Nobody downloaded yet

1) Adapting existing law to reflect the new realities of the Internet sometimes works and sometimes does not. By considering what we might consider Internet crimes which are directed against computers and computer related devices and telecommunicati - Essay Example

Comments (0) Cite this document
Summary
Most often, technological inventions and advancements occur, changing the way the internet was operating previously. Thus, it has become very difficult to predict what changes will happen…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful
1) Adapting existing law to reflect the new realities of the Internet sometimes works and sometimes does not. By considering what we might consider Internet crimes which are directed against computers and computer related devices and telecommunicati
Read TextPreview

Extract of sample "1) Adapting existing law to reflect the new realities of the Internet sometimes works and sometimes does not. By considering what we might consider Internet crimes which are directed against computers and computer related devices and telecommunicati"

Download file to see previous pages However, owing to the dynamic nature of the internet crimes targeting the computers and the information technology systems, the enacted cyber crime laws have fallen short of meeting the realities of the Internet and computer crimes (Guillaume 42). Thus such laws are associated with some aspects of strengths and weaknesses relating to curbing the computer and information technology attacks and crimes. In this respect, adapting existing laws to reflect the new realities of the Internet sometimes works and sometimes does not. Thus, this discussion seeks to analyze one of the existing cybercrime laws, to give an example of where it can be applied reasonably, and another example of where the law needs to be modified.
The Cybersecurity Act of 2009 - S.773 is one of the laws that have been established to reduce the risks that the computers and the communication technology networks within the USA are exposed to. According to section 2 of this law, titled findings, the failure of the USA to protect its cyber space is one of the urgent national security problems that are facing the country (Cybersecurity n.p.). In this respect, the law recommends various measures that should be taken to ensure that the government takes adequate measure to control the security threat. The measures are aimed at making the USA cyber space more secure and protected against the cyber security threats. One of such major recommendation that has been provided by the law is that, the president of the USA has the mandate to declare "cyber-emergency" (Kaplan n.p.).
This provision is meant to enable the president of the USA to shut down any, or all internet traffic, under a situation where it is determined that there is a cyber attack threat that has the potential to affect the USA adversely. Such situations include cyber attacks that target the country’s major information infrastructure and installations, as well as the Internet, computer ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“1) Adapting existing law to reflect the new realities of the Internet Essay”, n.d.)
1) Adapting existing law to reflect the new realities of the Internet Essay. Retrieved from https://studentshare.org/journalism-communication/1636702-1-adapting-existing-law-to-reflect-the-new-realities-of-the-internet-sometimes-works-and-sometimes-does-not-by-considering-what-we-might-consider-internet-crimes-which-are-directed-against-computers-and-computer-related-devices-and-telecommunicati
(1) Adapting Existing Law to Reflect the New Realities of the Internet Essay)
1) Adapting Existing Law to Reflect the New Realities of the Internet Essay. https://studentshare.org/journalism-communication/1636702-1-adapting-existing-law-to-reflect-the-new-realities-of-the-internet-sometimes-works-and-sometimes-does-not-by-considering-what-we-might-consider-internet-crimes-which-are-directed-against-computers-and-computer-related-devices-and-telecommunicati.
“1) Adapting Existing Law to Reflect the New Realities of the Internet Essay”, n.d. https://studentshare.org/journalism-communication/1636702-1-adapting-existing-law-to-reflect-the-new-realities-of-the-internet-sometimes-works-and-sometimes-does-not-by-considering-what-we-might-consider-internet-crimes-which-are-directed-against-computers-and-computer-related-devices-and-telecommunicati.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF 1) Adapting existing law to reflect the new realities of the Internet sometimes works and sometimes does not. By considering what we might consider Internet crimes which are directed against computers and computer related devices and telecommunicati

Internet law

...? Internet Law The lack of specific legal basis from case laws and other existing statutes makes it hard to govern transactions consummated over the internet1. The problem is compounded when the customer is within the United Kingdom and the company providing the product or the service is outside the United Kingdom2. Relief can be acquired if the organization providing the product or the service has an extension office within the United Kingdom3. However, for organizations that do not have any presence within the realm, protecting English customers could prove difficult due to the challenges in enforcing the rule of law4. Jurisdiction remains largely an issue with regards...
14 Pages(3500 words)Essay

Internet crimes

... of internet crime that involves data theft that can be termed as hacking (Ryckman, 2012). Some people have been suffering from other forms of internet crime involving their personal computers through offences such as blackmail, which can be undertaken based on information stolen after a successful intrusion. For instance, attackers may manage to acquire information from a personal computer that relates to their medical records, thereby using it to blackmail them (Suler, 2004). Moreover, attacks targeting personal computers are categorized under offences such as theft of intellectual property. Therefore, crimes perpetrated against a person may lead to substantial impediments of their socialization through the internet. D. Dealing... ?...
6 Pages(1500 words)Research Paper

