Ethics in Information Technology, Fourth Edition: Computer and Internet Crime
Ethics in Information Technology, Fourth Edition: Computer and Internet Crime
Ethics in Information Technology, Fourth Edition: Computer and Internet Crime
Chapter 3
Computer and Internet Crime
Objectives
• As you read this chapter, consider the following
questions:
– What key trade-offs and ethical issues are
associated with the safeguarding of data and
information systems?
– Why has there been a dramatic increase in the
number of computer-related security incidents in
recent years?
– What are the most common types of computer
security attacks?
1. It must be intentional
2. It must be by technical means
3. The person involved is without any right to do the
interception
4. The transmission of computer data to, from, or
within a computer system is non-public
5. It must not fall in any exemption
An officer, employee, or agent of a service provider, whose facilities are used in the
transmission of communications, to intercept, disclose, or use that communication in the
normal course of his employment while engaged in any activity that is necessary to the
rendition of his service or to the protection of the rights or property of the service provider.