January 2015
Intermediate to advanced
944 pages
33h 37m
English
In this chapter:
• Protecting programs and data: copyrights, patents, trade secrets
• Computer crime statutes and the legal process
• Unique characteristics of digital objects
• Software quality: Uniform Commercial Code
• Ethics: principles and situations to explore
In this chapter we study human controls applicable to computer security: the legal system and ethics. The legal system has adapted quite well to computer technology by reusing some old forms of legal protection (copyrights and patents) and creating laws where no adequate ones existed (malicious access). Still, the courts are not a perfect form of protection for computer resources, for two reasons. First, the courts tend to be reactive instead of proactive. ...