NCJ Number
27837
Journal
American Bar Association Journal Volume: 61 Dated: (APRIL 1975) Pages: 444-448
Date Published
1975
Length
5 pages
Annotation
AREAS OF POSSIBLE ABUSIVE ACTS TO COMPUTERIZED ASSETS ARE IDENTIFIED AND A LIST OF CHARACTERISTICS OF USUAL ABUSERS OF COMPUTER INFORMATION IS COMPILED.
Abstract
TECHNICAL DETERRENTS TO DETECTION OF COMPUTER ABUSE ARE DISCUSSED. THE AUTHOR RECOMMENDS MORE RESTRICTIVE PERSONNEL SELECTIONS, SEPARATION OF FUNCTIONS IN COMPUTER CENTERS, BETTER AUDIT TRAILS BY MANAGERS, EXTERNAL REULATION, AND LAWS DEALING DIRECTLY WITH SPECIFIC TYPES OF COMPUTER ABUSE WITH SPECIFIC COSTS TO THE PERPETRATOR AS METHODS OF CURTAILING COMPUTER ABUSE.