Смекни!
smekni.com

Computer Crime Essay Research Paper The technological (стр. 2 из 2)

“Latest Web Statistics.” Latest Web Statistics. Online. Available http://www.intergov.org/public_administration/information/. 16 Dec. 1999.

Revelation. “The Ultimate Beginner’s Guide to Hacking and Phreaking.” LOA’s Homesite. 8 April 1996. Online. Available http://www.geocities.com/SoHo/Square/5464/. 11 Jan. 1999.

Sulski, Jim. “Crackdown on Crime is Raising Question of Computer Rights.” Chicago Tribune Nov.18, 1990: Sec. 19, 17-18. Crime. Art. 53. SIRS Researcher.

CD-ROM.

“What is a Computer and Telecommunication Crime?” Computer Crime. Online. Available http://www.rcmp-grc.gc.ca/html/cpu-cri.htm. 16 Dec. 1999.

Brandon Hubbard

1/11/2000

Working Outline and Thesis statement

Thesis: Computer crime costs small businesses and corporations millions each year, puts restraints on legitimate computer users and still remains an almost unstoppable crime.

Topic: Computer Crime

I Introduction

A. Definition of a computer crime

B. Brief background of the history of computer crime.

1. what computer crime originally was

2. what computer crime has become

3. definition of a “hacker”

C. Thesis: Computer crime costs small businesses and corporations millions each year, puts restraints on legitimate computer users and still remains an almost unstoppable crime.

II The cost of computer crime on corporations

A. Description of how corporations are affected .

1. the affect of “hackers”

2. statistics of the effects of “hackers”

3. the affect of corporate employees

4. statistics of the effects of corporate employees

B. How computer crimes can cripple businesses

1. the selling and/or discovery of prototype plans

2. examples of the latter

a. Kevin Mitnick

C. How corporations fight back.

1. preventive maintenence

2. system security

III How computer crimes affect legitimate computer users

A. Causes restrictions on legitimate activities.

1. federal raids of bulletin board systems and operators

B. Restricts access to systems that may otherwise be made available.

C. Spreads a certain fear amongst computer users.

1. marketing ploys playing on these fears

IV The unstoppable criminals

A. The activities of “hackers.”

1. methods used

2. ethics of “hackers”

B. Corporate actions taken.

C. The actions of the federal and state governments.

1. passage of laws

2. how these laws violate individual rights

V Conclusion

A. Show an example of the alternative computer community.

B. Summarization of thesis statement.

C. Give possible solutions based on the evidence provided.