Tuesday, December 24, 2019

Who Is Intimate Partner Violence - 959 Words

Before taking this course about family violence, I had an idea what was Intimate Partner Violence. I have always believed that Intimate partner violence involves only married couples. I had also thought that violence between a married couple consider the only force of using physical abuse only. Fortunately after reading about partner violence, I have learned that there were more than just one type of abuses. For example, I never thought that sexual abuse could happen between a couple. In addition, I learned that intimate partner violence does not consider only married partners but also partners who have same sex genders, and are unmarried. Unfortunately, what I will focused on will be about Intimate Partner Violence among Diverse and At-Risk Population; chapter thirteen of McClennen book. I choose this chapter because my culture enforces barriers upon victims who are in a violent marriage. In the journal, I will be sharing about how my culture enforced intimate partner violence by stating the barriers within the Hmong community, then I will give brief explanation to what I have gained from the readings, and lastly, how the theme of this journal could help enforce effective treatment for future practitioners. In my culture, ancestors and elders have been practicing an unjust system for women when it relates to intimate partner violence within a marriage. In the Hmong community, when a married couple wants to end a marriage because of violence, they will have to notifyShow MoreRelatedThe Role Of Intimate Partner Violence And Who Does It Affect?876 Words   |  4 PagesWhat is Intimate Partner Violence and who does it affect? According to Wilcoxon, Remley, and Gladding (2013), â€Å"Domestic violence or intimate partner violence (IPV) have emerged in the professional literature as descriptors of chronic as well as episodic patterns of abuse, ranging from harsh criticism to aggressive brutality, between adults in intimate relationships† (p.105). IPV does not discriminate, it refers to both married and unmarried individuals. This type of violence affects men, woman, andRead MoreDomestic Violence And Sexual Violence1535 Words   |  7 Pages(Domestic Violence Statistics, 2015). The to pic that will be studied with the paper is intimate partner violence or another term that can be used is domestic violence. Domestic violence or intimate partner violence is the systematic pattern or control or power perpetuated by one partner against another (National Coalition Against Domestic Violence, n.d.). Throughout the paper the term domestic violence and intimate violence will be used interchangeably. The misconception is that domestic violence or intimateRead MoreIntimate Partner And Sexual Violence1555 Words   |  7 PagesNational Intimate Partner and Sexual Violence 2010 survey, will provide statistical information on victims who experienced one or more violent crimes from their husband, wife, boyfriend or girlfriend. These crimes arrange from stalking, rape, to physical and mental abuse. It will examine the impact of intimate partner violence on gender, race, and ethnicity. This report will give an overview of health consequences and the implications for prevention fo r Intimate Partner and Sexual Violence. LastlyRead MoreThe Effects Of Intimate Partner Violence On Children1469 Words   |  6 PagesEffects of Intimate Partner Violence on Children Just about everyone out there can say they know someone who has been affected my intimate partner violence. Or most often they have been a victim themselves but the point is intimate partner violence is so widespread that it has often been referred to as an epidemic. Most dictionaries roughly define the word epidemic as affecting many people at the same time or a rapid increase or spread in the occurrence of something. That right there can easily beRead MoreSexual Partner Violence And Black American Women Essay1056 Words   |  5 PagesRELATED TO INTIMATE PARTNER VIOLENCE AND BLACK AMERICAN WOMEN Arshida Moore 12/11/2016 PADM 6130 Research Methods INTRODUCTION In the United States, Black American women are physically battered and often die from Intimate Partner Violence (IPV) at increasingly disparate rates in comparison to that of White American women. When compared to their White American counterparts, Black American women unswervingly conveyed higher rates of violence by their intimate partner (West, 2004)Read MoreThe Fight For Power And Dominance865 Words   |  4 PagesThe fight for power and dominance in a relationship affects the treatment of women in intimate relationships. Women are five to eight times more likely to be victimized by an intimate partner, according to the Department of Justice in 2007 among 96% of intimate relationship violence victims 85% were female. (Lee Shaw, 2012) The meaning of gender has given a set of values to men that normalizes their inferiority and women’s subordination. The gender roles that are given to women paved way to theRead MoreProposal On Person Centred Therapy786 Words   |  4 Pa gestherapy. Dillon, Gina, Hussain, Rafat, Loxton, Deborah, and