Free Essay

Computer Research

In:

Submitted By career55
Words 459
Pages 2
Research one federal computer-related act that was created to deal with online and computer crime. •Define the problem that faced the legislators and why they created the specific act. •Summary the act and how the act addresses the specific problem(s). •Analyze the act and give feedback if you believe the act is and will be effective for protecting consumers and citizens. Is it useful to law enforcement?
I did some research and found the Counterfeit Access Device and Computer Fraud and Abuse Act. The act was passed by Congress in 1984 and was the first federal computer crime legislation. The act was set in place to protect certain classified government information. Using a computer to cause damage to a computer systems hardware and software was considered to be a criminal offense. With this act in place, computer crimes continued to increase dramatically. Congress enacted the National Information Infrastructure Act of 1996. The act was title two of the Economic Espionage Act of 1996. The provisions of the original Computer Fraud and Abuse Act were strengthened and clarified because of the Act. Some lawmakers and commentators thought new legislation would be necessary for any new developments in technology being used to commit computer crimes. Congress also created the National Computer Crime Squad. It was created inside the FBI. The National Computer Crime Squad investigated over two hundred individual computer crime cases.
Law enforcement agencies and new legislations over the years have tried to control computer crimes. In 2002 a survey was conducted by the Computer Security Institute along with the San Francisco FBI. Ninety percent of the corporations and government agencies surveyed found holes in the security of their computers. Eighty percent suffered from a financial loss because of computer crimes. It was reported that companies suffered from a loss of about 445 million dollars in 2002. Year after year the people who commit computer crimes seem to be getting more confident in their ability to manipulate computers. No matter how many laws are set in place to stop hackers they will never stop trying gain access to people’s business or personal computers. Law enforcement agencies will always have trouble with computer crimes regardless of the laws that set in place. Those who are involved in computer crimes normally compete with each other to see who can gain the most access the fast. When people live in that type of world there really isn’t any law or punishment that will slow them down. If you the ability to sit in the comfort of your own home and commit a crime, there is not much anyone could do about what you do. The only thing law enforcement agencies can do is wait for you to make a mistake.

Similar Documents

Free Essay

Computers in Research

...The Computer in Research • Computers can be very valuable in conducting a literature research This is because of a computer device such a modem can access information stored remotely on databases; that is we can search databases containing information of psychological abstracts to obtain references relevant to our work. • Controlling aspects of an experiment can easily and efficiently carried out by programming instructions to your computer. Example: In can control specific intervals of a stimuli by means of slides; while advancing the slide projector it can also simultaneously control other functions in the laboratory such randomizing conditions in blocks or trials so that the stimuli can be presented in certain predetermined orders without the programmer changing the conditions manually. • Helpful if there are repetitive operations to be performed that the opportunity for human error is great. Example: It can repetitively record the time when a response is made and store it in a floppy disk or hard drive. Uses of Computers in Psychology • Computer networks for data gathering and analysis - The sharing of information among micro computers with mainframe networks over long distances. • Computer analysis on physiological events - Includes cardiac activity and electro oculographic changes • Computer as a research tool - Computer administered surveys; an automated laboratory • Computer Generated Speech and perception and production of synthetic speech • Human and...

Words: 459 - Pages: 2

Free Essay

Green Computer Research

...responsible use of computers and related resources and covers many potential areas of use. This research project was conducted by We Are Big Pharma, Inc. to learn more about green computing technologies and large corporate initiatives. Several green computing areas were researched and our findings are described below: Data center and overall energy efficiency Data centers are huge consumers of energy due to the electrical demands of the hardware components and the cooling systems that are required to maintain the optimal environment for the hardware. Largely because of the high cost of the energy required (estimated at $0.71 per hardware dollar by 2011), many companies are looking for ways to be more energy efficient. IBM expanded a data center in Boulder, Colorado and made the facility 45% more energy efficient than their typical data center. They used their own high-density computing systems with server and storage virtualization in conjunction with energy-efficient power and cooling systems (Brodkin, 2007). Disposal of electronic waste and recycling Electronic waste is a major concern to communities and countries around the world due to the volume of generated waste and the toxic components that may contaminate the ground, water, and impact workers in the waste facilities. Dell is a leader in the electronics recycling and responsible disposal. They have teamed with Goodwill Industries International, Inc. to responsible recycle any brand of unwanted computers or accessories at...

