U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

NEW CRIMINAL

NCJ Number
13958
Journal
DATAMATION Volume: 20 Issue: 1 Dated: (JANUARY 1974) Pages: 56-58
Author(s)
D B PARKER; S NYCUM
Date Published
1974
Length
3 pages
Annotation
COMPUTER ABUSERS OF THE FUTURE ARE LIKELY TO BE ELECTRONIC DATA PROCESSING ORIENTED PERSONS OFTEN ETHICALLY UNCERTAIN OF THE IMPROPRIETY OF THEIR CRIME.
Abstract
SEVERAL CASE HISTORIES AND TECHNIQUES OF COMPUTER-RELATED CRIMES ARE PRESENTED, FOLLOWED BY A DESCRIPTION OF AN IMAGINARY VULNERABLE COMPUTER FACILITY. SEPARATION OF SENSITIVE JOB FUNCTIONS AND THE PRESENCE OF SUFFICIENT PROPRIETARY CONTROLS ON PROGRAMS ARE STRESSED FOR FACILITY SECURITY. SOME OF THE RATIONALIZATION SYNDROMES EMPLOYED BY PERPETRATORS OF COMPUTER CRIMES ARE REVIEWED. LEGAL AMBIGUITIES AND INSUFFICIENT SYSTEM SECURITY ARE SEEN AS BEING RESPONSIBLE FOR THE LOW LEVEL OF ETHICAL AGREEMENT WITHIN THE INDUSTRY

Downloads

No download available

Availability