| |
| |
Why Consider Opposing Viewpoints? | |
| |
| |
Introduction | |
| |
| |
| |
Is Cyber Crime a Serious Problem? | |
| |
| |
Chapter Preface | |
| |
| |
| |
Identity Theft Is a Serious Problem | |
| |
| |
| |
| |
Identity Theft Is a Declining Problem | |
| |
| |
| |
| |
Cyber-Terrorism Poses a Serious Threat to Global Security | |
| |
| |
| |
| |
The Problem of Cyberterrorism Is Exaggerated | |
| |
| |
| |
| |
Internet Piracy Threatens the Entertainment Industry | |
| |
| |
| |
| |
The Problem of Internet Piracy Is Overstated | |
| |
| |
| |
| |
Online Predators Are a Serious Threat | |
| |
| |
| |
| |
The Media Stereotype of Online Predators Is Inaccurate | |
| |
| |
| |
Periodical Bibliography | |
| |
| |
| |
What Factors Contribute to Cyber Crime? | |
| |
| |
Chapter Preface | |
| |
| |
| |
Organizational Mismanagement, Not Hackers, Explain Most Data Breaches | |
| |
| |
| |
| |
Vigilantism Motivates Some to Violate Cyber Laws | |
| |
| |
| |
| |
Peer-to-Peer File-Sharing Is a Form of Rebellion Against Corporate Tyranny | |
| |
| |
| |
| |
The Internet Helps Promote Terrorism | |
| |
| |
| |
| |
Stalkers Use the Internet to Pursue Their Victims | |
| |
| |
| |
Periodical Bibliography | |
| |
| |
| |
How Can Companies and Consumers Reduce the Impact of Cyber Crime? | |
| |
| |
Chapter Preface | |
| |
| |
| |
Consumers Should Be Allowed to Freeze Their Credit History | |
| |
| |
| |
| |
Consumers Should Not Be Allowed to Freeze Their Credit History | |
| |
| |
| |
| |
Software Manufacturers Should Be Liable for Internet Security Breaches | |
| |
| |
| |
| |
Software Companies Should Not Be Liable for Internet Security Breaches | |
| |
| |
| |
| |
Colleges Should Play a Greater Role in Combating Internet Piracy | |
| |
| |
| |
| |
Combating Internet Piracy Is Not an Appropriate Role for Colleges | |
| |
| |
| |
Periodical Bibliography | |
| |
| |
| |
What Laws Will Best Prevent Cyber Crime? | |
| |
| |
Chapter Preface | |
| |
| |
| |
A Federal Data Breach Notification Standard Is Necessary | |
| |
| |
| |
| |
Weak Federal Disclosure Laws Will Not Protect Consumers | |
| |
| |
| |
| |
The Cybercrime Treaty Will Improve the Global Fight Against Internet Crime | |
| |
| |
| |
The Cybercrime Treaty Threatens Civil Liberties | |
| |
| |
| |
| |
A Crackdown on Student Internet Copyright Infringers Is Necessary | |
| |
| |
| |
| |
A Crackdown on Student File-Sharing Is an Ineffective Strategy | |
| |
| |
| |
| |
A Federal Cyber-Stalking Law Will Protect Victims | |
| |
| |
| |
| |
The Federal Cyber-Stalking Law Violates Free Speech | |
| |
| |
| |
Periodical Bibliography | |
| |
| |
For Further Discussion | |
| |
| |
Organizations to Contact | |
| |
| |
Bibliography of Books | |
| |
| |
Index | |