skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 44433 Find in a Library
Title: THOSE HIDDEN 'OPPORTUNITIES' FOR COMPUTER CRIME
Journal: ADMINISTRATIVE MANAGEMENT  Volume:39  Issue:1  Dated:(JANUARY 1978)  Pages:65,66,68,72,74,76,78
Author(s): D GOTTHEIMER
Corporate Author: Geyer-Mcallister Publications, Inc.
United States of America
Date Published: 1978
Page Count: 7
Sponsoring Agency: Geyer-Mcallister Publications, Inc.
New York, NY 10010
Format: Article
Language: English
Country: United States of America
Annotation: THE SCOPE OF COMPUTER ABUSE IN PRIVATE INDUSTRY IS EXAMINED, WITH REFERENCE TO EXAMPLES OF COMPUTER-RELATED CRIMES INVOLVING FRAUD, PHYSICAL ATTACKS ON HARDWARE, THEFT, AND MALICIOUS ACTS BY EMPLOYEES.
Abstract: AS OF 1975, 374 CASES INVOLVING COMPUTERS IN SUCH CRIMES AS FRAUD, EMBEZZLEMENT, TERRORISM, THEFT, LARCENY, EXTORTION, MALICIOUS MISCHIEF, ESPIONAGE, AND SABOTAGE HAD BEEN DOCUMENTED. COMPUTER ABUSE HAS BECOME THE THIRD MOST SERIOUS DATA-PROCESSING PROBLEM FACING BUSINESS, SUPERSEDED ONLY BY PROBLEMS CAUSED BY ERRORS AND OMISSIONS AND BY NATURAL DISASTERS. IT HAS BEEN ESTIMATED THAT TAMPERING WITH COMPUTERS HAS COST BUSINESS FROM $10 TO $15 MILLION A YEAR THROUGHOUT THE 1970'S. THE LARGEST SUM LOST IN A SINGLE FRAUD INVOLVING COMPUTER ABUSE WAS THAT IN THE EQUITY FUNDING CORPORATION CASE, WHICH SERVED TO ALERT THE BUSINESS WORLD TO THE NEED FOR COMPUTER SECURITY. ONE OUTGROWTH OF THE EQUITY FUNDING CASE HAS BEEN THE DEVELOPMENT OF TRAINING PROGRAMS DESIGNED TO HELP AUDITORS ESTABLISH AUDIT TRAILS IN ORGANIZATIONS THAT USE COMPUTERIZED ACCOUNTING SYSTEMS. INCIDENTS OF COMPUTER ABUSE DO NOT ALWAYS INVOLVE THE THEFT OF MONEY. THERE HAVE BEEN CASES INVOLVING THE THEFT OF COMPUTER PROGRAMS, THE MANIPULATION OF CREDIT-RATING DATA, THE THEFT OF MATERIAL GOODS, AND ACTUAL PHYSICAL ATTACKS ON COMPUTERS. THERE HAVE BEEN MANY INSTANCES IN WHICH COMPUTER ABUSES HAVE BEEN PERPETRATED BY PEOPLE WITH VERY LITTLE KNOWLEDGE OF COMPUTER TECHNOLOGY. POSSIBLE MOTIVATING FACTORS IN COMPUTER ABUSE INCLUDE THE INTELLECTUAL CHALLENGE PERCEIVED BY SOME POTENTIAL MANIPULATORS OF COMPUTER SYSTEMS, AS WELL AS THE IMPERSONAL NATURE OF THE ACT OF STEALING FROM A LARGE CORPORATION BY MEANS OF A MACHINE.
Index Term(s): Computer abuse; Computer related crime; Crimes against businesses; White collar crime
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=44433

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.