亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? computer rights vs first and forth amentment right.txt

?? 黑客培訓教程
?? TXT
?? 第 1 頁 / 共 3 頁
字號:
        COMPUTER PRIVACY VS. FIRST AND FOURTH AMENDMENT RIGHTS                       (By Michael S. Borella)<Mike Borella received a bachelor's degree in Computer Science andTechnical Communication from Clarkson University (1991). He iscurrently a graduate student and teaching assistant in ComputerScience at U.  Cal. at Davis. This paper is the result of anindependent study sponsored by Susan Ross, an assistant professor inTechnical Communication at Clarkson. e-mailborella@toadflax.eecs.ucdavis or sross@clutx.clarkson.edu>I: What is Cyberspace?            "Cyberspace.  A consensual hallucination experienced daily        by billions of legitimate operators, in every nation...  A        graphical representation of data abstracted from the banks        of every computer in the human system.  Unthinkable        complexity.  Lines of light ranged in the nonspace of the        mind, clusters and constellations of data.  Like city lights,        receding..."                                        - William Gibson, Neuromancer        Even after reading William Gibson's cyberpunk novels, one'sconceptualization of cyberspace, the electronic world of computers andcomputer networks, can be insubstantial.  Gibson describes cyberspace asa world of simulated stimulation that a computer feeds to a "jockey"(computer operator) via a "cyberspace deck" (human-computer interface).Explorers in Gibson's cyberspace often have difficulty telling what isreal and what is not.  Frequently, in our world, the novice computeruser has similar problems understanding how to use the potential wealthof information at their finger tips.  In Gibson's uncharted future,people access computers by merging their thoughts with a database.Today we can "enter" cyberspace through keyboard and modem.  But whatactually is cyberspace?  Is it real?  What does it look like?  What aresome of the personal and legal issues emerging from this vastlyuncharted new frontier?  This paper will answer those questions and moreas we explore cyberspace, meet its frequenters, and discuss itsincreasing role in the life of every human being, not just those whoactually use a computer.        Before we embark on our journey through the legal battles andrights issues regarding cyberspace, we need a working knowledge of whatit is and how computer operators use it.        Envision a roadmap.  Cities dot the otherwise sparse landscapeand roads branch out in all directions, connecting every city.  Thisnetwork leaves no city unserviced. Although not every city is connectedto every other, it is possible to reach any one city from any other.Like every other mass transit system, certain areas are more travelledthan others.  Some cities are larger than others and some stretches ofroad are more prone to traffic.  The size and complexity of this roadmapdefies the imagination - it encircles the world.        But the cities are not actually cities.  They are computers orgroups of computers.  The roads are telephone lines or fiber-opticcable.  The system surrounds the globe in an electronic web of data.The travellers on these 'virtual' roads are packets of information whichare sent from one city to another, perhaps via many.  The roadmap is aworldwide computer "network."  Each city is a depot or terminal for thepackets, and is usually referred to as a "node."  In reality they aremainframes owned by universities, companies, or groups of computerusers.  There are several worldwide computer networks currently inexistence.        Every individual who has an account on any mainframe in theworld has their own unique electronic address.  It is not unlike amailbox, except that it can only receive mail of the electronic kind.Electronic addresses are similar to postal addresses in that theycontain:        --a name, or user identification which corresponds to the        individual computer user who owns the particular address.        --a local machine name, which is the specific mainframe that the        userid is on.  Local names are only used in the node consists of        more than one mainframe.  This is not unlike a street address.        --a node name, which corresponds to the physical location of the        node that the userid belongs to.  