Words: 1367 - Pages: 6

Premium Essay

An Evolution of Computer Science Research

...version of this report is published as "Trends in Computer Science Research" Apirak Hoonlor, Boleslaw K. Szymanski and M. Zaki, Communications of the ACM, 56(10), Oct. 2013, pp.74-83 An Evolution of Computer Science Research∗ Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki, and James Thompson Abstract Over the past two decades, Computer Science (CS) has continued to grow as a research field. There are several studies that examine trends and emerging topics in CS research or the impact of papers on the field. In contrast, in this article, we take a closer look at the entire CS research in the past two decades by analyzing the data on publications in the ACM Digital Library and IEEE Xplore, and the grants awarded by the National Science Foundation (NSF). We identify trends, bursty topics, and interesting inter-relationships between NSF awards and CS publications, finding, for example, that if an uncommonly high frequency of a specific topic is observed in publications, the funding for this topic is usually increased. We also analyze CS researchers and communities, finding that only a small fraction of authors attribute their work to the same research area for a long period of time, reflecting for instance the emphasis on novelty (use of new keywords) and typical academic research teams (with core faculty and more rapid turnover of students and postdocs). Finally, our work highlights the dynamic research landscape in CS, with its focus constantly moving...

Words: 15250 - Pages: 61

Premium Essay

Research Methods In Computer Science

...A Report On “RESEARCH METHODS IN COMPUTER SCIENCE” Submitted by Nitish Ashok Shinde (5210) ME Comp- I 2nd shift Introduction Computer Science has proved its importance in various domains of science like natural sciences, social sciences, humanities and cultural science [1]. Computer science (CS) characterized as an empirical discipline, in which each new program can be seen as an experiment, the structure and behavior of which can be studied [2]. The term Information and Communication Technology (ICT) is analogous to Information Technology, but it stresses more on role of technologies like telecommunications, computers, software's, etc, which enable users to access, store, and manipulate information [3]. Research methods...

Words: 834 - Pages: 4

Premium Essay

Wireless Computer Research

...Meraki White Paper: Wire ess LAN Security Version 1.0, March 2009 Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been difficult and time-consuming. This paper describes the security requirements for most companies and how Meraki can help them meet those challenges easily and at a low cost. Copyright © 2009 Meraki, Inc. All rights reserved. Trademarks Meraki® is a registered trademark of Meraki, Inc. www.meraki.com 660 Alabama St. San Francisco, California 94110 Phone: +1 415 632 5800 Fax: +1 415 632 5899 Table of Contents ( The Need For Sec rit" ###################################################################################################################### + ) What Doesn$t Work ######################################################################################################################### , * Recommended Sec rit" Architect res #############################################################################################- )!' Open with VPN !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! , )!( Shared Ke #WPA("PSK$ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! - )!) User Authentication #WPA("Enterprise$ !!!!!!!!!!!!...

Words: 2275 - Pages: 10

Free Essay

An Overview of Computer Viruses in a Research Environment

...An Overview of Computer Viruses in a Research Environment Matt Bishop Department of Mathematics and Computer Science Dartmouth College Hanover, NH 03755 ABSTRACT The threat of attack by computer viruses is in reality a very small part of a much more general threat, specifically attacks aimed at subverting computer security. This paper examines computer viruses as malicious logic in a research and development environment, relates them to various models of security and integrity, and examines current research techniques aimed at controlling the threats viruses in particular, and malicious logic in general, pose to computer systems. Finally, a brief examination of the vulnerabilities of research and development systems that malicious logic and computer viruses may exploit is undertaken. 1. Introduction A computer virus is a sequence of instructions that copies itself into other programs in such a way that executing the program also executes that sequence of instructions. Rarely has something seemingly so esoteric captured the imagination of so many people; magazines from Business Week to the New England Journal of Medicine [39][48][60][72][135], books [20][22][31][40][50][67][83][90][108][124], and newspaper articles [85][91][92][94][114][128] have discussed viruses, applying the name to various types of malicious programs. As a result, the term “computer virus” is often misunderstood. Worse, many who do understand it do not understand protection in computer systems, for example...

Words: 12539 - Pages: 51

Premium Essay

Open Problems in Computer Virus Research

...Skip to main content Open Problems in Computer Virus Research Steve R. White IBM Thomas J. Watson Research Center Yorktown Heights, NY USA Presented at Virus Bulletin Conference, Munich, Germany, October 1998 Abstract Over a decade of work on the computer virus problem has resulted in a number of useful scientific and technological achievements. The study of biological epidemiology has been extended to help us understand when and why computer viruses spread. Techniques have been developed to help us estimate the safety and effectiveness of anti-virus technology before it is deployed. Technology for dealing with known viruses has been very successful, and is being extended to deal with previously unknown viruses automatically. Yet there are still important research problems, the solution to any of which significantly improve our ability to deal with the virus problems of the near future. The goal of this paper is to encourage clever people to work on these problems. To this end, we examine several open research problems in the area of protection from computer viruses. For each problem, we review the work that has been done to date, and suggest possible approaches. There is clearly enough work, even in the near term, to keep researchers busy for quite a while. There is every reason to believe that, as software technology evolves over the next century or so, there will plenty of important and interesting new problems that must be solved in this field. Introduction ...

Words: 6039 - Pages: 25

Premium Essay

Unit 9 Research - Computer System Build

...John Doe ACME Computers 1234 Computer Dr City, CA 95555 November 29, 2014 John Smith CIO 1234 Computer Project Dr City, CA 95555 Dear John Smith: I have prepared the following bill of material for the computer hardware that you requested. The computers that I have assembled will provide the employees with ample computing power to keep them productive and quality components to reduce downtime. I was able to stay under your budget of $1,000.00 per machine, these come with Windows 7 Professional for ease of administration. However, all office productivity software will need to be installed upon delivery using your existing site license for the various software programs that the employees will need. OBJECTIVE I’ve assembled computers that cost under $1,000.00 each, including shipping costs. The computers use quality components from reputable manufactures. I’ve chosen AMD 3.9GHz processors w/ onboard graphics accelerator to reduce cost due to the fact that your employees will not require high end graphics rendering. This processor will provide years of reliable service and will not require upgrade as your software needs mature. I chose to provide 16GB of RAM to enhance the user experience during multitasking. I used two 8GB DIMMs with two open slots to provide for future upgrades when needed. The processor and chipset will support up to 64GB of memory if you should ever need that much. I used 10,000RPM, 500GB hard drives to provide quick access to files when your...

Words: 800 - Pages: 4

Premium Essay

Termpaperwarehouse.Com - Free Term Papers, Essays and Research Documents the Research Paper Factory Joinsearchbrowsesaved Papers Home Page » Computers and Technology Tablet in: Computers and Technology Tablet