Rahman, Saifur, â€Å"Mental and Physical Health and Intimate Partner Violence against Women: A Review of the Literature,† International Journal of Family Medicine, vol. 2013, Article ID 313909, 15pages, 2013. doi:10.1155/2013/313909 A psychologist reviewed fifty-four peer reviewed studies on the effects of partner intimate violence on women’s mental health. Anxiety disorders were two-eight percent favorable, depending on how severe the abuseRead MoreInterventions For Children Exposed At Intimate Partner Violence1421 Words   |  6 PagesAvailable for Children Exposed to Intimate Partner Violence Marie Garza Florida Atlantic University Abstract Recently, it has been acknowledged that not only does intimate partner violence affect the victim, but it may also cause psychological damage to children who may be exposed to it, both directly and indirectly. This paper will aim to examine two types of evidenced-based interventions available for children who have been exposed to intimate partner violence and have developed Post TraumaticRead Moreintimate partner violence1421 Words   |  6 PagesDecember 10, 2013 Intimate partner violence among cohabitating or married couples A part of human nature is to form relationships with others in our society. We form these relationships to preserve ourselves and the greater good of mankind. These relationships we as humans form , are supposed to be synergistic to both parties that are involved in said relationship. Unfortunately, twenty-two percent of women and seven percent of men have been victims of intimate partner violence over the course ofRead MoreAnnually 4.8 Million Women Are Physically Assaulted Or1398 Words   |  6 PagesAnnually 4.8 million women are physically assaulted or raped by someone they know or their intimate partners, which translates to three women being killed by their partners each day in the United States (Naylor). The United States has an alarming rate of violence against women, which is a grave violation of human rights. Its impact ranges from immediate to long-term physical, sexual, and mental effects for women and girls, such as depression, PTSD and death. Although both genders ar e guaranteed

Monday, December 16, 2019

Google Versus Microsoft Clash of the Technology Titans Free Essays

Google founded by Larry Page, Sergey Brin and established at 1998, they focus on cooperation in internet services and products such as search, software and online advertisement and mobile phone. Microsoft Corporation is a software corporation that improves manufactures, produce PC, supply, licenses and aid variety products and service involve to computing. They are found by Bill Gate and Paul Allen at 1975, they are the most powerful American software company worldwide and attract various customer. We will write a custom essay sample on Google Versus Microsoft: Clash of the Technology Titans or any similar topic only for you Order Now Microsoft and Google have been the most powerful technology brands worldwide in America until now. Both of them have specific features, achieve on the market and attract many customers in the world. However, each of them wants to be on the top and dominates the technology market so the conflict is definitely happen. 1) Define and compare the business strategies and business models of Google and Microsoft. Google were only a search company at that time, but with new system PageRank search algorithms which are analyzed relationship between websites by the number of specific pages and the essential within those pages. Also, with online advertising service, Google can earn various profits like posting the content of any company on the top of website, using Pay-Per-Click (PPC) and so on. Also, the company extents infrastructure and adopt acquisition that permit them to require the fastest search speeds and variety of Web-based products. With those strategies, they make Google become the best searching service in the world. Moreover, Google believes that online application is going to be big businesses in the future, because its center searches and search-advertising business mature. Also, with the development of internet may allow computing tasks in order to be enforced through the website, we can sit on computer and remote control as well as save data centers rather than our desktop. It is called as cloud computing and it is core to Google’s business model moving forward. Microsoft achieved on the market through the strength of its Window operating system and Office desktop productivity applications. Also, they diversify their operating system and adopt acquisition lots of company to extent their position as well as produce various products that mix more specific features. In addition, they supply variety software for desktops and servers. They are also corporate with mobile phone industries. Microsoft and its products are nevertheless staples for businesses and users look to develop their productivity with computer. For the business model, Microsoft has achieved in establishment the model of desktop computing. Microsoft’s objection is research and development the Internet but they need to convince users to keep using the desktop as the focal point for computing tasks. 