Enron: Rise, Scandal, and the Legacy of Corporate Greed
-
Enron Corporation, once a giant in the energy industry, rose to prominence
through innovative strategies and rapid expansion, only to collapse under
the we...
In the emerging economy there is a new infrastructure, based on the internet, that is causing us to scrutinies most of our assumptions about the business. As a skin of networks - growing in ubiquity, robustness, bandwidth, and function - covers the skin of the planet, new models of how wealth is created are emerging.
Thursday, May 26, 2011
Computer Crime in E-Business
Cyber crime is becoming one of the Net’s growth businesses. Today criminals are doing everything from stealing intellectual property and committing fraud to unleashing viruses and committing acts of cyber terrorisms.
Computer crime is a growing threat to society caused by the criminal or irresponsible actions of individuals who are taking advantage of the widespread use and vulnerability of computers and Internet and other networks. It thus presents major challenges to the ethical use of information technologies.
Computer crime poses serious threats to the integrity, safety, and survival of most E-business systems, and thus makes the development of effective security methods a top priority. Computer crime is defined by the Association of Information Technology Professionals as including:
1. Unauthorized use, access, modification and destruction of hardware, software, data, or network resource
2. Unauthorized release of information
3. The unauthorized copying of software
4. Denying an end user access to his or her own hardware, software, data, or network resources
5. Using or conspiring to use computer or network resources to illegally obtain information or tangible property
This definition was promoted by the association in a Model Computer Crime Act, and is reflected in many computer crime laws.
Computer Crime in E-Business
The most popular articles
-
In today’s fast-paced business world, the intranet has become a vital asset for companies, offering a secure, centralized network accessible...
-
The essential E-commerce process is required for the successful operation and management of E-commerce activities. One of the processes is a...
-
Software for word processing has transformed the process of writing. Word processing packages computerize the creation, editing, revision ...
-
Best Intranet Tools for Enhancing Corporate Communication and Collaboration Microsoft SharePoint: Overview: A robust platform known for do...
-
Software Suites and Integrated Packages Software suite is the popular general-purpose application software. That’s because the most widely u...
My Blog List
-
-
Betalains: Nutritional Power and Natural Color in Vegetables - Betalains are a unique group of pigments that occur in certain plants, particularly within the Amaranthaceae family, which includes well-known vegetables l...
-
The Spanish Civil War: Ideological Clash and Lasting Legacy - The Spanish Civil War (1936-1939) was a devastating conflict that pitted two ideologically opposed factions—the Republicans, loyal to the Spanish Republic,...