U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Computer Crime - The Who, What, Where, When, Why and How, Part 2

NCJ Number
102926
Journal
Data Processing and Communications Security Volume: 10 Issue: 2 Dated: (Spring 1986) Pages: 25-30
Author(s)
J Bologna
Date Published
1986
Length
6 pages
Annotation
This article discusses computer crime motivations and outlines organizational and security measures that counter computer crime.
Abstract
Personal motives underlying computer crime are economic, egocentric, ideological, and psychotic. Environmental motives or stimuli are the work environment, the reward system, the level of interpersonal trust, the ethics level, the stress level, and the level of internal controls. Part of computer crime prevention is the development of an organizational environment that diminishes the motivation for computer crime by providing alternative motivational stimuli and factors which increase the probability that the crime will be discovered. Important factors in the motivational environment are adequate rewards, management controls, performance feedback mechanisms, operational reviews, and factors to counter employee hostility. Factors that increase the probability that computer crime will be discovered include internal accounting controls, computer access controls, an exceptions logging system, a management information system, and intelligence gathering. This article lists the organizational factors that create high-fraud and low-fraud potential. A list of security measures to counter computer crime includes passwords, compartmentalization of employee responsibilities, voice print and fingerprint recognition, a time lock, personal signature recognition, and data communications controls.

Downloads

No download available

Availability