2) Has the Internet taken over the PC desktop as the center of the action? Why or why not? No, the internet cannot be taken over by the PC desktop. Because of, consumer may use mobile phone, notebook and so on in order to connect internet immediately at anywhere. Especially, 4G is recently released so it allows user can access internet at the fastest speed or Wi-Fi is also a best way to connect internet. With the positive effect of internet, user can save, download and store data which is called as cloud computing or send data to other person on our mobile phone or notebook. Therefore, consumer does not need to spend lots of time on desktop to perform computing tasks. Therefore, the internet makes people’s life become easier and comfortable. 3) Why has Microsoft attempted to acquire Yahoo? How does it affect its business model? Do you believe this is a good move? Microsoft wants to acquire Yahoo because they desire to improve its Internet presence. Yahoo is internet corporation which is essential development in web portal, Search engine Yahoo, social media website, advertisement, Yahoo! New and so on, they are one of the most famous brand worldwide. So, if Microsoft acquires Yahoo, they can improve in promotion, news, service, web-design. In addition, Microsoft wants to ruin the threat of an advertising deal between Google and Yahoo. Google is a one of the most dangerous opponent to Microsoft. Also Google’s technology keeps improving and arise lots of profit per search. Therefore Microsoft needs to reduce the development as well as presence of Google on the market. Turning to Microsoft’s new goal, they must achieve in innovate and disrupt in search, win in display advertisement, reinvent portal and social media experiences. Yahoo is a company that consist all of these elements and it appropriates to Microsoft’s campaign. They would focus on developing the internet by acquiring Yahoo. However, desktop computing from Microsoft should be affected because the market share of desktop on the market is decreasing significantly while the important of internet is wider. As a consequence, the market share in Microsoft would be gone down too. In my opinion, this is a good move for Microsoft. Although, the number of user for desktop computing is decreasing significantly but if they acquire successful Yahoo which is focus on internet. Microsoft can diversify their product and service into new ways. Internet is growing so fast year by year and attracting a huge number of users worldwide, so Microsoft should follow the needs of users to increase the market share as well as revenue. 4) What is the significance of Google Apps to Google’s future success? Google Apps is a series of Web-based applications that include Gmail, immediate messaging, calendar, word processing, presentation and spreadsheet applications (Google Docs) and tools for building collaborative Web sites. These systems are more simpler and not complex rather than Microsoft’s Office applications. Google offers those applications for free to arise attractive and improve the Google’s presence on the market. Meanwhile, customer must pay for Microsoft’s Office applications and they are quite expensive. Therefore, with Google Apps, they can compete and minimize the power of Microsoft. In addition, with the development of internet, Google allow user download their application for free on internet. Also, Google Apps interact with Iphone, Galaxy S3,4 to bring their applications closer to consumer. Google offers Premier editions which is cost $50 per year per user whereas Microsoft offers $500 per person to own their applications. Therefore, Google offers a cheaper price than Microsoft. In the future, Google Apps may attract many consumer rather than Microsoft and help Google gain more profit and push up the power of Google. However, Microsoft Office had been built and spent various dollars for a long year ago to research and develop, attract a huge number of user and they know how to use these application. As a result, consumer may be hard to switch to Google Apps because it is a new systems, user has to learn how to use it and probably generative error at anytime. Therefore, Microsoft Office is a big barrier that prevents the development of Google Apps in the future. 5) Would you use Google Apps instead of Microsoft Office applications for computing tasks? Why or why not? No, I would not use Google Apps instead of Microsoft Office application. In my opinion, Google Apps is quite a new system, it is simpler and cheaper than Microsoft Office. However, Google Apps is designed for users who use computing task at the first time. It is all about fundamental version of Microsoft so consumer will learn how to use computing task efficiency. But, Microsoft Office had been existed for a long time ago and attracted many consumer as well as high level of satisfaction. Nowadays, most people use Microsoft Office as their first choice, they can pay for them, and even it is quite expensive. But the operation and system from Microsoft Office are very professional and interact fully with computing tasks. Even when consumer uses Macbook, Imac, they download software from Microsoft like window 7, 8 to use Microsoft Office. Although, Apple create iWork but there are little people use that system. Therefore, I will follow Microsoft Office and continue to use it as my best choice. 