Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Computer misuse and the law

Published: 01 December 1991 Publication History

Abstract

In parallel with increases in computer use for all kinds of functions in business and commerce, there has been an increase in computer crime. While the Law Commission's recent working paper on computer misuse addressed several important issues, it came to the conclusion that existing laws were sufficient to deal with rising crime in this area. This paper examines the Commission's main arguments and reveals some of the conundrums which they had to deal with because of the new technology. The authors argue that the new technology does challenge the effectiveness of current laws, several of which were drafted before computing became prevalent, and that victims of computer misuse should receive additional protection under the law.

References

[1]
Computer misuse. In: Working Paper No. 110, HMSO, London.
[2]
Survival of the fittest. Accountancy. 2
[3]
Criminal damage and the computerised saw. New Law Journal. v136. 763
[4]
Criminal damage and the computerised saw. New Law Journal. v136. 763
[5]
The law-making process. 1985. Weidenfeld and Nicholson, London.
[6]
Computer abuse and the law. Law Quarterley Review. v104. 202
[7]
Criminal damage and the computerised saw. New Law Journal. v136. 763
[8]
How a hacking law could weaken security. The Times.
[9]
How a hacking law could weaken security. The Times.
[10]
How a hacking law could weaken security. The Times.
[11]
Hacking ¿ the unauthorised access of computer systems: The legal implications. The Modern Law Review. v52.
[12]
Hacking ¿ the unauthorised access of computer systems: The legal implications. The Modern Law Review. v52.
[13]
Computer misuse. In: Working Paper No. 110, HMSO, London.
[14]
Computer misuse. In: Working Paper No. 110, HMSO, London.
[15]
Computer misuse. In: Working Paper No. 110, HMSO, London.
[16]
Computer misuse. In: Working Paper No. 110, HMSO, London.
[17]
Computer misuse. In: Working Paper No. 110, HMSO, London.
[18]
You can't hack from prison. The Computer Bulletin.
[19]
How a hacking law could weaken security. The Times.
[20]
How a hacking law could weaken security. The Times.
[21]
You can't hack from prison. The Computer Bulletin.
[22]
Survival of the fittest. Accountancy. 2
[23]
Who's killing you softly?. Accountancy Age.
[24]
Ghost in the machine. Investors Chronicle. v26.
[25]
Ghost in the machine. Investors Chronicle. v26.
[26]
The data bandits. 1989.
[27]
Ghost in the machine. Investors Chronicle. v26.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image International Journal of Information Management: The Journal for Information Professionals
International Journal of Information Management: The Journal for Information Professionals  Volume 11, Issue 4
December, 1991
65 pages

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 01 December 1991

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Feb 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media