skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 78390 Find in a Library
Title: Financial Executive's Role in Computer Security
Journal: Financial Executive  Volume:49  Issue:4  Dated:(April 1981)  Pages:30-32
Author(s): D Vohs
Date Published: 1981
Page Count: 3
Format: Article
Language: English
Country: United States of America
Annotation: This article examines the growth of computer crime, types of abuse, and methods of guarding against computer compromise.
Abstract: Computer crime is one of the fastest growing illegal activities. The reason for both the growth and lack of accurate measurement of computer crime is the difficulty in detecting a well-executed theft. Computer thefts are often not reported since management is usually embarrassed to admit that the system failed and fears unfavorable publicity. Computer criminals are often well-educated and have analytical skills that make them valued employees. Types of computer crime include theft of data for the purpose of corporate espionage or extortion, sabotage of the equipment itself, or theft of funds. Computer security involves three basic areas: protection of hardware from physical damage, control of access to equipment and data, and protection of software. Uniform software packages support computer security because program sabotage is most often the work of disgruntled employees. The programs in these packages are written and maintained by professionals who have no vested interest in the operation of the computer and are unaffected by management's policy decisions. But even with a controlled physical environment and uniform software applications, security procedures are only effective if they are strictly adhered to by all employees. No references are supplied.
Index Term(s): Computer abuse; Computer crime prevention measures; Computer privacy and security; Computer related crime
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=78390

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.