Computers, Information Technology, the Internet, Ethics, Society and Human Values
Philip Pecorino, Ph.D.
Queensborough Community College, CUNY
Chapter 8 Crime and Misbehavior
Readings on Computer Crime MIT Open Source
Crime and Puzzlement: Desperados of the DataSphere John Perry Barlow,
"Cyberstalking: A New Challenge for Law Enforcement and Industry,"
U.S. Dept. of Justice
Parasitic Computing? Albert-Laszlo Baraba si, Vincent W. Freeh, Hawoong Jeong & Jay B. Brockman
"Ethical Web Agents" by David Eichmann
"The Hacker Crackdown: Law and Disorder on the Electronic Frontier," by Bruce Sterling
Concerning Hackers Who Break into Computer Systems by Dorothy E.
"Netizens: On the History and Impact of Usenet and the Internet" by Michael Hauben and Ronda Hauben
"The Power of Google," by Christina Buu-Hoan
"Toward an Ethics and Etiquette for Electronic Mail", by Norman Z. Shapiro and Robert H. Anderson
Web Spoofing: An Internet Con Game, by Edward W. Felten, Dirk Balfanz, Drew Dean, and Dan S. Wallach
Essay on computer viruses and worms, Dr. R. Standler,PhD (Physics, 1977), Attorney Specializing in Computer Law
Essay that surveys computer crime:Dr. R. Standler,
Practical hints for users on how to avoid computer crime: Dr. R. Standler,
Essay on how to recognize hoaxes about computer viruses Dr. R. Standler,
US Department of Justice Computer Crime and Intellectual Property Section.
A connection to the National Fraud Information Center provides not only information aboutFraud, but also connections to other useful sites.
Computer Security Technology Center, Lawrence Livermore National Laboratory.
CERT Coordination Center, SEI, CMU
Computer Crimes Laws
Virginia COMPUTER CRIMES Act -- 1984.
Wisconsin State Computer Crime Law -- 1981.
Internet Law Library The U.S. House of Representatives
Hong Kong (1995). Computer Crime is viewed differently in different countries:
Peter J. Denning (editor), Computers Under Attack: Intruders, Worms, and Viruses, Reading, MA: Addison-Wesley, 1990.
Katie Hafner and John Markoff, Cyberpunk: Outlaws and Hackers on the Computer Frontier, New York: Simon and Schuster, 1995.
Tsutomu Shimomura and John Markoff, Take-Down: The Pursuit and Capture of Kevin Mitnick, New York: Hyperion, 1996.
Stoll, The Cuckoo’s Egg
United States v. Morris
SOCIETIES and Organizations
Web Surfer's Caveat: These are class notes, intended to comment on readings and amplify class discussion. They should be read as such. They are not intended for publication or general distribution. email@example.com @copyright 2006 Philip A. Pecorino
Last updated 8-2006 Return to Table of Contents