The Proceedings of the Information Systems Education Conference 2000: §128
Home
Papers/Indices
prev (§127)
Next (§129)
| Paper (refereed) Information Systems Curriculum
| Recommended Citation: Nwokoma, A. Process Evaluation of the Computer Fraud and Abuse Act of 1986. In The Proceedings of the Information Systems Education Conference 2000, v 17 (Philadelphia): §128.
|
| |
Process Evaluation of the Computer Fraud and Abuse Act of 1986
Refereed | | Anele Nwokoma [a1] [a2]
Computer Information Systems Department
Grambling State University [u1] [u2]
Grambling, Louisiana, USA [c1] [c2]
|
This study is an evaluation of the Computer Fraud and Abuse Act of 1986. The study reviews existing computer crime policy implementation, found the implementation slightly inappropriate, and recommends new process and a model that can be used to enhance implementation of the act and punish perpetrators. The study represents the result of a scholarly endeavor to link information systems and government policy. The report is organized into six primary divisions: problem identification, review of related literature, methodology, findings, conclusion and recommendation, and summary.
Keywords: Information Systems, computer crime, process evaluation, government policy
Read this refereed paper in Adobe Portable Document (PDF) format. (125 K bytes)
Preview this refereed paper in Plain Text (TXT) format. (32 K bytes)
Comments and corrections to
webmaster@isedj.org