U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Study in Computer Abuse

NCJ Number
80889
Author(s)
A Lewens
Editor(s)
J Gourlay
Date Published
1979
Length
93 pages
Annotation
Findings are presented from research on computer crime profiles in Australia and the United States, and the latest means of prevention in detection of computer crime are described.
Abstract
General conclusions are that computer technology and applications in Australia are at a level of sophistication similar to the United States. Computer abuse is apparently a growing risk in the United States, and Australia has the same risk potential. While computer applications have great vulnerability to abuse, there appears to be little management concern about security, particularly in Australia. Computer abuse can be prevented through the following control measures: segregation of employee duties; checking and control of input, output, and operations; and control of physical access. Auditors should check the application of such preventive measures and controls. Increased protection may come from more secure hardware and operating systems as a standard product, the development of secure software packages, improved detection and auditing techniques, and law suits against consulting auditors. Characteristics of computer abuse are described, and specific examples of computer abuse in the United States and Australia are supplied. A bibliography of all listings is provided, along with an extensive select bibliography of further reading on computer abuse published since 1975 and available from Australian libraries. (Author summary modified)