Research Paper On Cybercrime And Security
Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.
This 8 page paper considers the increase in the use fo the internet and cybercrime and the way that the Computer Misuse Act 1990 may be used it dealing with different cybercrimes such as cyberobscenity, cybertrespass, cybertheft and cyberviolence which can include cyberstalking. The paper looks at what the Computer Misuse Act 1990 will cover and how it may be possible to improve the legislation and enforcement of the law concerning cybercrime. The paper is written with reference to UK law. The bibliography cites 12 sources.
Cyberspace Crimes and the Law
This 9 page paper examines cybercrime and how the law is involved. This paper argues that while the law is important, it is sufficient. The problem with catching the criminals who participate in this type of activity is that technology in law enforcement is not up to par. Research is provided to support the assumptions. Bibliography lists 8 sources.
Formation of Security Management Policy and Risk Management Effects
An 18 page paper discussing issues that need to be addressed when forming security risk management policy. The very essence of developing an effective security policy is dependent in great extent to the level of risk that exists. It has been demonstrated repeatedly that network and computer administrators face the threat of security breach each day. Building security is less predictable, particularly as groups of fanaticals place their energies into dreaming up increasingly grand plans for murdering innocents by the thousands. Those responsible for forming and implementing security management policy must be aware of the types of risk faced by the organization and then control for contributing factors. The paper discusses management of risks that are both physical and informational. Bibliography lists 17 sources.