personal (desktop)computers could be used to duplicate proprietary software programs. And concernsassociated with computer crime appeared during this phase because individuals couldnow use computing devices, including remote computer terminals, to break into anddisrupt the computer systems of large organizations.
groups - Private citizens using personals computers to duplicate software and large orgs.
issues - duplication and this type peer to peer file transfers are considered theft by many.