Attacks on Computers: Congressional Hearings and Pending Legislation

@article{Bailey1984AttacksOC,
  title={Attacks on Computers: Congressional Hearings and Pending Legislation},
  author={David Bailey},
  journal={1984 IEEE Symposium on Security and Privacy},
  year={1984},
  pages={180-180}
}
  • David Bailey
  • Published 1984
  • Law
  • 1984 IEEE Symposium on Security and Privacy
During the First Session of the 98th Congress, several days of hearings were held on the activities of "computer enthusiasts" including the Milwaukee 414s and others. The First Session also saw the introduction in the House of six bills dealing with various aspects of computer crime. A summary of those hearings, along with a summary of the pending computer crime bills, will be presented. 
The Morris Worm: Cyber Security, Viral Contagions, and National Sovereignty
TLDR
From the birth of the computing industry in World War II, to the Computer Eradication Act of 1989, this paper traces how popular catastrophic events, like the Morris Worm, construct a public reaction that instinctually abdicates intellectual authority to an expert-induced panic.
A survey of cyber crimes
TLDR
A survey of cyber crimes that have actually occurred and some cyber crimes are actually traditionally non-cyber crimes that are facilitated by computers or networks is provided.
When Cyber Systems Crash: Attitudes Towards Cyber Utilization And Security