This is not unlike a city        address and/or zip code.        This is all a network needs to know before it can sendinformation from one mailbox to another.  Just like postal mail, if theuser doesn't address mail correctly, the network will return it.  In thecase of e-mail (electronic mail) a simple misspelling will cause thenetwork to return the mail, or send it to an improper destination.  Eachof the several worldwide networks has its own unique but similar methodfor addressing e-mail.  Corresponding via electronic mail has beenavailable to some academicians for over 20 years, but today it ispossible for anybody with a computer and a modem to have their ownmailbox.  For the sake of convenience, many useful physical objects havebeen abstracted into cyberspace.  Computerized filing systems(databases), bulletin boards, and electronically published digests andmagazines proliferate in the virtual world of networks.  Many of theseelectronic items are being treated differently than their "real"counterparts.  Often, due to the convenience of having millions ofpieces of data available in seconds, individual privacy rights areviolated.  This is leading to debate and litigation concerning the useof various aspects of cyberspace.  The next sections cover thesituations, people, and legislation of this untamed and largelyundefined frontier.II: Databases        A database is a collection facts, figures, numbers, and wordsthat are sorted in a particular order and/or indexed. They are stored ona computer so that retrieval is quick and simple.  Often, databases areused by the government, corporations, and private businesses to keeptrack of the names, address, phone numbers, and other relevant dataabout their clients, subscribers, members, etc.  For example, mostpublic libraries have databases containing information of every personwho has a card at that library.  Besides the name, address, and phonenumber of the card holder, the library's database would also containinformation regarding what books the holder is currently borrowing,whether they are overdue or not, and when each person's library cardexpires.        Similarly, banks have databases containing information regardingthe persons they transact with.  Again, name, address and phone numberis essential, but the bank would also be interested in social securitynumber, credit rating, assets, mortgage information, and so on.  Byorganizing this data on a computer, the bank increases its efficiency.It is able to serve more customers in less time, and provide monetarytransactions within seconds.  Anyone who has used a bank card at anautomated teller can attest to this.        But all databases are not used for such beneficial purposes.  Aswe will see in the next section, even the information stored in "benign"databases can be used to violate privacy rights.        In 1967, J. Edgar Hoover, then head of the FBI, created theNational Crime Information Center (NCIC).  This organization's purposeis to use a computerized database containing the criminal record ofevery United States citizen to increase the efficiency of all levels oflaw enforcement by facilitating quick exchange of information.  TheNCIC's federal databanks interface with over 64,000 state and localgovernments' computer networks, and even with some criminal databases offoreign countries.  This widespread and far-reaching power is used byeveryone from top FBI investigators to county and municipal patrolofficers.  For example, if a police officer pulls over a speeder in NewYork, they can check, within a matter of seconds, if that person iswanted in any other state, and if that person has a criminal record.        The NCIC contains records on every person arrested in the UnitedStates, which amounts to approximately 40 million people, a numberequivalent to one-third of the work force (Gordon and Churchill, p.497). It goes without saying that the holders of this information haveincredible power.  However, at first glance, the existence of the NCIC'sdatabases seem completely beneficial; in fact they do much to protectthe privacy of the average American.  Authorities can find out if anindividual is wanted for a crime and detain that person if necessary,all with the push of a few buttons.  Effective law enforcement does makethe country a safer place for its citizens.  