Nn Fir Nn

Topics: Computer, Internet, Computer security Pages: 12 (3883 words) Published: May 14, 2013
Computer abuse: vandalizing the information society
Steven M. Furnell and Matthew J. Warren

Global information networks are now an integral part of the way in which modern businesses and economies operate. One of the best examples of the trend, the Internet, is now estimated to extend to over one million computers, connecting 30 million users in more than 40 countries and is still increasing. A rudimentary comparison arising from this is that the “population” of the Internet now exceeds that of some industrialized nations. As a consequence there is now widespread dependence on computers and network technology, with the ability to communicate and receive information via these channels being recognized as an essential ingredient for competitiveness in the global market. The transition to the information society is being driven by the reduction in the costs of computing power and telecommunications. These factors, in combination with advances in the core technologies, are making information resources available to an increasing number of people. Leading industry figures are excited by this revolution, some predicting that its effects will be as far reaching as the introduction of electricity (Gates, 1995). The concept has also received significant publicity and backing from national governments in various developed countries with (for example) the USA pushing the information superhighway, an open network of information that will be as accessible as the conventional telephone system. It is, therefore, clear that this route is perceived to be an important element in insuring future national development and competitiveness. Unfortunately, within any sufficiently mature society there will always be a criminal or destructive element. The information society is no exception to this and the individuals involved have been collectively christened under various names, including “hackers,” “cyberpunks” and “phreakers.” However, a potential difference from the norm is that the undesirable element has been present from a relatively early stage, with a high degree of publicity being received in the process. As a consequence, many people know the information society as much for its problems as for its benefits. Outstanding issues are whether this will restrict the society’s development and, if so, how the problem may be addressed. 61

The authors Steven M. Furnell is a Research Fellow with Network Research Group, University of Plymouth, UK. Matthew J. Warren is a Lecturer at Plymouth Business School, University of Plymouth, UK. Abstract Examines the damaging effects that malicious computer abuse, such as hacking and viruses, can have on the development of an information-based society. Computing and telecommunications technologies are a key ingredient in the realization of this society, but are increasingly the targets of criminals and mischief makers. Highlights the apparent escalation in computer-abuse incidents, as illustrated by a number of recent surveys, and examines the effects that these may have on the public perception of technology (and, hence, the smooth transition to the information society). Also presents some broad recommendations regarding what can be done to address the problem. This considers both technical measures to help safeguard systems and revised attitudes to computer abuse, to insure that incidents can be dealt with more effectively.

Internet Research: Electronic Networking Applications and Policy Volume 7 · Number 1 · 1997 · pp. 61–66 © MCB University Press · ISSN 1066-2243

Computer abuse: vandalizing the information society

Internet Research: Electronic Networking Applications and Policy Volume 7 · Number 1 · 1997 · 61–66

Steven M. Furnell and Matthew J. Warren

The development of the information society
The fact that our lives are changing as a result of the spread of technology is widely accepted and the nature of the “society” that will result has been forecast by numerous authors...

References: Audit Commission (1994), Opportunity Makes a Thief – an Analysis of Computer Abuse, HMSO Publications Centre, London. Collier, P.A. and Spaul, B.J. (1992), “The Woolwich Centre for Computer Crime Research: addressing the need for UK information,” Computer Fraud & Security Bulletin, August, pp. 8-12. Culf, A. (1996), “BBC acts to thwart political hackers,” The Guardian, February 9, p. 1. Evans, D. (1994), “BA in dock over hacking,” Computer Weekly, April 28, p. 6.
The Sunday Times (1996), “City surrenders to £400m gangs,” June 2, pp. 1-24.
Toffler, A. (1981), The Third Wave, Pan Books, London. Walker, C. (1996), “Brand leaders embrace Web,” Computer Weekly, January 11, p. 6.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Essay on Nn, Mn
  • Nn-Paper
  • Lecture 1 NN 1 Essay
  • nj,nn m Essay
  • Parent-Child Relationship nn "King Lear" Essay
  • NNS chemistry past paper section 15
  • Fir in India Essay
  • Essay on Fraser Fir

Become a StudyMode Member

Sign Up - It's Free