Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
The department has not yet decided if Mr. Morris will be prosecuted for violating more serious computer abuse statutes.
Robert Tappan Morris is the Oliver North of computer abuse.
Computer Abuse (SRI International, 1971)
If the human element is crucial to the execution of computer abuse, it follows that a strong, constructive personnel management policy can provide a very powerful internal control and deterrent.
(4) This statutory scheme will give us a better understanding of the scope of the computer crime problem by enabling more reliable statistics to be generated regarding computer abuse.
As such, according to the suit, the unauthorized data collection violates the federal Computer Abuse and Fraud Act and Electronic Communication Privacy Act.
Even now, most publications on computer abuse, audit and security emphasise the importance of input, output, access, software and processing controls (see ACCOUNTANCY, November, p 56).
This was followed by the US Federal Computer Fraud and Abuse Act in 1986, Australian amendments to their crimes acts in 1989 and the British Computer Abuse Act in 1990.
The youths, who were arrested for telephone fraud and computer abuse and are being held in jail here, belong to a shadowy culture of computer "hackers" committed to illegally entering - and frequently tampering with - the computer networks that American society has come to rely on.
Technical publications on computer abuse, security and auditing tend to focus on input, output, access, software and processing controls, while the media is all too often preoccupied with the potential threat posed by viruses and hackers (see ACCOUNTANCY, April, p 102, 103).
Production and use of rootkit and malware products for surveillance brings up issues regarding illegal wiretaps and violations of the Computer Abuse and Fraud act (by the way, this is possibly a secondary legal vector for those with Carrier IQ on their mobiles besides wiretapping laws).