Реферат по предмету "Иностранный язык"


The Future Of Computer Crime In America

Essay, Research Paper

The Future of Computer Crime in America

Sociology Research Paper

Sociology per. #2

10/8/96

Sociology Topics:

Future Society

Social Change

Social and Enviromental Issues

Deviant Behavior

Crime/Corrections

Name: Brandon Robinson

Period: # 2

The proliferation of home computers, and of home computers equipped with

modems, has brought about a major transformation in the way American society

communicates, interacts, and receives information. All of these changes being

popularized by the media and the wide increased personal and private sector use

of the Internet. All of these factors plus the fact of more and more business

and government institutions are jumping to make the use of these services has

put a much wider range of information at the finger tips of those, often select

and few individuals whom know how to access, understand and use these

information sources. Often times today this information is of a very sensitive

and private nature on anything from IRS Tax returns, to Top Secret NASA payload

launch information. Piled on top of that many times the individuals accessing

these information sources are doing so by illegal means and are often motivated

by deviant and illegal means. It is said that at any given time the average

American has his name on an active file in over 550 computer information

databases of which nearly 90% are online, and of the 550 databases the number

comes no where close to how many time your personal information is listed in

some database in an unactive file. The “Average American” could simply sit in

his/her home doing nearly nothing all day long and still have his/her name go

through over 1,000 computers a day.

All of these vast information files all hold the crucial ones and zero’s

of data that make up your life as you and all others know it. All of these data

bits, at the hands 100,000’s of people. With little or NO central control or

regulatory agency to oversee the safe handling of your precious little ones and

zero’s of information. As it would seem Arson Wells was little late with his

title of “1984″ . “BIG BROTHER” is INDEED WATCHING, US ALL and as it would seem

our BIG BROTHER is alot bigger then Mr. Wells could have ever imagined. And that

our BIG BROTHER is EVERYWHERE! The 100,000’s of people that do have this

information make up our modern BIG BROTHER in the form of government

institutions to private advertising companies, these people are all the

“trusted” ones who use our information everyday for legal and useful purposes

but what about the others who use their skills and and knowledge to gain their

“own” personal and illegal access to these vast depositories of information?

These individuals popularized and demonized by the media are often referred to

as “Hackers” or “One who obtains unauthorized if not illegal, access to computer

data systems and or networks.” or the media definition “maladjusted losers

forming “high-tech street gangs that are dangerous to society” (Chicago Tribune,

1989) Which ever one is best fitted they are indeed becoming a very serious

issue and worry to some in our ever and constantly changing American Techno

Society. Because of the serious delection by our elected representatives whom

have valiantly once again failed to keep up with the ever changing times, there

is if any major or clear and easy to understand “CONSTITUTIONAL” (The recent 3

to 1 over turn of the not only controversial but deemed UNconstituional law

culled the Communications Decency Act”) laws as to the governing of the vastly

wild and uncharted realms of cyberspace. The flagrant and serious if not

slightly laughable attempts of our technologically illiterate and ignorant

masses of elected officials. Sends a clear S.O.S. message to the future

generations of America to not only LOCK you PHYSICAL DOORS but also LOCK and

double LOCK all or your COMPUTER DOORS as well. In order for this society to

evolve efficiently with our ever changing technology rate. We as the masses are

going to have to keep abreast with the current events that are lurking out in

the depths of cyberspace. Before we, as a result of our inability to adapt and

our arrogance and ignorance, are all products of our own technological over

indulgence. So to avoid the tragic and ending collision of our own self

manufactured technological self-destruction and the break-down of our society,

in every tangible aspect, as we know of it today.

I believe that in the future we are headed towards you will see our

society divided into Two major parts 1.) Those whom pose the knowledge and

capability to obtain the knowledge/information i.e.. the “LITERATE” and 2.)

Those who don’t pose the skills necessary to obtain that crucial

knowledge/information, i.e.. the “ROAD KILL” Because in the future, the power

structure will not be decided by who has the most guns or missiles or weapons

but the powers structure will be made up of little tiny ones and zero’s, bits of

data giving to those whom ever poses the power of the knowledge and the power to

manipulate who has that knowledge. The “rich” and “elitist” will be the

knowledge posers and givers and the “poor” will be those with the lack of

knowledge. Knowledge will bring power and wealth and the lack of will

bring…..well the lack of power, wealth and knowledge.

Sources

1.Thesis by Gordon R. Meyer “The Social Organization of the Computer

Underground”

2.2600 Magazine The Hacker Quarterly

3.The Codex Magazine Monthly Security and Technical Update.

4.Secrets of a Super Hacker by the Knightmare

5.Personal Knowledge, Brandon Robinson




Не сдавайте скачаную работу преподавателю!
Данный реферат Вы можете использовать для подготовки курсовых проектов.

Поделись с друзьями, за репост + 100 мильонов к студенческой карме :

Пишем реферат самостоятельно:
! Как писать рефераты
Практические рекомендации по написанию студенческих рефератов.
! План реферата Краткий список разделов, отражающий структура и порядок работы над будующим рефератом.
! Введение реферата Вводная часть работы, в которой отражается цель и обозначается список задач.
! Заключение реферата В заключении подводятся итоги, описывается была ли достигнута поставленная цель, каковы результаты.
! Оформление рефератов Методические рекомендации по грамотному оформлению работы по ГОСТ.

Читайте также:
Виды рефератов Какими бывают рефераты по своему назначению и структуре.

Сейчас смотрят :

Реферат Проект строительства цеха по производству мебели, оконных и дверных блоков
Реферат Туркменская литература
Реферат Происхождение и развитие галактики
Реферат Черви-паразиты
Реферат История болезни - Инфекционные болезни (острый гепатит В)
Реферат Креативность в структуре педагогической деятельности
Реферат Системы счисления
Реферат Фінансовий механізм підприємства
Реферат Решение размерных цепей методом полной взаимозаменяемости Характеристика эскизы
Реферат Виды корнеплодов. Пищевые приправы
Реферат Буржуазные революции в Италии 1820 – 1821 годов
Реферат «Об итогах деятельности сельскохозяйственных потребительских кооперативов и организаций потребительской кооперации в 2011 году и перспективах развития на 2012 год»
Реферат ANIMAL FARMBy George Orwell Essay Research Paper
Реферат А. М. Поповський, доктор філологічних наук, професор (Дніпропетровська юридична академія мвс україни)
Реферат Аттестационная работа медсестры приемного отделения