.

Thursday, April 4, 2019

Is The Computer Misuse Act (1990) Appropriate?

Is The Computer ruin sham (1990) prehend?The Computer Mis physical exercise practise (1990) and whether it Remains an Appropriate Legislative InstrumentDavid ReidThe Computer Misuse Act (UK) 1990 (CMA) 1 was one of the earliest deports aimed at protecting the integrity and security of estimator systems. However the rapid instruction of applied science has raised concerns as to whether the act remains effective and appropriate. theatrical role 1 HackingThe Computer Misuse Act was created to aid the prosecution of technological related crimes, commonly cognize as hacking. The most cock-a-hoop case was R v Gold and Schifreen2, where Robert Schifreen and Stephen Gold chafeed British Telecoms Viewdata service by shoulder surfing3 an engineers username and password. The documentation were very simple this brought about concerns as to the integrity and security of computer system access. The pair were prosecuted low the Forgery and Counterfeiting Act 19814, and received a relat ively small penalty fined 750 and 600 respectively. This case threw into light the wishing of legislature regarding crimes of this manner, and so the CMA was created.Hacking is defined in Section 1 of the CMA as, wildcat access to whatsoever plan or data held in any computer5. This definition is moulded such that external hackers like Schifreen and Gold fanny be prosecuted easily. However it has not been as simple in otherwise cases such as Ellis v DPP (No 1)6. In this case an ex-student was using other student accounts that had been left logged in in rig to access computers in the campus library. It was argued whether it could be deemed unauthorised downstairs surgical incision 1. Lord Woolf CJ however said that the access was passive unauthorised and that statutory provisions were sufficiently wide to intromit use of the computers Ellis was prosecuted under naval division 1 of the CMA.The question what is unauthorised access? has been a cause of concern for many cases u nder division 1. The get word early case was DPP v Bignell 1998 Div. Ct.7 in which married police officers accessed the police database in order to scram the car of an ex-lover. Accessing the database was not unauthorised, just now their use of it was and they were found to be guilty. Other cases that contri howevered confusion were, R v Bow Street Magistrate and Allison, ex parte US Govt 1999 HL8, R v Ashley Mitchell 20119 and R v Cuthbert 2005 Mag Ct10.The media and other critics applied a lot of pressure for change. The government accepted the All Party Internet Groups recommendations and section 1 became triable in either way, which was an amendment from section 35 of the constabulary and Justice Act (PJA) 200611.A somebody guilty of the offence in section 1 can be sentenced to imprisonment of a marches not exceeding 12 months or upon indictment, imprisonment to a term not exceeding 2 years. There is debate for increasing the sentencing tariff to 3 years so that it can be considered a serious crime and thereby have a deterrent effect. However the current tariff allows both(prenominal) significant sentencing power and the ability to prosecute for mere attempts at the offence12.In addition to the prosecuting powers of section 1, section 3a states that Making, supplying or obtaining articles for use in computer misuse offences, punishable by up to 2 years in prison or a fine or both13. This has caused concern in the technology community as to how the distinction will be made betwixt lawful and unlawful use of the softw ar. Despite having flaws, it is likely that this shall be an effective deterrent from both section 1 and section 3 offenders and is a step in the protection of our computers.Section 3 Modifying Computers and Denial of Service Attacks (DoS)Section 3 of the CMA was originally designed to prohibit the creation and distribution of viruses under the idea that they cause unauthorised accommodation14. Four years after the creation of the CMA, the network sparked a change from isolated computer systems, into a worldwide network in which all computers could communicate. This caused a revolution in computer misuse and new(a) vulnerabilities to computer security. These developments are cited as the main reasons for developing legislation in a technologically objective manner, so as not to require regular updating.Proof that this was needed was in the R v Lennon15 case Lennon was accused of sending 5 million e-mails to his former employer causing a DoS attack. This is known as mail-bombing and causes the service of processr to overflow preventing access to the network. However this attack could not be addressed under section 3 as the receiving system was designed to handle such e-mail messages and therefore could be enchanted as authorised. The decision was reversed upon appeal, however it confirmed that authorisation remained unclear.Another question that has arisen in regards to section 3, is how modification is viewe d regarding DoS attacks. Distributed denial of service (DDoS) attacks involve the installation of software on computers in order to take control of them. It is uncertain whether this could be viewed as unauthorised modification. Therefore, under section 36 of the 2006 police and Justice act unauthorised modification was amended to unauthorised impairment. This removes the idea that only erasing or modification of computer systems are liable, and criminalises DoS attacks.However, by looking at the difference between reported cybercrime incidents and the take of prosecutions each year, you can see that there are a large number of cases that seem to be slipping through the justice system. It can be assumed that this is due to the rapidly changing internet a technologically neutral approach in legislation, as adopted in section 3, has been ineffectual to predict