Social Control of Cyber Space

1901 Words4 Pages

Social Control of Cyber Space Our nation's infrastructure is daily becoming much more of an abstract environment due to the use of organized cyber criminals hacking away at our super computer information systems. They are generating unpredictable challenges for law enforcement in discovering the unethical abuse on computer systems and a concentration on the young topic of cyber terrorism threatening our criminal justice system. Our law enforcement continues to invent newer methods to function and learn from this new social phenomenon and define cyber terrorism activity as motivation by the rapid growth of technology as a challenge, dominance, and as pleasure to obtain privileged information for illegal use to intentionally harm others and our information networks as well. Therefore, it is of relevance to explore the behavior of a computer hacker and a cracker; including the control, response, and the appropriate measures to combat this new crime wave, and how the academic community, courts, police, and the scientific government are approaching this radical form of crime. On October 25th, 1983, a hearing was formed by the U.S. Congress on the issue of computer security in the federal government and the private sector. The hearing discussed the level of importance on how serious the United States Government must become in learning to monitor the use of computers and Internet through several knowledgeable witnesses. Susan H. Nycum, an attorney representing Gaston, Snow and Ely Barlett firm's computer high technology group defined computer crime as: "…any illegal act where a special knowledge of computer technology is essential for its perpetration, investigation, or prosecution" (Nycum, 15). Nycum also added before the co... ... middle of paper ... ...and its sociological behavior. (1) Alexander, Yonah. Swetnam, Michael. Cyber Terrorism and Information Warfare. [Vol.1,2,3,4] Oceana, New York: Dobbs Ferry, 1999. (2) Kiernan, V. "Appeals Court Rules That First Amendment Protects Computer Encryption." The Chronicle of Higher Education. 5 Apr. 2000: 1 of 3 Internet: . (3) Master, Web. "Is Mafiaboy Real or a Creation of the Media?" News. 20 Apr. 2000: 1 Online Internet. 24 Apr. 2000. Internet: . (4) United States, Congress. Senate. Committee on Governmental Affairs. Computer Security in the Federal Government and the Private Sector. Washington: U.S. G.P.O., Ninety-Eighth Congress, First Session, October 25, 1983. (5) United States, Congress. Senate. Committee on Governmental Affairs. Security in Cyber Space. Washington: U.S. G.P.O., Hundred Fourth Congress, Second Session, May 22, 1996.

More about Social Control of Cyber Space

Open Document