assi2

  • October 02, 2024/

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

 

Chapter 3 • The Criminology of Computer Crime

BOX 3.6

Assignment Instructions

In order to complete Assignment #2 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #2). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday. 

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Please read the Time Bomb Case (Box 3.6) found on page 60 in Chapter 3. 

Which theory do you believe applies to this case? Please explain the reasons why the theory you picked applies

 

Time Bomb Attacks by an Insider

William Carl Shea, aged 39, was hired around August 2001 as a programmer and manager for Bay Area Credit Services Inc., in San Jose, California. Shea’s position gave him administrative access to and familiarity with the company’s computer systems, including the database server. He was noti- fied of poor job performance in 2002 and was given an improvement plan in 2003. He was fired on January 17, 2003, when he failed to show up at work. Around this period, a malicious code “time bomb” was placed on the company network that was set to delete and change data at the end of the month. This malicious software caused financial

records to be altered and removed and disrupted the computer networks within the company, affecting more than 50,000 debtor accounts. Shea was sentenced to 12 months and 1 day in prison, 6 months of home confinement with electronic monitoring, and three years of supervised release for his jury conviction.

Which theory do you think applies best to this case?

Source: http://www.usdoj.gov/criminal/cybercrime/shea Sent.htm