new and innovative attacks. It seems that the CMA has been to a greater extent than effective in dealing with computer focu sed attacks than attacks upon computer network systems.Section 4 JurisdictionSection 4 of the CMA states that (1) Except as provided below in this section, it is immaterial for the purposes of any offence under section 1 or 3 above- (a) whether any act or other event proof of which is required for conviction of the offence occurred in the home expanse concerned or (b) whether the accused was in the home country concerned at the time of any such act or event.16 This is a very wide scope, however with the advances in technology, it can be avoided. For example, by hosting a website such as StormFront, a white supremacist page on a server in America, it cannot be taken down due to their right of free speech. However while the occasion remains in the UK, he can be prosecuted.Conclusion1 Computer Misuse Act 1990 http//www.legislation.gov.uk/ukpga/1990/18/contents2 R v Gold and Schifreen 1988 http//swarb.co.uk/regina-v-gold-and-schifreen-hl-21-apr-1988/3 Shoulder surfing definition of s houlder surfing in (n.d.). Retrieved October 21, 2016, from https//en.oxforddictionaries.com/definition/shoulder_surfing4 Forgery and Counterfeiting Act 1981 http//www.legislation.gov.uk/ukpga/1981/455 Computer Misuse Act 1990, s.1 (CMA).6 Ellis v DPP (No 1) 2001 http//lexisweb.co.uk/cases/2001/may/ellis-v-director-of- human race-prosecutions7 DPP v Bignell http//swarb.co.uk/director-of-public-prosecutions-v-bignell-and-another-qbd-6-jun-1997/8 R v Bow Street Magistrate and Allison, ex parte US Govt 1999 HL http//swarb.co.uk/regina-v-bow-street-magistrates-ex-parte-government-of-the-united-states-of-america-in-re-allison-hl-2-sep-1999/9 R v Ashley Mitchell 2011 https//www.supremecourt.uk/cases/uksc-2015-0122.html10 R v Cuthbert 2005 Mag Ct http//news.bbc.co.uk/1/hi/england/london/4317008.stm11 The House of Commons, Computer Misuse Act (Amendment) Bill (5th April 2005) http//www.derekwyattexmp.co.uk/upload/docs/CMAdft1.pdf12 All Party Internet Group, Revision of the Computer Misuse Act (June 2004)13 Police and justice act 200614 David S. Wall, Cybercrime The Transformation of Cybercrime in the Information Age (Polity Press 2007).15 R v Lennon, unreported, November 2, 2005, Wimbledon Magistrates hail (on).16 Computer Misuse Act 1990, s.4 (CMA).Literature Review Feminism and MediaLiterature Review Feminism and MediaDickinson, Sonia, and Donna Gill. argon Women Offended by the Way they are Portrayed in ad?. International Journal of denote 28.1(2009) 175-178. Womens Studies International. Web. 6 Feb. 2015.Are Women offended by the Way they are delivered in Advertising?Sonia Dickinson and Donna Gill attempt to answer this question. Their article, which is aimed at women around 35 years and older, displays their finding about how women do differently to advertisements in that the responses are not always, for all women, negatively charged. The line of reasoning is broken down into a three-point definition that builds upon itself as it develops. The third par t adheres to the oppositions point of view on how women overreact to advertisements that are in no way objective or harmful. The breaking down of the argument allows the audience to say not only the argument itself, but the inclusion of the authors multiple own(prenominal) statements and realizations during the development of their argument as well as their responses to the roots.2 Throughout the article there are various representative sections that contain the personal opinions of Sonia and Donna3. The realizations and responses mentioned above draw the audience into the article and increase their betrothal of the argument being made. They also submit that the question comprise does prompt the readers to give a confirmatory answer, and thus solidifies the authors institution of nugatory respons4e. In comparison to my topic, the source will allow me to, when I reference the opposing side, generate scholarly support. However, when I do have to discredit the opposing side, thi s discretization will be seen as all the more expert because of the use of a scholarly article.Back, Debora Baker. The F Word How the Media Frame Feminism. NWSA Journal 10.1 (1998) 139. Womens Studies International. Web. 6 Feb. 2015.The F Word How the Media Frame FeminismDebora5 intends to discuss the relationship between the media and womens lib that resulted from the medias negative presentment of the all feminists and the entire feminist movement, its effect of framing on societys acceptance or rejection of the cause and those instilled in support of the movement, and finally feminism and its pursuits and response to the media. Based on the length, diction, and complexity of the article, the article is meant to be read by those who are currently completing or have accurate a mastery of an upper high school reading level. Debora presents examples of feminism with either an underlying negative tone or an obvious negative view (of the media) and accompanies it with the popular or publics view of feminism and feminists. Finally, she supports this with the medias creation, influence or support of the negative view of the public towards feminists and feminisms advancements in their delineation of women and the advance of women until they are equal to men. While well poised, the article does suffer on believability in the way that it uses some of its sources, in that this shoddy procedure causes the suspicion of the audience towards the credibility of the argument being presented. In relation to my article, this source will be used to support the argument of how the media has a negative effect on women as it dismantles the actions of and advancements for women that have been or are in the act upon of being secured by feminists. precentor, Muriel G. Feminism and the