Computers, Information Technology, the Internet, Ethics, Society and Human Values

Philip Pecorino, Ph.D.

Queensborough Community College,  CUNY

Chapter 8 Crime and Misbehavior




Readings on Computer Crime  MIT Open Source

Crime and Puzzlement: Desperados of the DataSphere   John Perry Barlow, 

Part 1 crime_and_puzzlement    Part 2 crime_and_puzzlement

"Cyberstalking: A New Challenge for Law Enforcement and Industry," U.S. Dept. of Justice
A case of cyberstalking

Parasitic computing 

Parasitic Computing?  Albert-Laszlo Baraba si, Vincent W. Freeh, Hawoong Jeong & Jay B. Brockman

Alternate location for article on parasitic computing -text only

The Ethics of  Parasitic Computing: Fair use or Abuse of TCP/IP Over the  INTERNET? Robert N. Barger   

Fraud Precautions R Barger 

"Ethical Web Agents" by David Eichmann

"Ethics of WWW Site Engineering" (by Chris MacDonald, as appearing in the July 1995 Computer Mediated Communication Magazine)

"The Hacker Crackdown: Law and Disorder on the Electronic Frontier," by Bruce Sterling

Concerning Hackers Who Break into Computer Systems  by Dorothy E. Denning
"Keys to the Kingdom", a CyberWire Dispatch by Brock N. Meeks (about so-called "blocking software")

"Netizens: On the History and Impact of Usenet and the Internet" by Michael Hauben and Ronda Hauben

"Networking on the Net: Professionalism, Ethics And Courtesy On The Net," by Claire Belilos

"The Power of Google," by Christina Buu-Hoan

"Toward an Ethics and Etiquette for Electronic Mail", by Norman Z. Shapiro and Robert H. Anderson

Web Spoofing: An Internet Con Game, by Edward W. Felten, Dirk Balfanz, Drew Dean, and Dan S. Wallach

Essay on computer viruses and worms, Dr. R. Standler,PhD (Physics, 1977), Attorney Specializing in Computer Law

Essay that surveys computer crime:Dr. R. Standler,

Practical hints for users on how to avoid computer crimeDr. R. Standler,

Essay on how to recognize hoaxes about computer viruses  Dr. R. Standler,


US Department of Justice Computer Crime and Intellectual Property Section.


A connection to the National Fraud Information Center provides not only information aboutFraud, but also connections to other useful sites.

Computer Security Institute

Chicago-based Emergency Response and Research Institute

Computer Security Technology Center, Lawrence Livermore National Laboratory.

CERT Coordination Center, SEI, CMU

Florida Association of Computer Crime Investigators, Inc.

Computer Crimes Laws

Virginia COMPUTER CRIMES Act -- 1984.

Florida Computer Crime Act -- 1985.

Wisconsin State Computer Crime Law -- 1981.

Internet Law Library The U.S. House of Representatives 

Hong Kong (1995). Computer Crime is viewed differently in different countries:

Australia (original copy in Australia, 1995. Computer Crime is viewed differently in different countries:


Peter J. Denning (editor), Computers Under Attack: Intruders, Worms, and Viruses, Reading, MA: Addison-Wesley, 1990.

Katie Hafner and John Markoff, Cyberpunk: Outlaws and Hackers on the Computer Frontier, New York: Simon and Schuster, 1995.

Tsutomu Shimomura and John Markoff, Take-Down: The Pursuit and Capture of Kevin Mitnick,  New York: Hyperion, 1996.

Clifford Stoll, The Cuckoo’s Egg
Clifford Stoll, High-Tech Heretic

United States v. Morris
United States v. Alkhabaz
Arizona v. Evans

SOCIETIES and Organizations



Web Surfer's Caveat: These are class notes, intended to comment on readings and amplify class discussion. They should be read as such. They are not intended for publication or general distribution.                @copyright 2006 Philip A. Pecorino                       

Last updated 8-2006                                                              Return to Table of Contents