The new information and communication technologies bring many benefits to society, but they also create new social and ethical problems — such as software theft, invasions of privacy, hacking and the creation of viruses. Computer-assisted crime is one of the most serious and its apparent growth in recent years demonstrates clearly how new technologies create new opportunities for criminal activity. The available evidence on the nature and extent of computer crime is reviewed, together with the available data on participation. Techniques for improving computer security are then discussed and the appropriate lessons drawn.
From reports in Software Engineer Notes, 13, 2, April 1988, p. 5 and The Australian, 24 May 1988.
Jay S. Albanese, ‘Tomorrow's thieves’, The Futurist, September-October, 1988, p. 25 and Hugo Cornwall, Datatheft: Computer Fraud, Industrial Espionage and Information Crime, Heinemann, London, 1987, p. xi.
August Bequai, Technocrimes: the Computerization of Crime and Terrorism, Lexington Books, Lexington, MA, 1987.
Albanese, op. cit., and Tom Forester, High-Tech Society, Basil Blackwell, Oxford, UK and MIT Press, Cambridge, MA, 1987, pp. 219–22; 261.
The New York Times News Service, 27 March 1987, cited in Software Engineering Notes, 12, No. 2, April 1987, pp. 8–9.
Communications Week (USA), 31 August 1987.
R. Doswell and G.L. Simmons, Fraud and Abuse of IT Systems, National Computing Centre, Manchester, UK, 1986, pp. 32–5.
The Australian, 1 September 1987.
The Financial Times, London, 22 October 1984.
PC Week, 4, 21, 26 May 1987 and Business Week, 1 August 1988, p. 51.
The Australian, 5 January 1988 and 26 April 1988; The Independent, London, 30 October 1986.
Cornwall, op. cit., p. 46.
ibid., p. 342.
ibid., p. xiii. See also Jeffrey A. Hoffer and Detmar W. Straub, ‘The 9 to 5 Underground: are you policing computer crimes?’, Sloan Management Review, Summer 1989, pp. 35–43.
The Financial Times, London, 3 January 1986 and The Australian, 1 September 1987.
The Australian, 11 July 1988 and Information Week, 11 July 1988, cited in Software Engineering Notes, 13, 3, July 1988, p. 10.
The Financial Times, London, 2 September 1986 and The Australian, 15 September 1987; Software Engineering Notes, 13, 3, July 1988, p. 10.
Computer News (UK), 15 January 1987.
The Wall Street Journal, 18 May 1987, cited in Software Engineering Notes, 12, 3, July 1987, p. 11; and Computing Australia, 10 August 1987.
The Chicago Tribune, 15 August 1986, cited in Software Engineering Notes, 11, 5, October 1986, pp 15–6; and Are ATMs easy targets for crooks?’, Business Week, 6 March 1989.
Leslie D. Ball, ‘Computer Crime’, in Tom Forester (ed.), The Information Technology Revolution, Basil Blackwell, Oxford, UK, and MIT Press, Cambridge, MA, 1985, p. 534, reprinted from Technology Review, April 1982.
Software Engineering Notes, 13, 2, April 1988.
Digital Review, 6 April 1987, p. 75.
Evening Outlook, Santa Monica, CA, 4 February 1988.
Ball, op. cit., pp. 534–5.
Cornwall, op. cit., p. 102.
The New York Times News Service, 21 March 1986, cited in Software Engineering Notes, 11, 2, April 1986, p. 15.
Keith Hearnden, ‘Computer Criminals are Human, too’, in Tom Forester (ed.), Computers in the Human Context, Basil Blackwell, Oxford, UK and MIT Press, Cambridge, MA, 1989, pp. 415–26.
Technological Ability Not Needed to Commit Crime’, Australian Associated Press report in The Australian, 14 March 1989.
ibid., p. 420.
ibid., p. 536.
Cornwall, op. cit., p. 135.
Jay BloomBecker, ‘Introduction to Computer Crime’, in J. H. Finch and E.G. Dougall (eds), Computer Security: A Global Challenge, Elsevier, North-Holland, 1984.
Hearnden, op. cit., pp. 420–1.
Other useful taxonomies of computer crime have been provided by Donn B. Parker, Fighting Computer Crime, Scribner's, New York, 1983 and Detmar W. Straub and Cathy Spatz Widom, ‘Deviancy By Bits and Bytes: Computer Abusers and Control Measures’ in J. H. Finch and E. G. Dougall (eds), op. cit.
Katherine Hafner et al, ‘Is Your Computer Secure?’, Business Week, 1 August 1988.
The Washington Post, 18 September 1988 and The Chicago Tribune, 17 September 1987, cited in Software Engineering Notes, 12, 4, October 1987, p.14.
Michael Cross, ‘How Fred Lets the Fraudsters In’, The Independent, London, 30 October 1986.
The Australian, 14–15 March, 1987; The Financial Times, London, 24 July 1986; Computing Australia, 15 June 1987; and New Scientist, 20 November 1986.