The Criminalisation of Tools Under the Computer Misuse Act 1990. The Need to Rethink Cybercrime Offences to Effectively Protect Legitimate Activities and Deter Cybercriminals

2020 ◽  
pp. 41-61
Author(s):  
Audrey Guinchard
Keyword(s):  
1989 ◽  
Vol 1990 (1) ◽  
pp. 2-4
Author(s):  
Emma Nicholson
Keyword(s):  

2015 ◽  
pp. 1648-1655
Author(s):  
Michael E. Whitman ◽  
Humayun Zafar

While computer ethics and information security courses try to teach computer misuse and unauthorized access as clear black and white examples, when examining the use and potentially misuse of URLs the discussion becomes less clear. This paper examines a number of computer use ethical scenarios focusing on the modification of URLs within Web browsers. Using the documented case of applicants to several Ivy-league schools as a discussion point, this paper presents a survey of U.S. students enrolled in information security and computer ethics classes, asking at what point does modifying the URL become hacking, and at what point does it become unethical. The findings of this study are discussed.


Criminal Law ◽  
2020 ◽  
pp. 622-639
Author(s):  
Jonathan Herring
Keyword(s):  
The Law ◽  

This chapter discusses the law and theory on criminal damage. Criminal damage involves the defendant intentionally or recklessly destroying or damaging property belonging to another. The defendant will have a defence if he or she was acting with a lawful excuse. Four criminal damage offences are found in the Criminal Damage Act 1971: basic criminal damage, arson, aggravated criminal damage, and aggravated arson. There is also an offence of racially aggravated criminal damage. The chapter also considers the Computer Misuse Act 1990, which was designed to protect information kept on computers.


Sign in / Sign up

Export Citation Format

Share Document