TITLE

Gray Area of Cyber Crime Gets More Black and White

PUB. DATE
October 2010
SOURCE
Security: Solutions for Enterprise Security Leaders;Oct2010, Vol. 47 Issue 10, p100
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on issues concerning cyber crimes in U.S. school environment and the measures taken by the authorities and statutes that address information technology (IT) security issues such as the inclusion of cyberbullying and electronic communications into anti-bullying policies of schools.
ACCESSION #
54462614

 

Related Articles

  • Computer fraud--what can be done about it? Romney, Marshall // CPA Journal;May95, Vol. 65 Issue 5, p30 

    Addresses the problem of computer-based fraud. Dependence on computerized systems to meet increasing need for information; Ways to perpetrate computer fraud; Computer fraud techniques; Reduction of computer crimes by increasing the integrity of employee; Design of internal control systems. ...

  • `Innocent' hackers want their computers back. Charles, D. // New Scientist;5/9/92, Vol. 134 Issue 1820, p9 

    Reports that United States officials refuse to return computers to owners which were seized during Operation Sun Devil raids on computer hackers. Description of the operation; The meager results of the operation; Computer Professionals for Social Responsibility have gone to court over this.

  • `An Embezzler's Guide to Your Computer' available.  // Westchester County Business Journal;10/28/96, Vol. 35 Issue 44, p19 

    Presents excerpts from `An Embezzler's Guide to Your Computer,' a report available from Assets Protection Publishing. Embezzlement as the second most common crime against business; Two common embezzlement methods.

  • Trouble for employers.  // Nation's Business;Feb85, Vol. 73 Issue 2, p57 

    Whether computer criminals are corporate managers transferring assets, or hackers stealing hundreds of thousands of dollars of computer time, computer crime can present a company with a problem of devastating proportions. A variety of insurance security plans are being launched to reduce the...

  • On site: The tamperproof office. LaPlante, A. // PC World;Jul91, Vol. 9 Issue 7, p240 

    Describes the steps Sun Life Assurance Company of Canada has taken to protect itself from computer security threats. Protecting information on PCs; Identifying PC security risks; Security classifications for PCs; Preventive measures; Education in security threats.

  • Antivirus and security products. Heim, J. // PC World;Jul91, Vol. 9 Issue 7, p247 

    Lists 26 antivirus products. Types of virus fighters; Integrity checkers; Memory-resident monitors; Security products; Choosing an anti-virus or security product.

  • Fending off the hackers. Elliott, Robert // Inside Tucson Business;07/15/96, Vol. 6 Issue 16, p3 

    Recommends basic strategies for preventing computer crime. Includes minimizing Internet connectivity; Building a computer arbiter; Constant data reduction.

  • Staying ahead of the hacker. McQuilken, Barry // Telecom Asia;Jul96, Vol. 7 Issue 7, p46 

    Presents a class of electronic products designed to protect against unauthorized access to computer systems, services and resources. Includes granting of privileges; User authentication; Encryption; Strengths and weaknesses of the Internet; Implementation of information security.

  • Keep eye shut for computer fraud by other employees. Culp, Mildred // San Diego Business Journal;06/29/98, Vol. 19 Issue 26, p45 

    Advises on protecting a company's computer system from fraud by other employees. Company's need to use services of accounting firms to help look for incidence of fraud; Need for the implementation of outside and internal controls; Monitoring of employees who use computers secretly or unusually;...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics