Facebook Pixel Code
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Internet Governance and Jurisdiction

This is a preview of the 11-page document
Read full text

Government involvement is essential to coordinate and assist with the international aspects of Computer-crime, to facilitate standardized security protocols and unfair practices over the Internet, and to prosecute persons who commit the acts legislatures deem harmful enough to make criminal. (Yang & Hoffstadt, 2006, p. 213)There is also a certain early Computer "ethic" among hackers that must be noted here. This includes such principles as the right for everyone to have access to computers and that this access should be unlimited and total; all information should be free and available. Furthermore, the original hanker ethic did not consider unauthorized access without malicious intent to be unethical (Wible, 2003).

This, unfortunately, is no longer the case but can be used to aid in the prevention of the deliberate malevolent intent of the current Computer criminals. In Wible's article, A Site Where Hackers Are Welcome: Using Hack-In Contests to Shape Preferences and Deter Computer Crime, he presents the idea of companies arranging contest for hackers to break into their systems, with stringent guidelines, of course, to help them prevent, detect and circumvent any future attacks by Computer criminals (2003).

Identity theft has been around for a very long time, long before the advent of the Internet and computers. It was still the theft or at least the copying of another person in order to substantiate yourself within a community. In modern times there are many levels and parameters that this crime can reveal itself. A sergeant with the Los Angeles County police department, Sunil Dutta, reveals some of these unique attributes as well as the fact that most of the perpetrators get away “ Scott-free. ” (2007, p.

290) Sergeant Dutta also reports that in certain cases the Identity Thief can commit crimes under the assumed identity, registering his own fingerprints in the stolen name, and the victim can be in very serious trouble.

This is a preview of the 11-page document
Open full text
Close ✕
Tracy Smith Editor&Proofreader
Expert in: Law, Psychology, Sociology
Hire an Editor
Matt Hamilton Writer
Expert in: Law, Social science, People
Hire a Writer
preview essay on Internet Governance and Jurisdiction
  • Pages: 11 (2750 words)
  • Document Type: Essay
  • Subject: Law
  • Level: Ph.D.
WE CAN HELP TO FIND AN ESSAYDidn't find an essay?

Please type your essay title, choose your document type, enter your email and we send you essay samples

Contact Us