IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

The Ethics of Hacking and Computer Abuse: Australian Case Studies

The Ethics of Hacking and Computer Abuse: Australian Case Studies
View Sample PDF
Author(s): Matthew Warren (Deakin University, Australia)and Shona Leitch (Deakin University, Australia)
Copyright: 2005
Pages: 15
Source title: Electronic Monitoring in the Workplace: Controversies and Solutions
Source Author(s)/Editor(s): John Weckert (Charles Sturt University, Australia)
DOI: 10.4018/978-1-59140-456-9.ch003

Purchase

View The Ethics of Hacking and Computer Abuse: Australian Case Studies on the publisher's website for pricing and purchasing information.

Abstract

Organisations spend large sums of money to ensure that they are protected against the risks associated with external threats. The perceived threats against organisations are well known, and the losses can be quantifiable. The perceived threat considered here is that associated with hackers. Much is known about hackers, their rationale, and their ethical views. However, it is harder to quantify what computer abuse is and what the associated losses are. This chapter focuses on hackers, computer abuse, and ethical issues.

Related Content

Isik Cicek. © 2024. 23 pages.
Oluwabunmi Bakare-Fatungase, Sudetu Oseni. © 2024. 24 pages.
Iris-Panagiota Efthymiou. © 2024. 21 pages.
Thanuja Rathakrishnan, Thivashini B. Jaya Kumar, Feranita Feranita, Woon Leong Lin. © 2024. 29 pages.
Tobias D. Herbst, J. Piet Hausberg. © 2024. 28 pages.
Ozlem Erdas Cicek. © 2024. 18 pages.
Ayse Asli Yilmaz. © 2024. 20 pages.
Body Bottom