NCJ Number
115838
Date Published
1987
Length
15 pages
Annotation
This paper discusses the prevention, detection, and punishment of computer fraud.
Abstract
Computer fraud is 'fraudulent activity by the use or abuse of a computer.' There are various types of fraud ranging from false input to program destruction. Some examples of computer fraud are briefly described, followed by a detailed description of the case of United States v. Rifkin, in which Rifkin, through his intimate knowledge of the operation of the 'wire room' of the Security Pacific National Bank in Los Angeles, attempted the fraudulent transfer of funds for his own extent of computer crime indicates that it is a significant crime. A study by the United Kingdom Audit Commission indicates that most computer frauds are detected through internal controls. The prevention of computer fraud requires technical expertise capable of spotting vulnerabilities and remedying them. A basic strategy is to train managers in security and how to apply it to the operations they supervise. Security controls include physical controls (restricting access to computer terminals and mainframes), input/output controls, and audit controls. Punishment for computer crime tends to be lenient, since offenders are generally viewed as young first offenders. It is important that punishment be appropriate to the severity of the offense as measured by the damage caused. 31 footnotes.