skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 72976 Find in a Library
Title: Computer Crime - Dimensions, Types, Causes, and Investigation
Journal: Journal of Police Science and Administration  Volume:8  Issue:3  Dated:(September 1980)  Pages:304-311
Author(s): C R Swanson; L Territo
Date Published: 1980
Page Count: 8
Format: Article
Language: English
Country: United States of America
Annotation: This article discusses the incidence and different forms of computer crime, and the parts of a computer that are vulnerable to tampering for criminal purposes.
Abstract: Crime involving computers costs $100 million to $300 million per year; the average computer-aided crime nets over $400,000. However, computer criminals are seldom apprehended becuase computer crimes are so difficult to prove. Other factors that help computer crime flourish include lax computer security, managerial disinterest in and ignorance of computers, poor personnel training, difficulty in distinguishing computer crime from computer error, and great potential gains. Types of computer crimes include unauthroized use of computer time, theft of information stored on a computer, embezzelment and other financial crimes, property crimes, and traditional crime such as kidnapping. Areas in which computers are vulnerable to tampering, in ascending order of technical difficulty, are input/output alteration, computer operations, computer programs, auxiliary storage manipulation, operating systems penetration, and interception and/or alteration of communications. Footnotes, tables, and figures are included.
Index Term(s): Computer abuse; Computer related crime
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.