U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

COMPUTER ABUSE - PAST IS PROLOGUE

NCJ Number
66359
Journal
Internal Auditor Volume: 37 Issue: 2 Dated: (APRIL 1980) Pages: 90-95
Author(s)
M E BALDIGO
Date Published
1980
Length
6 pages
Annotation
THE INCIDENCES AND TYPES OF COMPUTER ABUSE ARE DESCRIBED ALONG WITH PROFILES OF TYPICAL PERPETRATORS.
Abstract
STATISTICS ON COMPUTER CRIME ARE SCARCE BECAUSE MOST ACTS ARE UNREPORTED OR ARE DIFFICULT TO PROSECUTE SUCCESSFULLY BECAUSE OF THE TECHNOLOGY INVOLVED AND LACK OF LEGAL PRECEDENTS. BOTH FEDERAL AGENCIES AND PRIVATE BUSINESSES TEND TO HANDLE COMPUTER CRIMES ADMINISTRATIVELY, RATHER THAN FACE THE PUBLICITY OF LEGAL PROCEEDINGS. MANY COMPUTER PROFESSIONALS CONTEND THAT MOST ABUSES ARE DETECTED ACCIDENTALLY AND THE MOST CLEVER FRAUDS REMAIN UNDISCOVERED. THE FOLLOWING CHARACTERISTICS ARE COMMON TO VICTIMS: POOR EMPLOYEE AND MANAGEMENT RELATIONS; EMPLOYEES WITH WIDERANGING RESPONSIBILITIES AND LITTLE SUPERVISION, PARTICULARLY OUTSIDE NORMAL WORKING HOURS; A LACK OF PROGRAM CONTROLS TO DETECT IRREGULAR APPLICATIONS; AND INADEQUATE ACCOUNTABILITY FOR USE OF THE SYSTEM. PERPETRATORS TEND TO BE YOUNG, PROFESSIONALLY WELL-QUALIFIED PEOPLE WHO ENJOY CHALLENGES AND ARE DISGRUNTLED WITH THE COMPANY. THE RATE OF COLLUSION IN COMPUTER-RELATED FRAUD IS HIGH. COMPUTERS CAN BE PHYSICALLY ATTACKED OR USED TO COMMIT ABUSES OR CRIMES SUCH AS DEVELOPING EMBEZZLEMENT STRATEGIES OR MAILING FICTITIOUS BILLINGS. DATA CAN BE STOLEN OR MISUSED BY FEEDING THE COMPUTER INSUFFICIENT OR INCORRECT INFORMATION. PROGRAMS CAN BE QUICKLY ALTERED TO CARRY OUT ILLEGAL ACTIVITIES AND THEN TOLD TO ERASE THE ABUSE. THE COSTS OF COMPUTER CRIME ARE RISING RAPIDLY, AND PROFESSIONAL CRIMINALS CAN BE EXPECTED TO ENTER THIS HIGHLY PROFITABLE PROFITABLE AREA. EFFECTIVE METHODS FOR COMBATING COMPUTER ABUSE WILL PROBABLY BE DEVELOPED THROUGH AUTOMATION. FOOTNOTES ARE PROVIDED.

Downloads

No download available

Availability