computer

THREE CRITICALLY IMPORTANT QUESTIONS REGARDING------- "computer crimes, hackers, crackers, and ethics: how is computing and information-technology crime different or not different from "normal" crime?"

Computer crime can be committed from sites extremely removed from the victims.

Since this is not my area of expertise, I searched Google under the key words "computer crime" to get these possible sources:

http://www.rbs2.com/ccrime.htm
http://www.crime-research.org/
http://en.wikipedia.org/wiki/Computer_crime
http://www.qlinks.net/quicklinks/comcrime.htm

You can do similar searches for your other key words. I hope this helps. Thanks for asking.

  1. 👍 0
  2. 👎 0
  3. 👁 173
asked by Gurv

Respond to this Question

First Name

Your Response

Similar Questions

  1. Computer -- I don't understand the assignment

    THREE CRITICALLY IMPORTANT QUESTIONS REGARDING------- "computer crimes, hackers, crackers, and ethics: how is computing and information-technology crime different or not different from "normal" crime?"

    asked by Gurv on November 26, 2006
  2. sociology

    Who are hackers. What can we do to protect from them. Check this site for information about hackers. http://en.wikipedia.org/wiki/Hacker You can try to protect your computer from hackers by installing a firewll.

    asked by Singh on November 19, 2006
  3. Buisness

    1. How does Zune HD relate to information technology? 2. How does it improve upon an existing technology? 3.Why is it important for student or buisness and computer students to know abbout this technology?

    asked by Sunnikid on October 11, 2009
  4. ethics

    Are hackers ethically wrong? What should we do about hackers? I think we should protect ourselves from hackers. What do you think? your suggestions? Yes. Hackers are ethically wrong. They are intruding into and disrupting a

    asked by Gurv on November 19, 2006
  5. Health Research Project

    I have a research paper where I need to write a paragraph answering each question. The instructions are to go to the American Medical Assocation's web site at ama-assn and use the search button on the upper right to look for

    asked by Anonymous on November 12, 2008
  6. Research Project on Computer Confidentiality

    I have a research paper where I need to write a paragraph answering each question. The instructions are to go to the American Medical Assocation's web site at ama-assn and use the search button on the upper right to look for

    asked by A on November 12, 2008
  7. English

    Let's write down what you can do with the computer. 1. I use the computer to chat with netizens in chatrooms. 2. I use the computer to do paper work. 3. I use the computer to make documents with the word processor, Excel. 4. I use

    asked by rfvv on April 10, 2010
  8. management

    Explain how each one of the following factors impact the four functions of management. In your explanation include specific examples of these impacts: 1) Globalization- 2) Technology- 3) Innovation- 4) Diversity- 5) Ethics- The

    asked by patiance on September 30, 2010
  9. Ethics

    Are hackers ethically wrong? i know they are but just asking for your opinion. Why they hack There many different reasons, for many different hackers. Some do it to see if they can beat security protocalls, like a game. Some do it

    asked by Gurv on November 19, 2006
  10. Career Exploration

    Information Technology Quiz 1. Computer user support is another name for: a. customer service b. technical support*** c. network support d. information security 2. Digital designers need what kind of skills? a. network

    asked by ChichipoTae on April 12, 2019

More Similar Questions