skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 221088 Find in a Library
Title: Future Directions in Technology-Enabled Crime: 2007-09
Author(s): Kim-Kwang Raymond Choo; Russell G. Smith; Rob McCusker
Date Published: 2007
Page Count: 162
Sponsoring Agency: Australian High Tech Crime Centre
Canberra, ACT 2602, Australia
Australian Institute of Criminology
Canberra ACT, 2601, Australia
Publication Number: ISBN 978-1-921185-44-1
Sale Source: Australian Institute of Criminology
GPO Box 2944
Canberra ACT, 2601,
Type: Issue Overview
Format: Book (Softbound)
Language: English
Country: Australia
Annotation: This report examines opportunities for the criminal exploitation of ever-expanding technologies in information and communications in Australia and internationally and their implications for policing, policy, and legislation.
Abstract: Globalization and the new economy, enabled by the latest Internet-based technologies and e-commerce, have created new and greater opportunities for fraud against both businesses and consumers. Computer-facilitated frauds include advanced fee scams, online auction fraud, fraudulent lottery schemes, modem and Web-page hijacking, and identity theft. Also, criminals will seek to gain unauthorized access to computers and networks in order to disable security and alarm systems or design "malware" programs that circumvent existing security controls. Malware authors will continue to explore ways in which to deny or delay victims' access to information regarding the source or nature of malware infection. The transfer of technology to countries with less advanced protections for intellectual property as part of investment and outsourcing projects will increase the risk of counterfeiting, piracy, illegal transfer of technology, and the facilitation of industrial espionage. There will also be increased opportunities for the circulation of child pornography, the targeting of young Internet users, the expanded use of the Internet by organized crime and terrorists to plan and pursue their crimes, and threats to national information infrastructure. In Australia, the growing body of law relating to computer technology is likely to increase. Investigations and prosecutions are likely to become more complex and lengthy, as well as involve multiple suspects. This will have resource and training implications nationally and internationally. Issues of multiple jurisdictions in a given case will also become more frequent. New and sophisticated defenses for technology-enabled crime will emerge, including challenges to the legality of electronic searches by law enforcement officers. New evidence presentation and sentencing issues will also arise. 9 tables and 288 references
Main Term(s): Criminology
Index Term(s): Computer abuse; Computer aided operations; Computer crime investigative Training; Computer evidence; Computer related crime; Computer viruses; Computer-related crime legislation; Foreign laws; Foreign police; Information processing; Information Systems and Technology; Police policies and procedures; Prosecution; Science and Technology
Note: Research and Public Policy Series, No.78
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.