NCJ Number
              27837
          Journal
  American Bar Association Journal Volume: 61 Dated: (APRIL 1975) Pages: 444-448
Date Published
  1975
Length
              5 pages
          Annotation
              AREAS OF POSSIBLE ABUSIVE ACTS TO COMPUTERIZED ASSETS ARE IDENTIFIED AND A LIST OF CHARACTERISTICS OF USUAL ABUSERS OF COMPUTER INFORMATION IS COMPILED.
          Abstract
              TECHNICAL DETERRENTS TO DETECTION OF COMPUTER ABUSE ARE DISCUSSED. THE AUTHOR RECOMMENDS MORE RESTRICTIVE PERSONNEL SELECTIONS, SEPARATION OF FUNCTIONS IN COMPUTER CENTERS, BETTER AUDIT TRAILS BY MANAGERS, EXTERNAL REULATION, AND LAWS DEALING DIRECTLY WITH SPECIFIC TYPES OF COMPUTER ABUSE WITH SPECIFIC COSTS TO THE PERPETRATOR AS METHODS OF CURTAILING COMPUTER ABUSE.