6) Which company and business model do you believe will prevail in the epic struggle? Justify your answer Both of Microsoft and Google are the most popular on the market worldwide. Microsoft has built and developed computing tasks for a long time ago. Also, their product and service are draw attraction from many users, they satisfy consumer’s need and what they want. In addition, Microsoft diversifies to mobile industry by cooperate with Nokia. They are also creating lots of special software that many consumers use such as window 7, 8, XP. Microsoft believes that desktop computing will dominate the market in the future but with the developed internet, desktop computing is no longer use. Internet is now the most important for consumer. Google is a company that very good in development their product and service related to internet. With search engine, advertising, web-base, Google Apps, Google App Engine (allow programmer creates their own application), they allow user performs computing task through internet, user can use mobile phone, notebook to connect internet and integrate with these applications. With this business model of Google, they attract various users worldwide and improve the presence of Google. Therefore, Google may prevail in this dispute compare to Microsoft Conclusion Microsoft is stronger in development computing task, desktop and software. They have satisfied consumer and attracted many users. However, Google makes all computing task through internet. This is a thing that Microsoft cannot be better than Google. Because of internet is the most necessary thing in people’s lifetime. Therefore, computing task operates through internet is extremely important. And Google achieved on this way. Therefore, they will keep growing in the future, invent modern products, services, software and interact with mobile industry. How to cite Google Versus Microsoft: Clash of the Technology Titans, Essays

Sunday, December 8, 2019

Computer Crime (1896 words) Essay Example For Students

Computer Crime (1896 words) Essay Computer CrimeTHESIS: Laws must be passed to address the increase in the number and types of computercrimes. Over the last twenty years, a technological revolution has occurred as computers are now anessential element of todays society. Large computers are used to track reservations for the airlineindustry, process billions of dollars for banks, manufacture products for industry, and conductmajor transactions for businesses because more and more people now have computers at homeand at the office. People commit computer crimes because of societys declining ethical standards more than anyeconomic need. According to experts, gender is the only bias. The profile of todaysnon-professional thieves crosses all races, age groups and economic strata. Computer criminalstend to be relatively honest and in a position of trust: few would do anything to harm anotherhuman, and most do not consider their crime to be truly dishonest. Most are males: women havetended to be accomplices, though of late they are becoming more aggressive. Computer Criminalstend to usually be between the ages of 14-30, they are u sually bright, eager, highly motivated,adventuresome, and willing to accept technical challenges.(Shannon, 16:2) It is tempting to liken computer criminals to other criminals, ascribing characteristics somehowdifferent from normal individuals, but that is not the case.(Sharp, 18:3) It is believed that the computer criminaloften marches to the same drum as the potential victim but follows and unanticipatedpath.(Blumenthal, 1:2) There is no actual profile of a computer criminal because they range fromyoung teens to elders, from black to white, from short to tall. Definitions of computer crime has changed over the years as the users and misusers of computershave expanded into new areas. When computers were first introduced into businesses, computercrime was defined simply as a form of white-collar crime committed inside a computersystem.(2600:Summer 92,p.13) Some new terms have been added to the computer criminal vocabulary. Trojan Horse is a hiddencode put into a computer program. Log ic bombs are implanted so that the perpetrator doesnthave to physically present himself or herself. (Phrack 12,p.43) Another form of a hidden code issalamis. It came from the big salami loaves sold in delis years ago. Often people would takesmall portions of bites that were taken out of them and then they were secretly returned to theshelves in the hopes that no one would notice them missing.(Phrack 12,p.44) Congress has been reacting to the outbreak of computer crimes. The U.S. House of JudiciaryCommittee approved a bipartisan computer crime bill that was expanded to make it a federalcrime to hack into credit and other data bases protected by federal privacy statutes.