skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 83726 Find in a Library
Title: Computer Crime - Wave of the Future
Author(s): J Bologna
Corporate Author: Assets Protection
United States of America
Date Published: 1981
Page Count: 95
Sponsoring Agency: Assets Protection
San Francisco, CA 94126
Sale Source: Assets Protection
P. O. Box 2586
San Francisco, CA 94126
United States of America
Language: English
Country: United States of America
Annotation: Computer technology is so advanced that it is impossible to secure computers from such crimes as theft, fraud, and embezzlement; the illegal use of private and proprietary information; the disruption of the financial telecommunications system; and internal and external sabotage.
Abstract: The limits of technology are being approached in the areas of physical security and audit procedures. Thus, the solution of the computer crime problem will not be found in these fields. The real problem in computer security is a people problem. In addition, it is far more often an internal security problem than a problem of externally directed sabotage by terrorists or predatory competitors. The next wave of technology in computer security must come from the behavioral sciences. Among issues which must be explored are the personal qualities and personality factors which lead employees to commit computer-related crimes and other computer abuses and factors in the work environment which foster computer crime and computer abuse. The work environment in which data processing and other white-collar workers are employed and the conditions in that environment which may foster criminal behavior have received too little research attention. The nature of computer crime, theories regarding white-collar crime, and strategies for dealing with white-collar and computer crime are presented. Appendixes present training materials, checklists, and forms. (Author summary modified)
Index Term(s): Computer abuse; Computer crime prevention measures; Computer privacy and security; Computer related crime; Criminality prediction; Electronic funds transfer; Personnel selection; Psychological evaluation
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.