Law and Technology at Crossroads in Cyberspace: Where Do We Go From Here?

Law and Technology at Crossroads in Cyberspace: Where Do We Go From Here?

Anteneh Ayanso (Brock University, Canada) and Tejaswini Herath (Brock University, Canada)
DOI: 10.4018/978-1-61350-132-0.ch004
OnDemand PDF Download:
No Current Special Offers


Historical incidents have taught organizations several key lessons on computer crimes. The complexity of the current technology environment dictates that no one mechanism can effectively address computer crimes. Investing in the most sophisticated counter-technologies alone is not enough to fight cyber threats. Thus it has become increasingly important for organizations and governments to establish control frameworks that incorporate proactive measures in the technological, legislative, and administrative dimensions. While it is government’s role to keep up with the legislative rules, organizations need to have the right security policies and guidelines in place as well as develop awareness in the legal front to combat computer crimes. With the review of the academic literature, industry reports, and the media, this chapter identifies various kinds of computer crimes and discusses the counter strategies to tackle such crimes in the legal, technological, and organizational dimensions.
Chapter Preview

Computer Crime: An Overview

The term computer crime has been given several labels, such as cybercrime, e-crime, hi-tech crime, electronic crime, etc. Today there are a variety of computer crimes at different scopes and contexts, and there is a lack of standardized classifications or definitions for many of the activities that could be considered illegal. Computer crime brings tremendous harm to both the public and organizations. For individuals, computer crimes can attack privacy, identity, and personal property. For the public and government, computer crimes can destroy infrastructure and administrative systems and can threaten national security.

Complete Chapter List

Search this Book: