computer underground
Title: computer underground
Category: /Science & Technology
Details: Words: 8362 | Pages: 30 (approximately 235 words/page)
computer underground
Category: /Science & Technology
Details: Words: 8362 | Pages: 30 (approximately 235 words/page)
The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence of home computers has been accompanied by corresponding social problems involving the activities of so-called "computer hackers," or better referred to as the computer underground (CU). The CU is composed of computer aficionados who stay on the fringes of legality. The CU is composed of relatively intelligent people, in contrast to the media's description
showed first 75 words of 8362 total
You are viewing only a small portion of the paper.
Please login or register to access the full copy.
Please login or register to access the full copy.
showed last 75 words of 8362 total
Crime Laws." Criminology 26:101-126.
Levy, Steven. 1984. Hackers: Heroes of the Computer Revolution. New York: Dell Publishing.
Message Logs from a variety of computer underground bulletin board systems, 1988-1989.
NBC-TV. 1988. Hour Magazine. November 2, 1988.
Bill Landreth, 1985, Outside the Inner Circle. Microsoft publishing
Parker, Donn B. 1983. Fighting Computer Crime. New York: Charles Scribner's Sons.
Rosenbaum, Ron. 1971. "Secrets of the Little Blue Box ." Esquire October, pp. 116-125.
Small, David. 1988. Personal communication to Gordon Meyer.
WGN-Radio. 1988. Ed Schwartz Show. September 27, 1988.