skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 65763 Find in a Library
Title: COMPUTER-RELATED WHITE-COLLAR CRIME (FROM WHITE-COLLAR CRIME - THEORY AND RESEARCH, 1980, BY GILBERT GEIS AND EZRA STOTLAND - SEE NCJ-65757)
Author(s): D B PARKER
Corporate Author: Sage Publications, Inc
United States of America
Date Published: 1980
Page Count: 22
Sponsoring Agency: Sage Publications, Inc
Thousand Oaks, CA 91320
Type: Report (Study/Research)
Format: Document
Language: English
Country: United States of America
Annotation: THE NATURE AND EXTENT OF COMPUTER-RELATED WHITE-COLLAR CRIME ARE DISCUSSED.
Abstract: COMPUTER ABUSE IS STILL CATEGORIZED AS FRAUD, EMBEZZLEMENT, THEFT, LARCENY, EXTORTION, ESPIONAGE, SABOTAGE, AND CONSPIRACY. HOWEVER, THE USE OF COMPUTER SYSTEMS TO EFFECT SUCH CRIMES HAS SIGNIFICANTLY CHANGED THE FORMS OF CRIME. THE OCCUPATIONS OF PERPETRATORS, THE ENVIRONMENTS OF THE OFFENSES, THE MODI OPERANDI, AND THE FORMS OF ASSETS ILLEGALLY APPROPRIATED ARE ALL NEW, MAKING THE PROBLEM A NEW CHALLENGE FOR SOCIAL CONTROL AGENCIES. INCIDENCES OF COMPUTER-RELATED CRIME REMAIN MINIMAL, ALTHOUGH THE TRUE SIZE OF THE PROBLEM IS NOT KNOWN BECAUSE OF THE DIFFICULTIES INVOLVED IN DETECTION. BASED ON AN EXAMINATION OF 632 REPORTED CASES OF COMPUTER-RELATED OFFENSES, SIGNIFICANT GROWTH IN SUCH CRIME IS INDICATED. ITS GROWTH IS PREDICTABLE BECAUSE OF THE GROWING RELIANCE ON COMPUTERS, THE PROLIFERATION OF COMPUTERS IN SENSITIVE BUSINESS AND OTHER SOCIETAL FUNCTIONS, THE INCREASING STORAGE OF NEGOTIABLE ASSETS IN COMPUTER SYSTEMS, AND THE CONCOMITANT INCREASING POSITIONS OF TRUST REQUIRED IN THE RELATIVELY NEW ELECTRONIC DATA PROCESSING OCCUPATIONS. COMPUTER-RELATED CRIME FOCUSES ON NEGOTIABLE ASSETS STORED IN COMPUTER MEDIA, COMPUTER-STORED DATA CONVERTIBLE TO UNAUTHORIZED GAIN, SABOTAGE, AND UNAUTHORIZED USE OF SERVICES. COMPUTER-RELATED OFFENSES ARE PERPETRATED BY THE LIMITED NUMBER OF PEOPLE WHO HAVE COMPUTER SKILLS, KNOWLEDGE, ACCESS, AND RESOURCES. WHILE THE NUMBER OF POTENTIAL OFFENDERS IS SMALL, THE ASSETS THAT MAY BE PLUNDERED ARE HUGE. (AUTHOR ABSTRACT MODIFIED --RCB)
Index Term(s): Computer related crime; Crime Causes; Criminal methods; Estimated crime incidence; Studies; White collar crime
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=65763

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.