U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Who Are the Computer Criminals?

NCJ Number
74893
Journal
Security Management Volume: 25 Issue: 1 Dated: (January 1981) Pages: 22,24-27
Author(s)
J Becker
Date Published
1981
Length
5 pages
Annotation
Based on an analysis of the cases in the files of the National Center for Computer Crime Data, a picture of the computer criminal is formed, noting how this type of criminal views the computer system. Security measures to combat computer crime are outlined.
Abstract
Most potential computer criminals cannot be identified before they have committed a crime; therefore, companies must rely on prevention measures which may help prohibit various sorts of criminal activity. Some computer personnel view their computers as 'playpens' and compromise computer security systems simply for pleasure. Limits on unauthorized computer use can dissuade this type of offender. Other personnel see nothing wrong with exploiting an obvious vulnerability in a computer system which they view as a 'land of opportunity.' Measures such as giving particular attention to computerized employees' accounts, rotating personnel from job to job, and watching out for irregular work habits can reduce a company's risks. Also, some offenders view computers as 'cookie jars' and divert funds to pay immediate debts. These offenses can be avoided if companies create atmospheres in which employees can seek out help when financial problems develop. Disgruntled employees may express their resentment in attacks on the company's computer, treating it as a 'war zone,' when no acceptable avenues exist to express resentment toward the employer. Others, the 'soapbox' computer criminals, find computers themselves anathema and see computer crime as a way to strike out against all computers. Physical security can prevent many such attacks. Some participants in computer crime act as though the computer environment was totally divorced from reality and see no danger in computer crime. To combat such offenders, companies should make it clear that each employee has a stake in computer security. Finally, other computer criminals see the computer as just another tool for committing crimes, such as obtaining free telephone services. Again, limited access to a computer is the best preventive measure. A reference list is not included.