{"title":"Measuring Computer Use Norms","authors":"Matthew B. Kugler","doi":"10.2139/SSRN.2675895","DOIUrl":null,"url":null,"abstract":"The Computer Fraud and Abuse Act prohibits unauthorized use of computer systems. One proposed method of defining unauthorized use is to use the norms of actual computer users, restricting punishment to that which many or all agree to be unauthorized. This study measures lay authorization beliefs and punishment preferences for a variety of computer misuse activities. Though perceived authorization is strongly predictive of punishment attitudes, results show that many people view common misuse activities as unauthorized but not deserving of any meaningful punishment. Respondents also viewed as unauthorized many activities – such as ignoring a website’s terms of service, surfing the news while at work, or connecting to a neighbor’s unsecured wireless network – that scholars have argued are implicitly licensed. This divergence between perceived authorization and desired punishment presents a challenge for the CFAA framework. To avoid results that would strike both the lay public and field experts as overcriminalization, “unauthorized use” must therefore be interpreted far more narrowly than common usage would suggest.","PeriodicalId":47068,"journal":{"name":"George Washington Law Review","volume":"84 1","pages":"1568-1590"},"PeriodicalIF":1.6000,"publicationDate":"2016-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.2139/SSRN.2675895","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"George Washington Law Review","FirstCategoryId":"90","ListUrlMain":"https://doi.org/10.2139/SSRN.2675895","RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"LAW","Score":null,"Total":0}
引用次数: 2
Abstract
The Computer Fraud and Abuse Act prohibits unauthorized use of computer systems. One proposed method of defining unauthorized use is to use the norms of actual computer users, restricting punishment to that which many or all agree to be unauthorized. This study measures lay authorization beliefs and punishment preferences for a variety of computer misuse activities. Though perceived authorization is strongly predictive of punishment attitudes, results show that many people view common misuse activities as unauthorized but not deserving of any meaningful punishment. Respondents also viewed as unauthorized many activities – such as ignoring a website’s terms of service, surfing the news while at work, or connecting to a neighbor’s unsecured wireless network – that scholars have argued are implicitly licensed. This divergence between perceived authorization and desired punishment presents a challenge for the CFAA framework. To avoid results that would strike both the lay public and field experts as overcriminalization, “unauthorized use” must therefore be interpreted far more narrowly than common usage would suggest.