Examines the damaging effects that malicious computer abuse, such as hacking and viruses, can have on the development of an information‐based society. Computing and telecommunications technologies are a key ingredient in the realization of this society, but are increasingly the targets of criminals and mischief makers. Highlights the apparent escalation in computer‐abuse incidents, as illustrated by a number of recent surveys, and examines the effects that these may have on the public perception of technology (and, hence, the smooth transition to the information society). Also presents some broad recommendations regarding what can be done to address the problem. This considers both technical measures to help safeguard systems and revised attitudes to computer abuse, to insure that incidents can be dealt with more effectively.
Article navigation
1 March 1997
Research Article|
March 01 1997
Computer abuse: vandalizing the information society Available to Purchase
Steven M. Furnell;
Steven M. Furnell
Research Fellow with Network Research Group, University of Plymouth, UK. Matthew J. Warren is a Lecturer at Plymouth Business School, University of Plymouth, UK
Search for other works by this author on:
Matthew J. Warren
Matthew J. Warren
Lecturer at Plymouth Business School, University of Plymouth, UK
Search for other works by this author on:
Publisher: Emerald Publishing
Online ISSN: 2054-5657
Print ISSN: 1066-2243
© MCB UP Limited
1997
Internet Research (1997) 7 (1): 61–66.
Citation
Furnell SM, Warren MJ (1997), "Computer abuse: vandalizing the information society". Internet Research, Vol. 7 No. 1 pp. 61–66, doi: https://doi.org/10.1108/10662249710159872
Download citation file:
Suggested Reading
Computer intrusions and attacks
The Electronic Library (April,1999)
Inadequate security encourages the thief
Industrial Management & Data Systems (March,1995)
Legal control of computer crime in Hong Kong
Information Management & Computer Security (May,1995)
Networks security measures using neuro‐fuzzy agents
Information Management & Computer Security (March,2003)
Internet commentary
Microelectronics International (August,2002)
Related Chapters
The Crypto Investing Landscape
The Emerald Handbook on Cryptoassets: Investment Opportunities and Challenges
Societal Entrepreneurship and Competitiveness
Societal Entrepreneurship and Competitiveness
Societal Role Expectations of Management Accounting Professionals: An Australian Study
Advances in Management Accounting
Recommended for you
These recommendations are informed by your reading behaviors and indicated interests.
