skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 65098 Find in a Library
Title: COMPUTER CRIME
Journal: CHARTERED ACCOUNTANT IN AUSTRALIA  Volume:48  Dated:(APRIL 1978)  Pages:34-40
Author(s): P OKKERSE
Date Published: 1978
Page Count: 7
Format: Article
Language: English
Country: Australia
Annotation: THIS PAPER DISCUSSES THE SCOPE AND NATURE OF COMPUTER CRIME, ANALYZES WEAKNESSES ASSOCIATED WITH COMPUTER ABUSE, AND SUGGESTS MEASURES FOR CRIME PREVENTION AND DETECTION.
Abstract: THE CONCENTRATION OF ACCOUNTING PROCEDURES AND DATA WITHIN THE COMPUTER DEPARTMENTS OF CORPORATIONS AND THE LACK OF ADEQUATE MANAGEMENT CONTROLS HAVE RESULTED IN AN INVITATION TO THE COMPUTER CRIMINAL. BY 1985, IT IS ESTIMATED THAT LOSSES DUE TO COMPUTER ABUSE WILL REACH AN ANNUAL TOTAL OF $160 MILLION. AN EXAMINATION OF CASE HISTORIES AND COMPUTER CRIME STATISTICS REVEALS THAT MANY OF THE DETECTED CASES MIGHT HAVE BEEN PREVENTED, HAD ADEQUATE INTERNAL CONTROLS BEEN OPERATING IN THE VICTIM CORPORATION. COMPUTER CRIME USUALLY REQUIRES FOUR KEY ELEMENTS: ACCESS TO COMPUTER PROGRAMS, ACCESS TO DATA FILES, ACCESS TO COMPUTER EQUIPMENT, AND ACCESS TO CORPORATE ASSETS. THERE APPEAR TO BE SIX BASIC AREAS WHERE CONTROL WEAKNESSES HAVE FACILITATED COMPUTER ABUSE: () THE LACK OF BASIC AND SUPERVISORY CONTROLS OVER COMPUTERIZED ACCOUNTING SYSTEMS EXERCISED BY SYSTEM USERS; (2) INADEQUATE CONTROLS OVER THE DEVELOPMENT AND MAINTENANCE OF COMPUTER PROGRAMS AND SYSTEMS; (3) LACK OF SECURITY OVER PROGRAMS; (4) INADEQUATE CONTROL OVER COMPUTER OPERATIONS; (5) INADEQUATE DATA FILE CONTROLS, AND (6) INADEQUATE CONTROLS OVER SYSTEMS SOFTWARE. COMPUTER CRIME PREVENTION AND DETECTION MEASURES REQUIRE INTERNAL CONTROLS IN TWO AREAS: APPLICATION AND THE DATA PROCESSING FUNCTIONS. IN ADDITION, AUDITORS MUST BE RESPONSIBLE FOR COMPLETE EXAMINATION OF THE APPLICATION CONTROLS AND THE EDP FUNCTIONS IN ORDER TO AID IN RAPID DETECTION OF COMPUTER ABUSE. CASE STUDIES AND A LIST OF 21 REFERENCES ARE INCLUDED.
Index Term(s): Australia; Computer abuse; Computer crime prevention measures; Computer related crime; Crimes against businesses; Electronic funds transfer; White collar crime
Note: PAPER BASED ON A PRESENTATION BY THE AUTHOR TO THE QUEENSLAND BRANCH OF THE AUSTRALIAN COMPUTER SOCIETY, NOVEMBER 9, 1977.
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=65098

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.