Computers

335 total

Social Control of Cyberspace B. Pereyra Our nation's infrastructure is daily becoming much more of an abstract environment due to the use of organized cyber criminals hacking away at our super computer information systems. They are generating unpredictable challenges for law enforcement in discovering the unethical abuse on computer systems and a concentration on the young topic of cyber terrorism threatening our criminal justice system. Our law enforcement continues to invent newer me

Abstract A diffuse group of people often called hackers has been characterised as unethical, irresponsible, and a serious danger to society for actions related to breaking into computer systems. In this essay I try to construct a picture of what is and includes a computer crime as well as a portray of hackers, their concerns, and the way in which hacking takes place. What I intend to argue is that, in their majority, hackers are learners and explorers who want to help rather than cause dama

While employee monitoring by management is nothing new, electronic monitoring (EM), is a relatively new phenomenon. According to Vaught, EM can be described as the use of electronic instruments or devices such as radio, video, and computer systems to collect, store, analyze, and report individual or group actions or performance . EM has grown to be a worldwide feature of organizations. Firms use these systems to monitor employee s actions, and to make sure they are performing to their pote

CHOICE IN COMPUTER-MEDIATED ENVIRONMENTS Abstract In the last several years, the increased diffusion of computer and telecommunications technologies in businesses and homes has produced new ways for organizations to connect with their customers. These computer mediated environments (CMEs) such as the World Wide Web raise new research questions. In this paper, we examine the potential research issues associated with CMEs in five areas: (1) decision processes, (2) advertising and communicati

Hackers' Culture Abstract: In this paper I have discussed about hackers, who hackers really are. It discusses when the term was originally coined and who was it originally used to refer to. As time passed, and various technological developments were made, hackers changed from information-hungry nerds to cyber-criminals. Then I discuss how the connotation associated with hackers has changed and how it does not apply to all hackers. The hackers who are harmful to the society are the members of

Should this business update to Windows 2000 from Windows 98 for its office PCs? In the business world today, computers and the software applications that run on them basically control an well-organized business. Every major company is equipped with a computer, or network that connects through different branches throughout the firm. To keep up with the fastest technology that dominates the market is to be a sensible buyer. A system can be outdated in a matter of two years time. Therefore,

The Y2K problem affects almost every computer system in some way. Because of the age we live in, it is safe to assume that Society rely on computers to a large degree The problem started out innocently enough. Well intentioned programmers using two digits to represent the year instead of four. Using the full four digits would have expanded the date field by one third at a time when memory was very expensive. The practice continued to maintain compatibility with older systems and data. T

PROCESS BASED SECURITY, WHAT IS IT AND HOW IT WILL CHANGE YOUR COMPUTER’S LIFE This note is for the purpose of explaining a new way to implement operating system security called process-based security. First, an explanation of traditional operating system security is given. Next, an explanation of process-based security is given. Finally, there are presented three examples of failure on the part of traditional security with how process-based security would not have allowed such a p

The world of computers has changed dramatically over the past 25 years. Twenty-five years ago, most computers were centralized and managed in data centers. Computers were kept in locked rooms and links outside a site were unusual. Computer security threats were rare, and were basically concerned with insiders. These threats were well understood and dealt with using standard techniques: computers behind locked doors and accounting for all resources. Twenty-five years later, many systems are c

Compaq Computer Corporation was founded in February 1982 by Rod Canion, Jim Harris and Bill Murto, three senior managers who left Texas Instruments and invested $1,000 each to form their own company. Their first idea was a portable personal computer that was sketched on a paper placemat in a Houston pie shop. The founders presented their idea to Ben Rosen, president of Sevin Rosen Partners, a high-tech venture capital firm. The venture capitalists were impressed with the idea of a portable p