Here is the synopsis of our sample research paper on White Collar Crime On The Internet. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
14 pages in length. The marvel of modern technology has created a society submerged in a sea of speed, convenience and instant gratification. The downside to such technological advancement comes in the form of white-collar crimes, inasmuch as the Internet is a highly vulnerable entity. The writer discusses the issues of system security
as it relates to Internet white-collar crime. Bibliography lists 13 sources.
Page Count:
14 pages (~225 words per page)
File: LM1_TLCcrime.doc
Buy This Term Paper »
 
Unformatted sample text from the term paper:
well-tested protective measures. That hackers can readily infiltrate any given companys entire computer system with the intent to destroy data or embezzle funds is more than enough reason to
augment security measures. "The extent of imposing security measures to protect networks has to be within practical limits and it has to commensurate with the risks involved. After
all, security is a trade-off between controls and convenience" (Thomas PG). Laws that exist for Internet white collar crimes incorporate all the necessary
protections in order for users to be safeguarded against cons or otherwise illegitimate business practices. "The Internet has a much bigger role to play in telecommunications in the future,
although many issues will impact the pace and manner of its development" (Dadd 14). If an individual is found to have violated the particular laws that have been established
as a means by which to regulate system security, there becomes no differentiation between tangible crimes and virtual crimes with regard to punishment. Not only do Internet perpetrators face
considerable regulatory fines but if the crime is ultimately found to be a felony, they also stand to serve jail time, as well. "Congress passed the Telecommunications Act of
1996, but it is up to the FCC to interpret the law and establish the rules for how the law will be implemented" (Fletcher 62). I. FIREWALLS
Intranet-based applications utilize two distinct methods for entry into the site, both of which employ the practice of firewalls: an isolating server system that effectively
keeps the populace from entering. Creating the web site on an internal network is one way to keep certain people from gaining access; authorization is yet another way to
...