Search Details

Word: computerizes (lookup in dictionary) (lookup stats)
Dates: during 1980-1989
Sort By: most recent first (reverse)


Usage:

THE majority opinion ignores the ambiguities surrounding the massive computer break-in orchestrated by Morris.

Author: By Mark R. Hoffenberg, | Title: Re-Morris | 11/15/1988 | See Source »

Knee-jerk declarations that "Morris must be prosecuted, both to punish his unlawful actions and to deter future hackers" present a simplistic solution to complex questions that legal and computer experts and ethicists are still debating.

Author: By Mark R. Hoffenberg, | Title: Re-Morris | 11/15/1988 | See Source »

Pranks such as Morris' are far from being clear-cut cases for legal interpretation. They unwittingly force the authorities into a morass of confusing arguments over how to define computer crime, how to interpret the role of an intruder's intent, how to address the vulnerability of the still relatively...

Author: By Mark R. Hoffenberg, | Title: Re-Morris | 11/15/1988 | See Source »

Moreover, the fact that Morris's program caused no permanent damage to affected systems but instead served to expose yet another serious lapse in national computer security warrants careful consideration, rather than an impulsive call for a prison sentence.

Author: By Mark R. Hoffenberg, | Title: Re-Morris | 11/15/1988 | See Source »

Even the definition of "privacy" can be questioned given the current conditions of the computer field. Would one arrest a curious individual wandering through a supposedly secure building with no locks?

Author: By Mark R. Hoffenberg, | Title: Re-Morris | 11/15/1988 | See Source »

Previous | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | 97 | 98 | Next