The Proceedings of the Information Systems Education Conference 2000: §128    Home    Papers/Indices    prev (§127)    Next (§129)
    Paper (refereed)     Information Systems Curriculum
Recommended Citation: Nwokoma, A.  Process Evaluation of the Computer Fraud and Abuse Act of 1986.  In The Proceedings of the Information Systems Education Conference 2000, v 17 (Philadelphia): §128.
CDpic

Process Evaluation of the Computer Fraud and Abuse Act of 1986

thumb
Refereed
 
Anele Nwokoma    [a1] [a2]
Computer Information Systems Department
Grambling State University    [u1] [u2]
Grambling, Louisiana, USA    [c1] [c2]

This study is an evaluation of the Computer Fraud and Abuse Act of 1986. The study reviews existing computer crime policy implementation, found the implementation slightly inappropriate, and recommends new process and a model that can be used to enhance implementation of the act and punish perpetrators. The study represents the result of a scholarly endeavor to link information systems and government policy. The report is organized into six primary divisions: problem identification, review of related literature, methodology, findings, conclusion and recommendation, and summary.

Keywords: Information Systems, computer crime, process evaluation, government policy

Read this refereed paper in Adobe Portable Document (PDF) format. (125 K bytes)
Preview this refereed paper in Plain Text (TXT) format. (32 K bytes)

CDpic
Comments and corrections to
webmaster@isedj.org