(Markoff, B13:1) This bill is generally creating several categories of federal misdemeanor felonies forunauthorized access to computers to obtain money, goods or services or classified information. This also applies to computers used by the federal government or used in interstate of foreigncommerce which would cover any system accessed by interstate telecommunication systems. Computer crime often requires more sophistications than people realize it.(Sullivan, 40:4) ManyU.S. businesses have ended up in bankruptcy court unaware that they have been victimized bydisgruntled employees. American businesses wishes that the computer security nightmare wouldvanish like a fairy tale. Information processing has grown into a gigantic industry. It accounted for$33 billion in services in 1983, and in 1988 it was accounted to be $88 billion. (Blumenthal, B1:2) All this information is vulnerable to greedy employees, nosy-teenagers and general carelessness,yet no one knows whether the sea of computer crimes is only as big as the Gulf of Mexico or ashuge as the North Atlantic. (Blumenthal,B 1:2) Vulnerability is likely to increase in the future. Andby the turn of the century, nearly all of the software to run computers will be bought from vendorsrather than developed in houses, standardized software will make theft easier. (Carley, A 1:1) A two-year secret service investigation code-named Operation Sun-Devil, targeted companies allover the United States and led to numerous seizures. Critics of Operation Sun-Devil claim that theSecret Service and the FBI, which have almost a similar operation, have conducted unreasonablesearch and seizures, they disrupted the lives and livelihoods of many people, and generallyconducted themselves in an unconstitutional manner. My whole life changed because of thatoperation. They charged me and I had to take them to court. I have to thank 2600 and EmmanuelGoldstein for publishing my story. I owe a lot to the fellow hackers and fellow hackers and theElectronic Frontier Foundation for coming up with the blunt of the legal fees so we could fight forour rights. (Interview with Steve Jackson, fellow hacker, who was charged in operation SunDevil) The case of Steve Jackson Games vs. Secret Service has yet to come to a verdict yet butshould very soon. The secret service seized all of Steve Jacksons computer materials which hemade a living on. They charged that he made games that published information on how to commitcomputer crimes. He was being charged with running a underground hack system. I told them itwas only a game and that I was angry and that was the way that I tell a story. I never thoughtHacker would cause such a problem. My biggest problem was that theyseized the BBS (Bulletin Board System) and because of that I had to make drastic cuts, so we laidof eight people out of 18. If the Secret Service had just come with a subpoena we could haveshowed or copied every file in the building for them.(Steve Jackson Interview) Computer professionals are grappling not only with issues of free speech and civil liberties, butalso with how to educate the public and the media to the difference between on-line computerexperimenter s. They also point out that, while the computer networks and the results are a newkind of crime, they are protected by the same laws and freedom of any real world domain. A 14-year old boy connects his home computer to a television line, and taps into the computer athis neighborhood bank and regularly transfers money into his personnel account.(2600:Spring93,p.19) On paper and on screens a popular new mythology is growing quickly in whichcomputer criminals are the Butch Cassidys of the electronic age. These true tales of computercapers are far from being futuristic fantasies.(2600:Spring 93:p.19) They are inspired by scores ofreal life cases. Computer crimes are not just crimes against the computer, but it is also against thetheft of money, information, software, benefits and welfare and many more. With the average damage from a computer crime amounting to about $.5 million, sophisticatedcomputer crimes can rock the industry.(Phrack 25,p.6) Computer crimes can take on manyforms. Swi ndling or stealing of money is one of the most common computer crime. An example ofthis kind of crime is the Well Fargo Bank that discovered an employee was using the bankscomputer to embezzle $21.3 million, it is the largest U.S. electronic bank fraud on record. (Phrack23,p.46) Credit Card scams are also a type of computer crime. This is one that fears many people and forgood reasons. A fellow computer hacker that goes by the handle of Raven is someone who useshis computer to access credit data bases. In a talk that I had with him he tried to explain what hedid and how he did it. He is a very intelligent person because he gained illegal access to a creditdata base and obtained the credit history of local residents. He then allegedly uses the residentsnames and credit information to apply for 24 Mastercards and Visa cards. He used the cards toissue himself at least 40,000 in cash from a number of automatic teller machines. He was caughtonce but was only withdrawing $200 and in was a minor larceny and they couldnt prove that hewas the one who did the other ones so he was put on probation. I was 17 and I needed moneyand the people in the underground taught me many things. I would not go back and not do what Idid but I would try not to get caught next time. I am the leader of HTH (High Tech Hoods) andwe are currently devising other ways to make money. If it werent for my computer my life wouldbe nothing like it is today.