Media. Society 25.5 (1998) 76-81. SPORTDicuss with Full Text. Web. 13 Feb. 2015.Feminism and the MediaThe article by Muriel G. Cantor focuses on how second wave feminists responded to and tried t o enforce change in how women were portrayed in the media. She expands this to include the explanation of origin and the growth of second wave feminism, the tactics it used to try to persuade owners of media outlets to put forward an accurate and supportive portrayal of women, the origins of the relationship between the media and feminism, and finally, the areas in which women were seen as more subordinates to men than currently. Her intend audience is those who want to learn more about the origins of late day feminism, the large focus of modern day feminisms roots in interacting with the media, and/or second wave feminism. In her presentation, Muriel uses particularized company names, making grounds for the presentations credibility and thus convincing the reader more than could be achieved through generalizations. She also mentions a variety of setbacks that the movement took while fighting for the fair portrayal of women in media become just that, a fight, instead of continuou s, easy advancements. This causes readers to become engaged and points to possible boilers suit success of second wave feminism. However, she poses the question of whether the movement was a success or a distress in regards to its present existence, change in existence, and changes in media relationship that resulted. From this, readers are to discern their own answer to the posed question, for Muriel does not give her opinion. This cause readers to remain intellectually active after reading. It could also point them to discovering more about both the media and feminism and looking at them and their relationship through a different lends than before. believability of her presentation and reliability in what she says is established through the sources, the title that Muriel holds at a university, and the number of works that she has published. In relation to my article, I would use this to support the theses of the previous two articles, thus the relationship between the media and women and feminism but also would use to explain how this relationship came to be.Anderson, Annie, When The Mainstream Met The siemens Wave Media Representations of Women Feminism in 1970s America (2012). American Studies Honors Papers. Paper 4. http//digitalcommons.conncoll.edu/americanstudieshp/4When The Mainstream Met The Second Wave Media Representation of Women and FeminismAnnie Anderson attempts to portray the relationship between the media of the 1970s and Second Wave Feminism. She begins by looking that the two separately but immediately moves into the feuding interaction between the two. Her presentation focuses on the clock time and Life magazines coverage on Second Wave Feminism and how the response of Second Wave Feminism created a framework for the relationship between Second Wave Feminism and 1970s media as well as for the way in which feminism is viewed today. Annie also tries to help oneself her audience understand how the media shaped and continues to shape the agenda of (Second Wave) feminism. In order to do all of this, Annie gives an abrupt history of both Second Wave Feminism and the media, both subjects literature, and the history of Time and Life magazines. This allows for her audience to understand that impact that each strength have on the public and what characteristics might be the source of tension between the three when presented in certain light. Annie, at the end of her presentation comes to a conclusion on whether or not (Second Wave) feminism has been successful and names solutions on how to ameliorate its success. This argument will help me to structure the main point of my paper that the media helped to create and reinforce the publics negative view of women and feminism. The credibility of this source comes from the amount of peer review that had to be through with(p) before it was published as well as from the use of historical sources which cannot be falsified without serious consequences.Jones, Allison. Saints and Sirens How issue Culture Creates Female Icons. The HKU Honors Club. University of Hong Kong, 1 Aug. 1998. Web. 19 Feb. 2015. http//hub.hku.hk/bitstream/10722/40445/1/FullText.pdf?accept=1.Allison Jones attempts to show the categorization of women in the media as either saints or sirens by looking at four females in particular. She obtains the idea that within the sprightliness or after the death of an individual, particularly women, provoke different reactions from the public as a result of the media changing the physical bodys of the women to that of the publics liking or averting. She uses specific examples of what made the public show distaste or admiration for the women during their life or after their death. Using not only specific women but including what upset or pleased the public allows for the argument that Allison is making to be understood more all the way than it would if she gave general examples. The comparison between the women and what qualities they presented also serves to help enforce her argument. She reflects on the power of the media to capture an image that pertains to what they choose to portray about women and the lengths to which they go to portray such an image to the public. This article will help me to convey to my audience of the effort that the media goes through to uphold the inaccurate and over exaggerated descriptions of womens behaviors and the figure of such behaviors that lead to the simplified naming of these women as either good or bad. It will serve to help me transition into how feminism has been easily disguised as a men-hating movement. The credibility of this article is the like as the credibility of the article from above.

No comments:

Post a Comment