computer underground

Title: computer underground
Category: /Science & Technology
Details: Words: 8362 | Pages: 30 (approximately 235 words/page)
computer underground
The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence of home computers has been accompanied by corresponding social problems involving the activities of so-called "computer hackers," or better referred to as the computer underground (CU). The CU is composed of computer aficionados who stay on the fringes of legality. The CU is composed of relatively intelligent people, in contrast to the media's description …showed first 75 words of 8362 total…
You are viewing only a small portion of the paper.
Please login or register to access the full copy.
…showed last 75 words of 8362 total…Crime Laws." Criminology 26:101-126. Levy, Steven. 1984. Hackers: Heroes of the Computer Revolution. New York: Dell Publishing. Message Logs from a variety of computer underground bulletin board systems, 1988-1989. NBC-TV. 1988. Hour Magazine. November 2, 1988. Bill Landreth, 1985, Outside the Inner Circle. Microsoft publishing Parker, Donn B. 1983. Fighting Computer Crime. New York: Charles Scribner's Sons. Rosenbaum, Ron. 1971. "Secrets of the Little Blue Box ." Esquire October, pp. 116-125. Small, David. 1988. Personal communication to Gordon Meyer. WGN-Radio. 1988. Ed Schwartz Show. September 27, 1988.

Need a custom written paper?
Buy a custom written essay and get 20% OFF the first order