Computer Science Technical Reports
CS at VT

Positive Alternatives to Computer Misuse: A Report of the Proceedings of an ACM Panel on Hacking

Lee, John A. N. and Steier, Roz and Segal, Gerald (1986) Positive Alternatives to Computer Misuse: A Report of the Proceedings of an ACM Panel on Hacking. Technical Report TR-86-09, Computer Science, Virginia Polytechnic Institute and State University.

Full text available as:
PDF - Requires Adobe Acrobat Reader or other PDF viewer.
TR-86-09.pdf (3805217)

Abstract

If one believes press reports, the misuse of computers is rampant. The same the many other misuses have gone unreported as a result of the embarrassment and loss of image/integrity of those affected (as victims) and the belief that to expose misuses will lead to further problems and expense, as well as encourage copy-cat crimes. Much of the press coverage of computer misuse has centered on the younger members of computing community using inexpensive personal computer systems. The placement of powerful tools into the hands of adolescents without imposing the appropriate control would appear to be a contributing factor to their unfettered use of computers and communications systems. Such usage ranges from benign exploration of the powers of computational and communication systems, through the malicious use of those devices for personal aggrandisement, to the use of computers for distinctly criminal activities. At present there are no technological or ethical barriers that separate the explorer from the criminal; possibly the prospect of being able to perform more and more complex projects can innocently lead the benign learner into improper activities. Conversely the blame for breaches of security and the infiltration of personal, private systems, is sometimes placed on the backs of the owners of those systems for maintaining an attractive nuisance. Concern must also be expressed about the community-developing attractive nuisances of bulletin boards (BBS's), many of which are benign, but too many of which are used to extend the fringe area of illegality in exchanging pirated software, providing message systems for immoral or illegal purposes, and revealing cracks in governmental and commercial security.

Item Type:Departmental Technical Report
Subjects:Computer Science > Historical Collection(Till Dec 2001)
ID Code:16
Deposited By:User autouser
Deposited On:03 November 2005