… computer crime, which has cost them millions of dollars.
According to Peter Lilley, author of Hacked, Attacked and Abused: Digital Crime Exposed, the business world is completely dependent on technology but many users are ignorant of the risks involved with it (p. 124). These risks include organized digital crime, cyber laundering, hacking, cracking, worms, denial of service attacks, viruses, web site defacement, unauthorized disclosure of confidential information, and many more. Countless companies have suffered severe reputation, legal and financial consequences due to computer crimes.
Security flaws on three things: lack of money, lack of training and lack of knowledge (Loundry …
… Pornography Law.
Cornwall, H. (1986). The Computer Hackers Handbook. Boston: Century.
Dern, David. (1994). The Internet Guide for New Users. New York: McGraw Hill.
Griffin, Linda and Plato, JoAnn. Child Pornography on the Internet. Retrieved from Internet on 2/26/03 at: http://lrs.ed.uiuc.edu/wp/crime-2002/child.htm.
Griffith, Dodd. (1990). The Computer Fraud and Abuse Act of 1986: A Measured Response to a Growing Problem. New York: Random House.
Lilley, Peter. (2003). Hacked, Attacked, Abused. London: Kogan Page.
Loundry, David. (2003). Computer Crime, Information Warfare & Economic Espionage. New York: Carolina Academic Press;
New York …