How Does Internet Work

...Internet: How It Works? Introduction The Internet which is today one of the most popular and important element of human life is a system that comprises of several computer networks that are connected with each other with the assistance of standard internet protocol suite and is there to serve a huge amount of population. Internet came into existence during the period of 1969 and at that time period it was limited to only 4 host computers, today internet has grown in its size and comprises of millions of host computers. This writing will focus on how...
3 Pages(750 words)Research Paper

Internet Law

...to get the same name for their new projects and business ventures. It is a fact beyond suspicion that if an organisation is offering its services against the fee or charges, it would have the capability of working more diligently showing more and more transparent results and judgments. CADNA report on domain drop catching submits: Beyond just making ICANN's domain name fee non-refundable, ICANN might opt to levy a restocking fee - or a similar fee - that would be charged for every domain name immediately upon registration. When considering the implementation of a restocking fee, it is important to remember that unless a restocking fee is significant (in...
15 Pages(3750 words)Essay

Internet Banking - Computers and Internet

..., M.J. (2000), Services Marketing, McGraw-Hill, New York, NY. Final Questionnaire What is Internet banking An all enveloping definition says," Internet banking refers to systems that enable bank customers to access accounts and general information on bank products and services through a personal computer (PC) or other intelligent device or "any banking activity held on Internet (from promotion to sale)" ". What are your opinions and how do you relate to Internet Banking Please tick all boxes that appear appropriate to you! Q1 Are you Male Female Q2. How old are you ______ Education Level Undergraduate /Master / PhD Q3. "Have you used Internet banking ever... to convey the findings...
43 Pages(10750 words)Essay

Sometimes in Winter

...Sometimes In Winter by Linda Pastan A Reflection paper about a poem written by Linda Pastan of the of School)Abstract This is an analysis paper that intends to reflect upon the works of Linda Pastan, more specifically on her poem Sometimes in Winter. This paper will dissect on each lines written on the poem, the emotions, the concepts and theme and most importantly the meaning on the images symbolizing real situation and conviction about life in general. This will answer the question about what the author wants to convey to the readers, what her thoughts were at the time this poem was created and why this poem was conceptualized. This paper will also be a general discussion about life and what stand I chose to defend basing upon... the...
4 Pages(1000 words)Essay

Internet crimes

.... So the number of Internet crimes like Internet frauds is increasing year by year. To show different Internet fraud rating in the year 2007 is given below. This report is published by NLC’s Fraud Center. It indicates the top ten Internet frauds in 2007. (2007 top 10 internet scams, (n.d)) From this it is crystal clear that the loss due to Internet fraud is very much. Internet users who had awareness about the Internet fraud will try to take precautions against this. Everyone can avoid the internet fraud and minimizing the consequence of the...
12 Pages(3000 words)Essay

Movie Analysis- Charlotte Sometimes

...-stereotypical characterisation symbolises the rise of the wider demographic and the growing development of independent cinema. By analogy, this is further highlighted by the overlap of nominated films at the Academy of Motion Picture Arts and Sciences and the Independent Feature Project Stage and the Academy Awards and the Independent Spirit Wards (Sconce, 2002). For example, in 2006, Ang Lee won both the Oscar and the Spirit award for the direction in Brokeback Mountain, arguably obfuscating the distinction between independent films and Hollywood films with the “indiewood” effect (Tzioumakis, 2006). However, Rombes argues that “the coincidence of films does point to a phenomenon in contemporary...
3 Pages(750 words)Essay

Internet law

...in question. Even though not mandatory; registering a trademark would be beneficial. This offers him the protection against using the same name for another business. When a person chooses a business name which exists earlier; he has to make modifications to it before establishing the business in market, the location of business, the kind of trade done or entrepreneur’s name. An apparent distinction has to be done between the existing name and the new business name. “When choosing a name that already exists, you can legally use a universal name like "ABC Florist" as long as you change any direct associations between the business and a...
8 Pages(2000 words)Essay

Internet law

...aspect of our lives. It is much like the photos on which we look bad or funny, that we often hide. This information is personal, and the viewers can create wrong assumptions regarding our real personalities. Human brain eradicates unnecessary memories or at least puts them in the distant places of our mind. The Internet, however, works in a different way: the information does not disappear until someone makes it vanish. Thus, it is people control information and its usage, and Google turns out to be an almighty and all-knowing machine. Therefore, it is extremely important to return this power of personal information possession and usage to those who...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic 1) Adapting existing law to reflect the new realities of the Internet sometimes works and sometimes does not. By considering what we might consider Internet crimes which are directed against computers and computer related devices and telecommunicati for FREE!

Contact Us