunication creating the long expected convergency of communications and computing platforms that are reaching into all remote co