But, as we will see, thecurrent state of and uses for the NCIC do infringe upon individualprivacy.        There are many cases in which the NCIC databases have beenfound to hold inaccurate and incomplete information. Keep in mind thatthey only contain arrest records, not conviction records.  If anindividual has been acquitted of a charge, it does not necessarily getentered into the computers.  An example of this was the legal battlefought by Los Angeles native Terry Dean Rogan.  After Rogan lost hiswallet, a man using his identification was linked to four crimes,including two murders.  Rogan was mistakenly arrested, and an NCIC filewas made about him.  The file was inaccurate - it did not contain adescription of him.  As a result, he was arrested four times for crimeshe didn't commit.  Rogan successfully sued to city if Los Angeles in1987 for violating his Fourth Amendment rights (Science Court Opinions,p. 99).  But some victims of NCIC errors don't get off so easily.        In 1979, Michael Ducross of Huntington Beach California made aminor traffic violation on his way to the supermarket one day.  Thepolice officer radioed for a check on Ducross.  When a police stationdesk clerk punched up the NCIC database to see if Ducross had a file, hegot a surprising result.  Ducross was wanted for going AWOL from theMarine Corps 10 years earlier.  He was seized and held for five monthsat Camp Pendleton.  The Marine Corps eventually dropped the chargesbecause he had never actually gone AWOL.  Ducross was a Native American,and he had left the Corps on a special discharge program available onlyto Native Americans and foreign citizens (Burnham, pp. 33-34).        But these are just two isolated examples, right?  Wrong!  Astudy by the Congressional Office of Technology Assistance (OTA)conducted in 1982 found that, "...as many as one-third of state recordslacked information about the disposition of the cases on file.Therefore, an arrest in one state, which may have resulted in adismissal or an acquittal, could in another state influence the decisionto withhold bail or to prosecute the defendant as a 'career criminal.' "(Gordon and Churchill, p. 514).  The OTA study found that, at best, 49.5percent of the NCIC Criminal History records were complete, correct, andunambiguous (Burnham, p. 74).        It's bad enough that the NCIC files are largely inaccurate -thatyour Fourth Amendment rights protecting unlawful search and seizure canbe lawfully violated if you have been previously arrested for a crimeyou didn't commit - but these computerized criminal files are used formuch more than law enforcement, and are used by more than just lawenforcement agencies.  Approximately 90 percent of all criminalhistories in the United States are available to public and privateemployers (Gordon and Churchill, p. 515).        Nor is the NCIC without local competition. For example, oneRhode Island data merchant, whose clients are mostly prospectiveemployers, keeps files on people who have been arrested butno necessarily convicted of a crime. That merchant includes in the filesnames of individuals taken from local newspaper stories (ConsumerReports).        If arrest records but not conviction records are available,might not they influence hiring decisions? For example, might not anemployer finding a record of arrests in the file of a person claiming a"clean record" on an employment application question the credibility ofthe applicant's claim and make a decision not to hire influenced by thatdoubt? Given that the applicant would not be aware that such a databasehad been consulted, he or she could not possibly mount a defense if theinformation in the file was inaccurate (e.g., someone else's arrests) ormisleading (e.g. no arrests led to convictions).        Since 40 million US citizens have an arrest record, thesocial cost is potentially high.  In several states, includingCalifornia and Connecticut, more than half of the information requeststo criminal history databases were made by employers (Gordon andChurchill, p.  515).        But the problems don't end there.  In 1981, mainly becauseof John Hinckley's attempt on then President Ronald Reagan's life, about400 files were added to the NCIC database.  These were of people who hadno criminal record and were wanted for no crime!  Why were they beingentered into the computers?  Because these individuals were considered"a potential danger" by the Secret Service.  