In fourteen pages this paper examines white collar crime with the focus being on the Internet's security system issues. Thirteen sources are cited in the bibliography.
Name of Research Paper File: LM1_TLCcrime.doc
Unformatted Sample Text from the Research Paper:
well-tested protective measures. That hackers can readily infiltrate any given companys entire computer system with the intent to destroy data or embezzle funds is more than enough reason to
augment security measures. "The extent of imposing security measures to protect networks has to be within practical limits and it has to commensurate with the risks involved. After
all, security is a trade-off between controls and convenience" (Thomas PG). Laws that exist for Internet white collar crimes incorporate all the necessary
protections in order for users to be safeguarded against cons or otherwise illegitimate business practices. "The Internet has a much bigger role to play in telecommunications in the future,
although many issues will impact the pace and manner of its development" (Dadd 14). If an individual is found to have violated the particular laws that have been established
as a means by which to regulate system security, there becomes no differentiation between tangible crimes and virtual crimes with regard to punishment. Not only do Internet perpetrators face
considerable regulatory fines but if the crime is ultimately found to be a felony, they also stand to serve jail time, as well. "Congress passed the Telecommunications Act of
1996, but it is up to the FCC to interpret the law and establish the rules for how the law will be implemented" (Fletcher 62). I. FIREWALLS
Intranet-based applications utilize two distinct methods for entry into the site, both of which employ the practice of firewalls: an isolating server system that effectively
keeps the populace from entering. Creating the web site on an internal network is one way to keep certain people from gaining access; authorization is yet another way to