Rocky L. Ho Chapter 31 Title: “Defining the Boundaries of Computer Crime: Piracy, Breaks-Ins, and Sabotage in Cyberspace” by Hermani T. Tavani
Quote: “Each of the incidents in the preceding
paragraph would seem to be a genuine
instance of computer crime or cybercrime.”
Expectations: I expect to learn about the different kinds of computer crime and ways on how to prevent the computer crime or cyber crime.
Book Review: The author of this chapter is Hermani T. Tavani. Computer viruses can affect every computer, it has big or small effect in every computer, we can suffer a great disadvantage when our computer is affected by it. Our files can be eaten up without any trace. How can we get rid of these problems, first of all we can install an anti-virus for our computer, second we can put up or set the firewall in on mode, third is to reformat our computers. How or where can we get these problems, first is from internet, when we download from the net, we have the possibility of get virus, second is from the other computers, when we plug in the usb drive from the infected computer, then plugged it in our own computer, we can also get virus from them.
Things I have learned: I learned that virus is a scary thing when it happen, we can get a major disadvantage from it.
Integrity Questions: 1.) What is computer virus? 2.) How do computers be affected by computer viruses? 3.) What is computer crime? 4.) What are the categories of computer crime? 5.) Who is the author of this chapter?