...TermPaperWarehouse.com - Free Term Papers, Essays and Research Documents The Research Paper Factory JoinSearchBrowseSaved Papers Home Page » Computers and Technology Tablet In: Computers and Technology Tablet Tablet computer iPad (1st generation), a tablet computer A tablet computer, or simply tablet, is a mobile computer, larger than a mobile phone or personal digital assistant, integrated into a flat touch screen and primarily operated by touching the screen and instead of using a physical keyboard it often uses an onscreen virtual keyboard. A tablet computer may be connected to a keyboard with a wireless link or a USB port. Convertible notebook computers have an integrated keyboard that can be hidden by a swivel joint or slide joint, exposing only the screen for touch operation. Hybrids have a detachable keyboard so that the touch screen can be used as a stand-alone tablet. Booklets include dual-touchscreens, and can be used as a notebook by displaying a virtual keyboard in one of them. An early information tablet concept, named the Dynabook, was described by a Xerox scientist Alan C Kay, in his Aug 1972 paper: A Personal Computer for children of all Ages, the paper proposes a touch screen as a possible alternative means of input for the device. The first commercial portable electronic tablets appeared at the end of the 20th century. In 2010, Apple Inc. released the iPad which became the first mobile computer tablet to achieve worldwide commercial success. The...

Words: 358 - Pages: 2

Premium Essay

Research Paper in Computer

...UNIVERSIDAD DE ZAMBOANGA School of Education, Arts and Sciences Zamboanga City SYLLABUS in NSTP (CWTS) Course Title: NSTP 1 (CWTS) Course Credit: 3 units Descriptive Title: National Service Training Program (Civic Welfare Training Service) Semester: First Semester, SY: 2014-2015 Curricular Year: First Year Degree: All 2-year courses and 4-year degrees Course Description: The Civic Welfare Training Service (CWTS) 1 as a component of the National Service Training Program (NSTP) is a course for the first year student both male and female designed to help them understand, appreciate and eventually live the basic concepts of Students Transformation and Enrichment for Truth (STET) with the end in view of empowering them of becoming an important resources in the nation building. Civic Welfare Training Service (CWTS) 1 is designed to encourage the youth to contribute to the improvement of the general welfare and the quality of life of the Filipino. CWTS requires students to carry out projects and activities in their assigned barangays or Government Organization (GO’s) and Non Government Organization (NGO). Particularly activities contributory to the general welfare and the betterment of life for the members of the community or the enhancement of its facilities especially those devoted to improving health, education, environment, safety, livelihood, entrepreneurships and morals of citizenry and other social welfare services. Course Requirement: ...

Words: 1204 - Pages: 5

Premium Essay

Research Computers and Comunications

...The Importance of Effective Communication Introduction People in organizations typically spend over 75% of their time in an interpersonal situation; thus it is no surprise to find that at the root of a large number of organizational problems is poor communications. Effective communication is an essential component of organizational success whether it is at the interpersonal, intergroup, intragroup, organizational, or external levels. In this chapter we will cover the basic process of communication and then we will cover some of the most difficult communication issues managers face-providing constructive and effective feedback and performance appraisal. The Communication Process Although all of us have been communicating with others since our infancy, the process of transmitting information from an individual (or group) to another is a very complex process with many sources of potential error. Consider the simple example: • Terry: "I won't make it to work again tomorrow; this pregnancy keeps me nausious and my doctor says I should probably be reduced to part time. • Boss: Terry, this is the third day you've missed and your appointments keep backing up; we have to cover for you and this is messing all of us up. In any communication at least some of the "meaning" lost in simple transmission of a message from the sender to the receiver. In many situations a lot of the true message is lost and the message that is heard is often far different than the...

Words: 2344 - Pages: 10

Free Essay

There Is No Hope of Doing Perfect Research

...accurate, complete and many others. To decide our answer firstly we have to think that, is any research ever been done with the assurance of absoluteness, that doesn’t need any alteration? So that the researcher can say that now there is no need to do more research as it is the last and final results. The answer is no. I don’t ever notice such circumstances in my whole life. On other side I have experienced many inventions by great researchers. They do their best to invent. Although they were thinking that they have invented the best thing, but after sometimes they bring some innovation in their own inventions. One example in my mind is of Apple, a multinational corporation. The corporation researcher does their best and introduces the I-Pod, a line of portable media players. Then they introduce I-Phone, I-Pad and so on. To quote this example here is to justify my agreement to the above said statement” There is no hope of doing perfect research”. This shows that although the researchers introduced I-Pod with this thinking that they have introduced the perfect technology available in media players industry, but after some time the creation was get old stuff, so there arise a need to refine the research and to do more research and after all these the researchers bring more innovation in their product. So this example helps us to decide that there is no hope of doing a perfect research. If researches have ever been perfect, then there will be no need of any development or improvement...

