U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Corporate Computer Crime: Collaborative Power in Numbers

NCJ Number
198861
Journal
Federal Probation Volume: 66 Issue: 3 Dated: December 2002 Pages: 19-29
Author(s)
Lynne M. Wiggins
Editor(s)
Timothy P. Cadigan
Date Published
December 2002
Length
11 pages
Annotation
This article discusses the problems that corporations face as victims of computer crime and how best to deal with it.
Abstract
The new corporate infrastructure created by technological advances makes corporations increasingly vulnerable to computer crime. A review of types of computer crime that occur is provided here and include: hacker/pranksters who decrease corporate productivity; the use of a computer within the corporation to commit a crime possible only by use of computer such as forgery, stalking, fraud, embezzlement, et cetera; and the computer within the corporation being the target of an outside cracker. A review of the origins and causes of computer crime is provided. The issues involved in the decision of whether or not to report corporate computer crime are discussed. Topics such as how apprehension elicits corporate silence, how positive resolution requires corporate disclosure, reporting realities, and existing laws and regulations are also discussed. Corporations' history of dealing with this problem and the implications of cyberterrorism upon corporate cooperation with authorities are addressed. In conclusion, it is noted that corporate computer crime occurs on a daily basis. It is emphasized that criminal prosecutions and the revision of legal statutes can only happen with reporting by corporations of the crimes to authorities. Corporate silence, therefore, hurts the whole by keeping the information secluded. This author recommends strongly that collaboration between corporations and the government are needed to prevent corporate computer crime. A table provides information on the Computer Emergency Response Team (CERT) incident log data. References