Computer misuse and the law
Pages 282 - 291
Abstract
In parallel with increases in computer use for all kinds of functions in business and commerce, there has been an increase in computer crime. While the Law Commission's recent working paper on computer misuse addressed several important issues, it came to the conclusion that existing laws were sufficient to deal with rising crime in this area. This paper examines the Commission's main arguments and reveals some of the conundrums which they had to deal with because of the new technology. The authors argue that the new technology does challenge the effectiveness of current laws, several of which were drafted before computing became prevalent, and that victims of computer misuse should receive additional protection under the law.
References
[1]
Computer misuse. In: Working Paper No. 110, HMSO, London.
[2]
Survival of the fittest. Accountancy. 2
[3]
Criminal damage and the computerised saw. New Law Journal. v136. 763
[4]
Criminal damage and the computerised saw. New Law Journal. v136. 763
[5]
The law-making process. 1985. Weidenfeld and Nicholson, London.
[6]
Computer abuse and the law. Law Quarterley Review. v104. 202
[7]
Criminal damage and the computerised saw. New Law Journal. v136. 763
[8]
How a hacking law could weaken security. The Times.
[9]
How a hacking law could weaken security. The Times.
[10]
How a hacking law could weaken security. The Times.
[11]
Hacking ¿ the unauthorised access of computer systems: The legal implications. The Modern Law Review. v52.
[12]
Hacking ¿ the unauthorised access of computer systems: The legal implications. The Modern Law Review. v52.
[13]
Computer misuse. In: Working Paper No. 110, HMSO, London.
[14]
Computer misuse. In: Working Paper No. 110, HMSO, London.
[15]
Computer misuse. In: Working Paper No. 110, HMSO, London.
[16]
Computer misuse. In: Working Paper No. 110, HMSO, London.
[17]
Computer misuse. In: Working Paper No. 110, HMSO, London.
[18]
You can't hack from prison. The Computer Bulletin.
[19]
How a hacking law could weaken security. The Times.
[20]
How a hacking law could weaken security. The Times.
[21]
You can't hack from prison. The Computer Bulletin.
[22]
Survival of the fittest. Accountancy. 2
[23]
Who's killing you softly?. Accountancy Age.
[24]
Ghost in the machine. Investors Chronicle. v26.
[25]
Ghost in the machine. Investors Chronicle. v26.
[26]
The data bandits. 1989.
[27]
Ghost in the machine. Investors Chronicle. v26.
- Computer misuse and the law
Recommendations
Computer misuse and misconduct in public office
CRIME AND CRIMINAL JUSTICEA number of recent prosecutions against police officers for misuse of confidential material are considered. They show that the Crown Prosecution Service is relying in more serious cases on the offence of misconduct in public office rather than ...
Comments
Information & Contributors
Information
Published In
Copyright © © 1991.
Publisher
Elsevier Science Publishers B. V.
Netherlands
Publication History
Published: 01 December 1991
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Reflects downloads up to 10 Feb 2025