skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 68152 Find in a Library
Title: COMPUTER CRIMES - CASE HISTORIES AND PROPOSED LEGISLATION - REMARKS (FROM SECRETARY'S NATIONAL CONFERENCE ON FRAUD, ABUSE, AND ERROR - PROTECTING THE TAXPAYER'S DOLLAR, P 134-144, 1978 - SEE NCJ-68143)
Author(s): D B PARKER; S H NYCUM
Date Published: 1979
Page Count: 11
Sponsoring Agency: National Science Foundation
Arlington, VA 22230
Superintendent of Documents, GPO
Washington, DC 20402
Grant Number: MCS76-01242
Sale Source: Superintendent of Documents, GPO
Washington, DC 20402
United States of America
Language: English
Country: United States of America
Annotation: THIS CONFERENCE PANEL PRESENTS A SUMMARY OF THE NATURE OF COMPUTERS BASED ON 8 YEARS OF RESEARCH AND AN ANALYSIS OF PROPOSED COMPUTER CRIME LEGISLATION.
Abstract: CONDITIONS THAT HAVE GIVEN RISE TO COMPUTER ABUSE ARE IDENTIFIED, ALONG WITH FOUR TYPES OF COMPUTER ABUSE, FOUR ROLES COMPUTERS CAN PLAY IN COMPUTER ABUSE AS THE OBJECT, THE ENVIRONMENT, THE INSTRUMENT, OR THE SYMBOL OF AN ABUSE, AND DEFINITIONS THAT VARY FROM 'COMPUTER CRIME' TO LESS RESTRICTIVE APPELLATIONS. ESTIMATES OF THE SIZE OF THE PROBLEMS OF COMPUTER ABUSE ARE OFFERED, AS ARE PROFILES ON PERPETRATORS TYPICALLY FOUND TO BE INVOLVED IN COMPUTER ABUSE. IN THIS RESPECT, ATTENTION IS GIVEN TO THE HIGH POSITIONS OF TRUST THAT COMPUTER TECHNOLOGISTS OCCUPY AND THE BUILTIN WEAKNESSES OF COMPUTER SYSTEMS. FOLLOWING THIS, ANTICIPATED FRAUDS AND CRIMINAL ACTIVITIES THAT MIGHT DEVELOP IN THE ARENA OF COMPUTER ABUSE ARE SUGGESTED AS A BACKGROUND FOR A DISCUSSION ON LEGISLATION AND THE DIRECTIONS IT SHOULD TAKE. CONSIDERATIONS IS GIVEN TO PROBLEMS IN STATE AND FEDERAL LAWS, AND TO MISLEADING DEFINISTIONS IN THE PENDING SENATE BILL S1766 ON COMPUTER FRAUD. FINALLY, THE IMPACT OF ANY SUCH LEGISLATION IS EXPLORED, WITH EMPHASIS ON THE SENSITIVITY OF COMPUTER PERSONNELS' CIVIL AND CONSTITUTIONAL RIGHTS. CAUTION IS RECOMMENDED IN DEALING WITH SUCH A NEW FIELD. A SUMMARY OF THE ENSUING PANEL DISCUSSION IS INCLUDED. (MHP)
Index Term(s): Computer abuse; Computer related crime
Note: NCJ-68152 AVAILABLE ON MICROFICHE FROM NCJRS UNDER NCJ68143.
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=68152

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.