Misused computing is a threat that secure computing practices will not mitigate. When computing is misused, security is usually not breached. Instead, normally legitimate computing capabilities are used to harm individuals and society. Many innovations have both good and bad consequences. Today, many of the bad consequences of computing, such computer fraud and fake news on social media, are prominent and undeniable. We can’t stop child pornography with better backup practices or stronger passwords. In many cases, our laws do not clearly distinguish between harmful and innocuous practices. However, with improved understanding of the issues, we can change laws and plan for a better future.
CITATION STYLE
Waschke, M. (2017). Misuse of Computers. In Personal Cybersecurity (pp. 103–123). Apress. https://doi.org/10.1007/978-1-4842-2430-4_5
Mendeley helps you to discover research relevant for your work.