skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 67137 Add to Shopping cart Find in a Library
Title: INVESTIGATION OF THE LEGAL ISSUES SURROUNDING THE ABUSE OF COMPUTER RESOURCES (FROM AUSTRALIAN COMPUTER CONFERENCE, 8TH, CANBERRA, AUSTRALIA, AUGUST 28 - SEPTEMBER 2, 1978)
Author(s): M J MAGEE
Date Published: 1978
Page Count: 10
Sponsoring Agency: National Institute of Justice/
Rockville, MD 20849
Sale Source: National Institute of Justice/
NCJRS paper reproduction
Box 6000, Dept F
Rockville, MD 20849
United States of America
Language: English
Country: Australia
Annotation: THIS PAPER PRESENTS A BRIEF HISTORY OF COMPUTER CRIMES IN THE UNITED STATES; EXPLORES POSSIBLE METHODS OF PREVENTION, DETECTION, AND SANCTIONS; AND SUGGESTS REMEDIES FOR COMPUTER ABUSE PROBLEMS.
Abstract: COMPUTER RESOURCES HAVE BEEN OF IMMEASURABLE BENEFIT TO BOTH GOVERNMENTAL AND BUSINESS SECTORS. COLLATERAL WITH THE GROWING USE OF COMPUTER SYSTEMS, HOWEVER, HAS BEEN THE EMERGENCE OF ABUSERS OF COMPUTER RESOURCES, SUCH AS THE SO-CALLED COMPUTER THIEF AND THE INVADER OF PRIVACY. ABUSES INCLUDE EMBEZZLEMENT OF MONEY, FALSIFICATION OF DATA, THEFT OF TRADE SECRETS, AND MISAPPROPRIATION OF GOODS AND SERVICES. STATUTES DESIGNED IN THE PAST HAVE PROVEN INEFFECTIVE WHEN THEY ARE APPLIED TO THE TECHNOLOGICALLY COMPETENT COMPUTER CRIMINAL. SEVEN CASES SELECTED TO ILLUSTRATE WEAKNESSES IN THE COMPUTER SECURITY SYSTEM ARE DESCRIBED BRIEFLY. THE PURPOSES AND PROVISIONS OF THE FEDERAL COMPUTER SYSTEMS PROTECTION ACT OF 1977 ARE EXPLAINED. THE OMNIBUS RIGHT TO PRIVACY ACT OF 1977 IS SIMILARLY DISCUSSED. SUGGESTED REMEDIES FOR COMPUTER ABUSE PROBLEMS ARE AS FOLLOWS: THE DECENTRALIZATION OF COMPUTER FACILITIES, THE ASSEMBLY AND TRAINING OF RISK MANAGEMENT TEAMS THAT PERIODICALLY ASSESS POTENTIAL RISK FACTORS, THE FORMATION OF A GROUP OF PROFESSIONAL SYSTEM CRASHERS WHO ATTEMPT TO FIND SYSTEM WEAKNESSES, AND SPOT CHECKING REVIEWS OF COMPUTER DECISIONS. OTHER SUGGESTED REMEDIES ARE THE AUTOMATED REVIEW OF COMPUTER DECISIONS BY TWO ISOLATED PROGRAMING GROUPS, PROCEDURES BY WHICH NONCOMPUTER PERSONNEL RECORD AUDIT TRAILS, THE ENCODING OF DATA VULNERABLE TO TAPPING, THE USE OF PASSWORDS FOR SYSTEMS WHICH HAVE MANY USERS, AND FREQUENT CHANGES IN PERSONNEL TO PREVENT THE FAMILIARITY OF EMPLOYEES WITH COMPUTER OPERATION. TWENTY-FIVE REFERENCES ARE INCLUDED. (AUTHOR ABSTRACT MODIFIED)
Index Term(s): Computer abuse; Computer crime prevention measures; Computer privacy and security; Computer privacy and security laws; Computer related crime; Electronic funds transfer; White collar crime
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=67137

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.