skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 66359 Find in a Library
Title: COMPUTER ABUSE - PAST IS PROLOGUE
Journal: INTERNAL AUDITOR  Volume:37  Issue:2  Dated:(APRIL 1980)  Pages:90-95
Author(s): M E BALDIGO
Corporate Author: Institute of Internal Auditors, Inc
United States of America
Date Published: 1980
Page Count: 6
Sponsoring Agency: Institute of Internal Auditors, Inc
Altamonte Springs, FL 32701
Format: Article
Language: English
Country: United States of America
Annotation: THE INCIDENCES AND TYPES OF COMPUTER ABUSE ARE DESCRIBED ALONG WITH PROFILES OF TYPICAL PERPETRATORS.
Abstract: STATISTICS ON COMPUTER CRIME ARE SCARCE BECAUSE MOST ACTS ARE UNREPORTED OR ARE DIFFICULT TO PROSECUTE SUCCESSFULLY BECAUSE OF THE TECHNOLOGY INVOLVED AND LACK OF LEGAL PRECEDENTS. BOTH FEDERAL AGENCIES AND PRIVATE BUSINESSES TEND TO HANDLE COMPUTER CRIMES ADMINISTRATIVELY, RATHER THAN FACE THE PUBLICITY OF LEGAL PROCEEDINGS. MANY COMPUTER PROFESSIONALS CONTEND THAT MOST ABUSES ARE DETECTED ACCIDENTALLY AND THE MOST CLEVER FRAUDS REMAIN UNDISCOVERED. THE FOLLOWING CHARACTERISTICS ARE COMMON TO VICTIMS: POOR EMPLOYEE AND MANAGEMENT RELATIONS; EMPLOYEES WITH WIDERANGING RESPONSIBILITIES AND LITTLE SUPERVISION, PARTICULARLY OUTSIDE NORMAL WORKING HOURS; A LACK OF PROGRAM CONTROLS TO DETECT IRREGULAR APPLICATIONS; AND INADEQUATE ACCOUNTABILITY FOR USE OF THE SYSTEM. PERPETRATORS TEND TO BE YOUNG, PROFESSIONALLY WELL-QUALIFIED PEOPLE WHO ENJOY CHALLENGES AND ARE DISGRUNTLED WITH THE COMPANY. THE RATE OF COLLUSION IN COMPUTER-RELATED FRAUD IS HIGH. COMPUTERS CAN BE PHYSICALLY ATTACKED OR USED TO COMMIT ABUSES OR CRIMES SUCH AS DEVELOPING EMBEZZLEMENT STRATEGIES OR MAILING FICTITIOUS BILLINGS. DATA CAN BE STOLEN OR MISUSED BY FEEDING THE COMPUTER INSUFFICIENT OR INCORRECT INFORMATION. PROGRAMS CAN BE QUICKLY ALTERED TO CARRY OUT ILLEGAL ACTIVITIES AND THEN TOLD TO ERASE THE ABUSE. THE COSTS OF COMPUTER CRIME ARE RISING RAPIDLY, AND PROFESSIONAL CRIMINALS CAN BE EXPECTED TO ENTER THIS HIGHLY PROFITABLE PROFITABLE AREA. EFFECTIVE METHODS FOR COMBATING COMPUTER ABUSE WILL PROBABLY BE DEVELOPED THROUGH AUTOMATION. FOOTNOTES ARE PROVIDED.
Index Term(s): Behavior; Computer abuse; Computer related crime; Crime patterns; White collar crime
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=66359

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.