107
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      If you have found this article useful and you think it is important that researchers across the world have access, please consider donating, to ensure that this valuable collection remains Open Access.

      Prometheus is published by Pluto Journals, an Open Access publisher. This means that everyone has free and unlimited access to the full-text of all articles from our international collection of social science journalsFurthermore Pluto Journals authors don’t pay article processing charges (APCs).

      scite_
       
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      COMPUTER CRIME: NEW PROBLEM FOR THE INFORMATION SOCIETY

      Published
      research-article
      ,
      Prometheus
      Pluto Journals
      Information society, information technology, computer crime, computer security
      Bookmark

            Abstract

            The new information and communication technologies bring many benefits to society, but they also create new social and ethical problems — such as software theft, invasions of privacy, hacking and the creation of viruses. Computer-assisted crime is one of the most serious and its apparent growth in recent years demonstrates clearly how new technologies create new opportunities for criminal activity. The available evidence on the nature and extent of computer crime is reviewed, together with the available data on participation. Techniques for improving computer security are then discussed and the appropriate lessons drawn.

            Content

            Author and article information

            Journal
            cpro20
            CPRO
            Prometheus
            Critical Studies in Innovation
            Pluto Journals
            0810-9028
            1470-1030
            December 1990
            : 8
            : 2
            : 257-272
            Affiliations
            Article
            8629476 Prometheus, Vol. 8, No. 2, 1990: pp. 257–272
            10.1080/08109029008629476
            6ecb087f-ccdb-4d42-a906-3e0418ce43a0
            Copyright Taylor & Francis Group, LLC

            All content is freely available without charge to users or their institutions. Users are allowed to read, download, copy, distribute, print, search, or link to the full texts of the articles in this journal without asking prior permission of the publisher or the author. Articles published in the journal are distributed under a http://creativecommons.org/licenses/by/4.0/.

            History
            Page count
            Figures: 0, Tables: 0, References: 39, Pages: 16
            Categories
            Original Articles

            Computer science,Arts,Social & Behavioral Sciences,Law,History,Economics
            computer crime,computer security,Information society,information technology

            NOTES AND REFERENCES

            1. From reports in Software Engineer Notes, 13, 2, April 1988, p. 5 and The Australian, 24 May 1988.

            2. Jay S. Albanese, ‘Tomorrow's thieves’, The Futurist, September-October, 1988, p. 25 and Hugo Cornwall, Datatheft: Computer Fraud, Industrial Espionage and Information Crime, Heinemann, London, 1987, p. xi.

            3. August Bequai, Technocrimes: the Computerization of Crime and Terrorism, Lexington Books, Lexington, MA, 1987.

            4. Albanese, op. cit., and Tom Forester, High-Tech Society, Basil Blackwell, Oxford, UK and MIT Press, Cambridge, MA, 1987, pp. 219–22; 261.

            5. The New York Times News Service, 27 March 1987, cited in Software Engineering Notes, 12, No. 2, April 1987, pp. 8–9.

            6. Communications Week (USA), 31 August 1987.

            7. R. Doswell and G.L. Simmons, Fraud and Abuse of IT Systems, National Computing Centre, Manchester, UK, 1986, pp. 32–5.

            8. The Australian, 1 September 1987.

            9. The Financial Times, London, 22 October 1984.

            10. PC Week, 4, 21, 26 May 1987 and Business Week, 1 August 1988, p. 51.

            11. The Australian, 5 January 1988 and 26 April 1988; The Independent, London, 30 October 1986.

            12. Cornwall, op. cit., p. 46.

            13. ibid., p. 342.

            14. ibid., p. xiii. See also Jeffrey A. Hoffer and Detmar W. Straub, ‘The 9 to 5 Underground: are you policing computer crimes?’, Sloan Management Review, Summer 1989, pp. 35–43.

            15. The Financial Times, London, 3 January 1986 and The Australian, 1 September 1987.

            16. The Australian, 11 July 1988 and Information Week, 11 July 1988, cited in Software Engineering Notes, 13, 3, July 1988, p. 10.

            17. The Financial Times, London, 2 September 1986 and The Australian, 15 September 1987; Software Engineering Notes, 13, 3, July 1988, p. 10.

            18. Computer News (UK), 15 January 1987.

            19. The Wall Street Journal, 18 May 1987, cited in Software Engineering Notes, 12, 3, July 1987, p. 11; and Computing Australia, 10 August 1987.

            20. The Chicago Tribune, 15 August 1986, cited in Software Engineering Notes, 11, 5, October 1986, pp 15–6; and Are ATMs easy targets for crooks?’, Business Week, 6 March 1989.

            21. Leslie D. Ball, ‘Computer Crime’, in Tom Forester (ed.), The Information Technology Revolution, Basil Blackwell, Oxford, UK, and MIT Press, Cambridge, MA, 1985, p. 534, reprinted from Technology Review, April 1982.

            22. Software Engineering Notes, 13, 2, April 1988.

            23. Digital Review, 6 April 1987, p. 75.

            24. Evening Outlook, Santa Monica, CA, 4 February 1988.

            25. Ball, op. cit., pp. 534–5.

            26. Cornwall, op. cit., p. 102.

            27. The New York Times News Service, 21 March 1986, cited in Software Engineering Notes, 11, 2, April 1986, p. 15.

            28. Keith Hearnden, ‘Computer Criminals are Human, too’, in Tom Forester (ed.), Computers in the Human Context, Basil Blackwell, Oxford, UK and MIT Press, Cambridge, MA, 1989, pp. 415–26.

            29. Technological Ability Not Needed to Commit Crime’, Australian Associated Press report in The Australian, 14 March 1989.

            30. ibid., p. 420.

            31. ibid., p. 536.

            32. Cornwall, op. cit., p. 135.

            33. Jay BloomBecker, ‘Introduction to Computer Crime’, in J. H. Finch and E.G. Dougall (eds), Computer Security: A Global Challenge, Elsevier, North-Holland, 1984.

            34. Hearnden, op. cit., pp. 420–1.

            35. Other useful taxonomies of computer crime have been provided by Donn B. Parker, Fighting Computer Crime, Scribner's, New York, 1983 and Detmar W. Straub and Cathy Spatz Widom, ‘Deviancy By Bits and Bytes: Computer Abusers and Control Measures’ in J. H. Finch and E. G. Dougall (eds), op. cit.

            36. Katherine Hafner et al, ‘Is Your Computer Secure?’, Business Week, 1 August 1988.

            37. The Washington Post, 18 September 1988 and The Chicago Tribune, 17 September 1987, cited in Software Engineering Notes, 12, 4, October 1987, p.14.

            38. Michael Cross, ‘How Fred Lets the Fraudsters In’, The Independent, London, 30 October 1986.

            39. The Australian, 14–15 March, 1987; The Financial Times, London, 24 July 1986; Computing Australia, 15 June 1987; and New Scientist, 20 November 1986.

            Comments

            Comment on this article