Secret Service DirectorJohn R. Simpson stated that listing these people would provide aninvaluable tool for tracking their location and activities (Epstein, p.17).  This shows that the government is only paying lip service to the"innocent until proven guilty" precedent that our freedom is based on.The "potential danger" would be to members of the FBI protectorate,including the President, Congress members, and controversial politicaland social figures such as Jacqueline Onassis.  Considering how"accurate" the files have been proven to be, one can imagine theatrocities possible (and encouraged) under these provisions.        But there are more culprits to this mess than just thegovernment. The use of databases in the violation of privacy extendsinto the corporate world.  The U.D. Registry Inc. was formed in 1977 byHarvey Saltz, a former deputy district attorney in Los Angeles.  "Usinga computer to store information obtained from legal charges filed bylandlords in the courts, Saltz says he currently has compiled more thana million records about such disputes all over the Los Angeles area.Over 1900 landlords pay Saltz an annual fee ranging from $35 to $60...todetermine whether the individuals who come to them for housing have hadarguments with other landlords in the past." (Burnham, p. 34).  And justlike the NCIC, Saltz's database was found to be less than reliable.        In 1978, Lucky Kellener paid the rent to his brother'sapartment. But when his brother was evicted, Kellener's name wasincluded in the U.D. Registry files, defining him as an undesirabletenant.  When Kellener went looking for a new apartment in 1981, he gotrepeatedly turned down and brushed off.  Finally, a landlord told himthat he had been blacklisted (Burnham, pp. 34-35).        Another victim was Barbara Ward, who moved to Los Angeles and

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产精品一区二区久久不卡| 欧美性做爰猛烈叫床潮| 欧美mv日韩mv亚洲| 久久精品99国产精品| 久久综合精品国产一区二区三区 | 亚洲国产精华液网站w | 九一九一国产精品| 久久女同互慰一区二区三区| 国产91精品精华液一区二区三区 | 中文字幕高清不卡| 色88888久久久久久影院野外| 亚洲一区二区三区中文字幕| 91精品在线免费| 国产精品影视天天线| 亚洲免费观看在线视频| 欧美日韩大陆一区二区| 国产精品一二三四| 亚洲一区视频在线| www精品美女久久久tv| 99国产精品国产精品毛片| 亚洲成av人片一区二区| 精品成人一区二区| 国产精品丝袜黑色高跟| 亚洲一区二区三区在线| 另类欧美日韩国产在线| jvid福利写真一区二区三区| 欧美精品一二三| 久久精品亚洲麻豆av一区二区| 亚洲日本韩国一区| 精品一区免费av| 色婷婷综合中文久久一本| 精品av久久707| 亚洲国产一区二区三区| kk眼镜猥琐国模调教系列一区二区 | 91福利在线导航| 久久九九影视网| 国产精品系列在线观看| 欧美影视一区二区三区| 亚洲精品日韩综合观看成人91| 精品99久久久久久| 久久久久97国产精华液好用吗 | 午夜亚洲国产au精品一区二区| www精品美女久久久tv| 中文字幕精品三区| 另类人妖一区二区av| 一区二区三区四区五区视频在线观看 | 精品久久久久久久久久久院品网 | 色欧美片视频在线观看| 日韩三级在线观看| 日韩电影在线免费看| 欧美一区二区黄色| 成人免费福利片| 亚洲免费在线播放| 亚洲精品第一国产综合野| 国产女人aaa级久久久级| 欧美xingq一区二区| 91黄色激情网站| 国产91在线|亚洲| 理论电影国产精品| 日本不卡一区二区三区高清视频| 久久久久国产免费免费| 欧美色爱综合网| 欧美女孩性生活视频| 亚洲午夜久久久久| 日韩一区二区在线看片| 成人国产精品免费网站| 日韩精品国产欧美| 国产福利精品导航| 色先锋资源久久综合| 波多野洁衣一区| 粉嫩久久99精品久久久久久夜| 免费日韩伦理电影| 男人操女人的视频在线观看欧美| 亚洲一区二区三区爽爽爽爽爽| 亚洲精品视频免费看| 亚洲欧美日韩一区二区三区在线观看| 国产日韩欧美精品一区| 国产午夜精品久久久久久免费视 | 91精品蜜臀在线一区尤物| 欧美日韩成人激情| 欧美人成免费网站| 3d成人h动漫网站入口| 欧美一区二区三区四区高清| 欧美一区二区三区精品| 日韩欧美综合一区| 久久久美女艺术照精彩视频福利播放| 精品国产乱码久久久久久图片| 久久嫩草精品久久久久| 国产欧美日韩亚州综合| 国产精品国产三级国产专播品爱网| 亚洲成人三级小说| 三级久久三级久久久| 老汉av免费一区二区三区| 国产伦精一区二区三区| 成人av在线资源| 91免费观看视频| 欧美日韩视频在线第一区| 日韩一级片网址| 久久综合久久综合久久综合| 中文字幕乱码一区二区免费| 亚洲欧美一区二区三区极速播放| 一区二区三区成人| 免费成人在线播放| 成人一区二区三区视频| 色婷婷亚洲综合| 欧美成人猛片aaaaaaa| 国产蜜臀97一区二区三区| 一区av在线播放| 美女高潮久久久| 成人免费视频视频在线观看免费| 欧美中文字幕一区二区三区| 日韩一级免费一区| 1024精品合集| 男人操女人的视频在线观看欧美| 国产a区久久久| 欧美性受xxxx黑人xyx性爽| 日韩精品一区二区三区中文不卡| 日本一区二区三区视频视频| 亚洲成av人片一区二区梦乃| 国产白丝网站精品污在线入口| 91黄色在线观看| 国产亚洲人成网站| 亚洲国产精品久久艾草纯爱| 国产成人免费在线| 欧美日韩一级片在线观看| 国产日韩欧美一区二区三区乱码| 亚洲国产aⅴ天堂久久| 国产精品99久久久久久有的能看| 欧美日韩大陆一区二区| 中文字幕色av一区二区三区| 另类小说综合欧美亚洲| 欧美亚洲国产一区二区三区va| 久久久久久一级片| 日本人妖一区二区| 在线观看日韩av先锋影音电影院| 亚洲制服丝袜av| 午夜一区二区三区视频| 性做久久久久久免费观看| 91年精品国产| 色呦呦一区二区三区| 日本一区二区动态图| 久久先锋影音av鲁色资源网| 欧美性欧美巨大黑白大战| 丰满放荡岳乱妇91ww| 91精品国产麻豆| 亚洲已满18点击进入久久| 成人激情午夜影院| 26uuu亚洲综合色| 免费成人av资源网| 欧美日韩亚洲高清一区二区| 亚洲人成小说网站色在线 | 寂寞少妇一区二区三区| 欧美日本韩国一区二区三区视频| 国产精品久久久久久久裸模| 国产露脸91国语对白| 精品免费一区二区三区| 日韩精品一级中文字幕精品视频免费观看 | 欧美高清hd18日本| 亚洲成人在线免费| 欧美午夜不卡视频| 亚洲午夜在线视频| 欧美在线一二三| 亚洲制服丝袜一区| 欧美在线一区二区三区| 亚洲夂夂婷婷色拍ww47| 精品一区在线看| 亚洲视频在线观看一区| 99精品1区2区| 日本特黄久久久高潮| 欧美激情在线看| 欧美三级视频在线播放| 国产乱子轮精品视频| 精品久久人人做人人爽| 成人动漫中文字幕| 男女激情视频一区| 亚洲欧洲韩国日本视频| 欧美日韩精品欧美日韩精品一综合| 国产一区在线观看麻豆| 亚洲精品v日韩精品| 中文字幕+乱码+中文字幕一区| 欧洲av在线精品| 97aⅴ精品视频一二三区| 九九九精品视频| 亚洲不卡av一区二区三区| 中文字幕日本不卡| 久久色在线视频| 欧美精品视频www在线观看 | 国产成人在线看| 国模娜娜一区二区三区| 91视频.com| 国产三级一区二区| 亚洲欧美日韩国产综合| 视频一区在线视频| 国产精品污www在线观看| 欧美在线一区二区| 色狠狠一区二区| 在线观看免费一区| 91老师国产黑色丝袜在线| 久久久国产一区二区三区四区小说| 国产在线精品一区二区夜色|