U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

International Summaries: Computer Technology and Crime

NCJ Number
99853
Author(s)
A Solarz
Date Published
1986
Length
4 pages
Annotation
This report describes evolving forms of computer crime in Sweden, discusses traditional criminological theory's application to the causes and motivation for computer crime, and presents two empirical studies of computer crime involving embezzlement and theft.
Abstract
Opportunity structure theories are appropriate when attempting to explain the development of computer crime. Factors which make computer crime attractive are the complexity and concentration of data in massive data systems, the geographic distance between offenders and victims, the high incidence of computer error which can hide criminal activity, the anonymity of the work environment, and the speed with which the crime can accomplished. The first empirical study reported examined all crimes of grave embezzlement (351) in Sweden between 1981 and 1983. Of the 228 cases examined in detail, 48 involved computers, and 180 did not. Banks and post offices were the most likely targets for computerized embezzlement. In Sweden, post offices act as banks for simple, routine operations. This study profiles the offenders who committed computerized embezzlement. The second study examined the 59 computer equipment thefts reported to the Goteborg police for 1980-84. Thefts were most often from cars, and there was an increase in such thefts over the study period. Overall, the results from both studies point to the need to reduce vulnerability by reducing the opportunities to access computer systems illegally. 2 figures.