skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 78297 Find in a Library
Title: MOMM's (Motivations, Opportunities, Methods, Means) - A Taxonomy for Computer Related Employee Theft
Journal: Assets Protection  Volume:6  Issue:3  Dated:(May/June 1981)  Pages:33-36
Author(s): J Bologna
Date Published: 1981
Page Count: 4
Format: Article
Language: English
Country: United States of America
Annotation: To effect some uniformity in nomenclature, a classification system for employee computer-related theft is proposed to include motivations, opportunities, means, and methods.
Abstract: Employee thefts are either personally or environmentally induced and are sometimes a combination of both. Personal inducements can be classified as (1) economic (employee perception of need or desire for more money), (2) ideological (spite, hate, or anger against the victim), (3) egocentric (proof of cleverness and knowledge), and (4) psychotic (distorted sense of reality). Environment inducements which provide the opportunities for theft include inadequacies in internal accounting controls; inadequate access control to computers, terminals and other information, telecommunication and data processing equipment or facilities; reward system; ethical climate; and climate for interpersonal trust. Means of effecting a computer-related theft involve exploitation of weaknesses in controls, personnel, and technology. Methods of computer-related theft are 'input scams,' which involve the creation of a false or faked debit; 'throughput scams,' which consist of manipulating data while running through the computer rather than before the run; and 'output scams,' which involve the criminal use or destruction of computer outputs. Implications of the proposed classification system for prevention systems are discussed, and an internal theft prevention system is graphically portrayed.
Index Term(s): Computer related crime; Crime Causes; Crime specific countermeasures; Criminal methods; Employee theft
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.