This book both describes and criticizes the regulatory policies of the Federal Communications Commission (F.C.C.). If accepted, these criticisms would result in a comprehensive alteration of current F.C.C. policies.
Originally published in 1971
Autorentext
Harvey J. Levin
Zusammenfassung
This book, written by two leading authorities in the field, provides a systematic application of concepts of situational crime prevention to internet and e-commerce crime, exploring ways in which concepts of crime prevention developed in other contexts can be fruitfully applied in this new environment. Their argument is that situational crime prevention works, and is ideally suited to proving the means of developing measures to combat rapidly growing e-commerce crime. Chapters in the book seek to identify the specific opportunities and transactions in which crime can occur in the e-commerce environment, and the different kinds of information which are crime targets --identified as intellectual property, intelligence, information systems and services of various kinds (banking, purchasing etc). Consumer products are also examined with a view to identifying the elements that make them particularly vulnerable to theft.
Inhalt
Introduction; One: The Spectrum System; I: Economic and Physical Character of the Radio Spectrum; II: Major Components of the Spectrum System; III: The Goals of National Spectrum Management; Two: Alternatives in Spectrum Allocation and Management; IV: Freely Transferable Rights; V: Toward a Regulated Market-Type System with Prices; VI: New Administrative Techniques; VII: The Case for Secondary Rights; Three: The Level of Spectrum Development; VIII: Spectrum Scarcity and Technological Change; IX: Government's Role in Spectrum Development: The Record; Four: Allocation, Regulation, Prices, and Service; X: The Rationale of Competitive Alternatives in Common Carrier Rate Regulation; XI: Competitive Alternatives in Practice; XII: Broadcast Allocations in Theory and Fact; XIII: The Effects of Broadcast Licensing; Four: Conclusion