Words: 608 - Pages: 3

Free Essay

There Is No Hope of Doing Perfect Research

... There is no hope of doing perfect research Research involves search for information or systematic examination without established perceptions to create logic facts, resolve prevailing crises. It will therefore be a never ending process. One person will make a conclusion on a certain concept and another person will use that conclusion to start a new concept. Based on established definition, anticipating to conduct a perfect research is beyond expectations in various genres of study (Zafar, 2011, Para 3).Research contributes to a large part in inventing new principles and establishing a solution to a prevailing issue in a given study. Therefore, significance of research cannot be overlooked especially in a dynamic society characterized with uncertainty and need to resolve problems. This highlights the need to evaluate on the scope of research regarding a given genre of study According to Griffins who proposes that certainly there could be no hope for doing perfect research (Griffiths, 1998, p97).He argued that whatever researchers conducted in order to arrive at any solution are subject to change. However, in order to comprehensively evaluate on the argument by Griffiths considering research from its definition establishes an appropriate platform towards disagreeing or agreeing with the statement. The advancement of science and technology is the most without doubt dynamic in the world that goes along with research. The world we are leaving is growing...

Words: 635 - Pages: 3

Premium Essay

1. What Are the Effects of Using Technology in Reading Comprehension?

...and advocated a revolutionary philosophy in which technology was as seen as a fulfilling two major roles in education: (a) a heuristic role in which the presence of the computer was seen as a catalyst of emerging ideas and (b) an instrumental role in which the presence of the computer would carry ideas into a world larger than the research centres where they were incubated. When the Children’s Machine was published, Papert (1993) looked back over the decade since Mindstorms and asked question, “Why through a period when so much human activity has been revolutionized, have we not seen comparable change in the way we help children learn?” Technology’s exponentially increasing power, decreasing costs, portability and connectivity have gone beyond what it have been started. Yet, inside classrooms across the country, there is such a problem on how technology is being used for the enhancement of reading comprehension. It is not the unavailability particularly of computers but how they are being used in the classroom discussion. In teaching reading, technology is one of the available effective approaches. However, the use of technologies to enhance reading instruction is still its infancy. This reflects that the technological capabilities that are known to have potential in helping children to read, such as computer, have only become sufficiently affordable and available in widespread use. Even though it can support students, effective instruction needs to be interactive. This is Chapter...

Words: 1026 - Pages: 5

Premium Essay

Research Paper About a Research Paper

...Research Paper about a Research Paper Name place Professor 05/22/11 Research Paper about a Research Paper Research is a way to formulate questions and ideas used to solve a give problem using of all sorts of sources to collect information that would generate a solution. Research in the simplest form could be presented as; my computer keeps rebooting. The research focus could involve looking threw the internet to find web help that addresses the same issue or finding a business that specialize in computer repair by doing a query for computer repair from online in your area or looking threw the phone book. In this instance, someone has prepared both sources with the intention to help find the answer from documented information (Booth, Colomb & Williams, 2008). Over centuries information and been collected in libraries all the information desired. The information age yielding the internet that contains information collected by others for others to answer questions and develop new questions, and find answers. Research papers are also used as a primary form of learning that begins in elementary school and used all threw college and beyond. Carriers have been built for the purpose of conducting research and writing research papers by teachers, scientists, writers, historians, lawyers, engineers – list is goes on. Educators have established the fact that formal research can be a tool used for learning, thinking and understanding (Booth...

Words: 1673 - Pages: 7