U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

COMPUTER CRIME - SOME MARGINAL NOTES ON RECENT LITERATURE REGARDING A NEW PHENOMENON

NCJ Number
26082
Journal
DELIKT EN DELINKWENT Volume: 5 Issue: 3 Dated: (MARCH 1975) Pages: 133-148
Author(s)
F KUITENBROUWER
Date Published
1975
Length
16 pages
Annotation
COMPUTER CRIME DISCUSSED AS A SPECIAL FORM OF WHITE COLLAR CRIME, PARTICULARLY AS IT IS CONCERNED WITH THE INVASION OF PRIVACY, CITING CASE HISTORIES AND RECOMMENDING THAT SPECIFIC LEGISLATION BE PASSED.
Abstract
THE AUTHOR DIVIDES COMPUTER CRIME INTO FOUR CATEGORIES AGGRESSIVE BEHAVIOR (DESTRUCTION OF COMPUTER EQUIPMENT), CRIMES AGAINST PROPERTY, STEALING COMPUTER TIME AND ECONOMIC ESPIONAGE. HE STATES THAT THE MODERN TREND TOWARD COLLECTING INFORMATION ON INDIVIDUALS CONSTITUTES A SERIOUS THREAT TO THE RIGHT TO PRIVACY. THE BURGLARIZING OF DANIEL ELLSBERG'S PSYCHIATRIST'S APARTMENT IS THE MOST NOTORIOUS EXAMPLE OF THIS TREND. THE WORK OF COMPUTER SPECIALISTS TENDS TO BE SHROUDED IN A CERTAIN AMOUNG OF MYSTERY, AND MANAGEMENT CONTROL AND SUPERVISION OFTEN IS INADEQUATE. THIS MAKES IT RELATIVELY EASY FOR SPECIALISTS TO COMMIT COMPUTER CRIME. THE LOSS FROM COMPUTER CRIMES IS ALREADY GREATER THAN FROM CONVENTIONAL ONES. SEVERAL COUNTRIES HAVE ALREADY ADOPTED SO-CALLED COMPUTER LAWS, AND THE AUTHOR SAYS THAT THE NETHERLANDS SHOULD DO SO TOO, PARTICULARLY WITH RESPECT TO THE DANGER OF INVASION OF PRIVACY. --IN DUTCH SEE NCJ-32517 FOR ENGLISH TRANSLATION.

Downloads

No download available

Availability