skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 218029 
Title: Technology, Crime Control and the Private Sector in the 21st Century (From The New Technology of Crime, Law and Social Control, P 49-79, 2007, James M. Byrne and Donald J. Rebovich, eds. -- See NCJ-218026)
Author(s): Donald J. Rebovich; Anthony Martino
Date Published: 2007
Page Count: 31
Sponsoring Agency: Criminal Justice Press/Willow Tree Press
Sale Source: Criminal Justice Press/Willow Tree Press
United States of America
Type: Issue Overview
Format: Book Chapter
Language: English
Country: United States of America
Annotation: This chapter examines the role of the private sector in developing and marketing technologies designed to counter the ways criminals are using various technologies to commit crimes.
Abstract: The private sector has a long history of developing technologies that can be used by law enforcement in implementing its crime-control tasks; however, there is no precedent for the private sector's dominance in the control and prevention of computer-related crime and identity theft. The private-sector's response to the increasing rate of computer-related crime has given birth to a growth industry, i.e., computer crime forensics. Law enforcement agencies depend on the private sector to provide the forensic tools needed to detect and track various types of computer crime. Firms that specialize in computer forensics are able to recover evidence of crimes in the form of e-mail communications, Web sites visited, file destruction, and account alteration. These same firms market their services to businesses for the purposes of identifying the risk for fraud, employee background checks, and the protection of information from unauthorized access. The private sector must continue to develop and perfect authentication methods and risk management strategies that can be shared in a protected environment. Law enforcement agencies, academic institutions, and private industry must engage in joint enterprises that aim to define the challenges of countering various types of computer crime, with a view toward developing technological tools that can prevent, detect, and assist in investigating these crimes. 43 references
Main Term(s): Technology transfer
Index Term(s): Business security; Computer aided operations; Computer privacy and security; Computer software; Corrections Equipment; Court Equipment; Identity Theft; Industrial security; Information Security; Police equipment; Private sector-government cooperation
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.