Студопедия

КАТЕГОРИИ:

АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторикаСоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника



Technologic Issues and Computer Misdeeds




Читайте также:
  1. A 15-year-oldComputer Consultant
  2. COMPAQ COMPUTER
  3. HELO 10-computer25.noc.lab.krmk
  4. Moral Issues
  5. The Computer
  6. The Computer Jungle
  7. The Generations of Computers
  8. TO DEPEND ON COMPUTERS - IS IT BAD OR NOT?
  9. Work in groups. Discuss and cross out the collocation in each diagram that is not commonly used when talking about computers.

Society gets more and more dependent on information technologies and systems. They are everywhere – banks, hospitals, and insurance companies, police, electro and atomic power stations, transport and etc. Computer based information systems are vulnerable of crimes and ill-using, breakdowns and misuses, human mistakes.

The regularly functioning of the information systems is of a special importance because the security in whole manufacturing sectors, safety of strategic objectives and human life depends on them. That is why a big attention is paid to information systems protection, that includes policy procedures and means of protection (files systems, data coding, password’s access control, audits control and etc.). The new technologies create also new crime opportunities – new products to be stolen, new ways of thefts, new methods to do harm to others. From the very beginning of computer implementation in commercial activities started their exploitation for illegal purposes. The computers connected in telecommunication networks and on-line systems are especially vulnerable because of multi access. At the end of 70s and the beginning of 80s of XX century when the computer crimes started, became clear that there were not such crimes according to legislation. Data, programs and computer services were not listed as an actual property and because of that violations of them were unpunished. At the end of 80s years started a process of executing the legislations of every country in conformity with the changed realities in that sphere.

It’s accepted that the negative computer acts to be separated in crimes and abuses.

Computer crimesvary from using information technologies as criminal acts/money and thefts/ to computer activities/ thefts of computer and telecommunication services, unauthorized access and using of information system s theft, alteration and breakdown of data or programs, creation of viruses.

Computer misusesare activities, which are legal but not ethical. Today is not known the real scale of computer crimes and misuses and the damages they’ve caused. According to a survey of National Centre of Computer Crimes in the USA 36% of all crimes are money thefts, 34% – service thefts, 12% – information thefts, 8% – alteration of data, 10% – others.



As many people become perfect users of computers, as many grows the opportunity of computer misuses. Legislative initiative and creating of adequate laws are not adequate measure against computer crimes. Educational institutions and the whole society must be engaged in developing moral values in young people according to specific requirements of cyber environment in information society.


Дата добавления: 2015-09-13; просмотров: 6; Нарушение авторских прав







lektsii.com - Лекции.Ком - 2014-2021 год. (0.007 сек.) Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав
Главная страница Случайная страница Контакты