Computer Fraud Challenges and Its Legal Implications

Author(s):  
Amber A. Smith-Ditizio ◽  
Alan D. Smith

In this chapter, the authors provide a position-based discussion in reference to selective cyberthreats to devices and data breaches (which include malware, phishing, social engineering, data communication interception, malicious insider actions, just to name a few), and further provide information on applicable defenses and their legal implications. Although the authors do not assess the different threats and defenses in order to help prevent future vulnerability towards hacking for consumers, they do provide a conceptual understanding of the growing threats of such attacks and the inability of current legal safeguards to counter such threats. Particularly vulnerable are mobile systems, which are more prone to loss and theft once intercepted.

2011 ◽  
Author(s):  
Sehchang Hah ◽  
Ben Willems ◽  
Kenneth Schulz

Sign in / Sign up

Export Citation Format

Share Document