dc.contributor.author |
Steh, Stephen |
en_US |
dc.date.accessioned |
2013-12-04T16:01:00Z |
|
dc.date.accessioned |
2019-09-08T02:38:06Z |
|
dc.date.available |
2013-12-04T16:01:00Z |
|
dc.date.available |
2019-09-08T02:38:06Z |
|
dc.date.issued |
2009 |
|
dc.identifier |
495987885 |
en_US |
dc.identifier.other |
b20545332 |
en_US |
dc.identifier.uri |
http://hdl.handle.net/1989/10713 |
|
dc.description |
v, 59 leaves ; 29 cm. |
en_US |
dc.description.abstract |
This paper examines the concept of unauthorized access crimes statutes in the fifty states and the federal system in order to determine the concept of what exactly the crime of unauthorized access constitutes. This paper will also determine whether these same crimes could be prosecuted under preexisting statutes that were already in effect in the United States criminal codes prior to the invention of the computer. Through a review of previous literature on the subject of computer crime laws, and more specifically unauthorized access laws, additional insight as to the purpose and intent of these laws will also be drawn. Case law on unauthorized access and any related criminal activity will also be examined. This information will help to determine whether the intentions of the legislatures have been to criminalize what is commonly referred to as hacking. |
en_US |
dc.description.statementofresponsibility |
by Stephen Steh. |
en_US |
dc.language.iso |
en_US |
en_US |
dc.relation.ispartofseries |
Master's Theses no. 1161 |
en_US |
dc.subject.lcsh |
Computer crimes--United States. |
en_US |
dc.subject.lcsh |
Computers--Law and legislation--United States. |
en_US |
dc.title |
Unauthorized Access Crimes |
en_US |
dc.type |
Thesis |
en_US |