• Research Paper on:
    Internet and White Collar Crime

    Number of Pages: 14

     

    Summary of the research paper:

    In fourteen pages this paper examines white collar crime with the focus being on the Internet's security system issues. Thirteen sources are cited in the bibliography.

    Name of Research Paper File: LM1_TLCcrime.doc

    Buy This Research Paper »

     

    Unformatted Sample Text from the Research Paper:
    well-tested protective measures. That hackers can readily infiltrate any given companys entire computer system with the intent to destroy data or embezzle funds is more than enough reason to  augment security measures. "The extent of imposing security measures to protect networks has to be within practical limits and it has to commensurate with the risks involved. After  all, security is a trade-off between controls and convenience" (Thomas PG). Laws that exist for Internet white collar crimes incorporate all the necessary  protections in order for users to be safeguarded against cons or otherwise illegitimate business practices. "The Internet has a much bigger role to play in telecommunications in the future,  although many issues will impact the pace and manner of its development" (Dadd 14). If an individual is found to have violated the particular laws that have been established  as a means by which to regulate system security, there becomes no differentiation between tangible crimes and virtual crimes with regard to punishment. Not only do Internet perpetrators face  considerable regulatory fines but if the crime is ultimately found to be a felony, they also stand to serve jail time, as well. "Congress passed the Telecommunications Act of  1996, but it is up to the FCC to interpret the law and establish the rules for how the law will be implemented" (Fletcher 62). I. FIREWALLS  Intranet-based applications utilize two distinct methods for entry into the site, both of which employ the practice of firewalls: an isolating server system that effectively  keeps the populace from entering. Creating the web site on an internal network is one way to keep certain people from gaining access; authorization is yet another way to 

    Back to Research Paper Results