(Interview w/Raven) Finally, one of the thefts involving the computer is the theft of computer time. Most of us dontrealize this as a crime, but the congress consider this as a crime.(Ball,V85) Everyday people areurged to use the computer but sometimes the use becomes excessive or improper or both. Forexample, at most colleges computer time is thought of as free-good students and faculty oftencomputerizes mailing lists for their churches or fraternity organizations which might be written off asgood public relations. But, use of the computers for p rivate consulting projects without payment ofthe university is clearly improper. In business it is the similar. Management often looks the other way when employees playcomputer games or generate a Snoopy calendar. But, if this becomes excessive the employees isstealing work time. And computers can only process only so many tasks at once. Althoughconsidered less severe than other computer crimes such activities can represent a major businessloss. While most attention is currently being given to the criminal aspects of computer abuses, it is likelythat civil action will have an equally important effect on long term security problems.(Alexander,V119) The issue of computer crimes draw attention to the civil or liability aspects in computingenvironments. In the future there may tend to be more individual and class action suits. .ue1dab71a7c8e34bf2ec821da4de20d66 , .ue1dab71a7c8e34bf2ec821da4de20d66 .postImageUrl , .ue1dab71a7c8e34bf2ec821da4de20d66 .centered-text-area { min-height: 80px; position: relative; } .ue1dab71a7c8e34bf2ec821da4de20d66 , .ue1dab71a7c8e34bf2ec821da4de20d66:hover , .ue1dab71a7c8e34bf2ec821da4de20d66:visited , .ue1dab71a7c8e34bf2ec821da4de20d66:active { border:0!important; } .ue1dab71a7c8e34bf2ec821da4de20d66 .clearfix:after { content: ""; display: table; clear: both; } .ue1dab71a7c8e34bf2ec821da4de20d66 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ue1dab71a7c8e34bf2ec821da4de20d66:active , .ue1dab71a7c8e34bf2ec821da4de20d66:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ue1dab71a7c8e34bf2ec821da4de20d66 .centered-text-area { width: 100%; position: relative ; } .ue1dab71a7c8e34bf2ec821da4de20d66 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ue1dab71a7c8e34bf2ec821da4de20d66 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ue1dab71a7c8e34bf2ec821da4de20d66 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ue1dab71a7c8e34bf2ec821da4de20d66:hover .ctaButton { background-color: #34495E!important; } .ue1dab71a7c8e34bf2ec821da4de20d66 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ue1dab71a7c8e34bf2ec821da4de20d66 .ue1dab71a7c8e34bf2ec821da4de20d66-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ue1dab71a7c8e34bf2ec821da4de20d66:after { content: ""; display: block; clear: both; } READ: Writing Literary Works EssayCONCLUSION Computer crimes are fast and growing because the evolution of technology is fast, but theevolution of law is slow. While a variety of states have passed legislation relating to computercrime, the situation is a national problem that requires a national solution. Controls can be institutedwithin industries to prevent such crimes. Protection measures such as hardware identification,access controls software and disconnecting critical bank applications should be devised. However, computers dont commit crimes; people do. The perpetrators best advantage isignorance on the part of those protecting the system. Proper internal controls reduce theopportunity for fraud. BIBLIOGRAPHYAlexander, Charles, Crackdown on Computer Capers, Time, Feb. 8, 1982, V119. Ball, Leslie D., Computer Crime, Technology Review, April 1982, V85. Blumenthal,R. Going Undercover in the Computer Underworld. New York Times, Jan. 26,1993, B, 1:2. Carley, W. As Computers Flip, People Lose Grip in Saga of Sabatoge at Printing Firm. WallStreet Journal, Aug. 27, 1992, A, 1:1. Carley, W. In-House Hackers: Rigging Computers for Fraud or Malice Is Often an Inside Job. Wall Street Journal, Aug 27, 1992, A, 7:5. Markoff, J. Hackers Indicted on Spy Charges. New York Times, Dec. 8, 1992, B, 13:1. Finn, Nancy and Peter, Dont Rely on the Law to Stop Computer Crime, Computer World,Dec. 19, 1984, V18. Phrack Magazine issues 1-46. Compiled by Knight Lightning and Phiber Optik. Shannon, L R. THe Happy Hacker. New York Times, Mar. 21, 1993, 7, 16:2. Sharp, B. The Hacker Crackdown. New York Times, Dec. 20, 1992, 7, 18:3. Sullivan, D. U.S. Charges Young Hackers. New York Times, Nov. 15, 1992, 1, 40:4. 2600: The Hacker Quarterly. Issues Summer 92-Spring 93. Compiled by Emmanuel