Computer abuse and computer crime as organizational activities
نویسندگان
چکیده
منابع مشابه
Computer Crime Investigation and Computer Forensics
Incidents of computer-related crime and telecommunications fraud have increased dramatically over the past decade. However, because of the esoteric nature of this crime, there have been very few prosecutions and even fewer convictions. The new technology that has allowed for the advancement and automation of many business processes has also opened the door to many new forms of computer abuse. A...
متن کاملTrends in Computer Crime
SCOPE AND DEFINITIONS It is convenient to define computer crime as any criminal act which involves one or more computers either as the object of the crime or as accessories in its commission. Computer crime may then be subdivided into computer related crime (CRC) and computer assisted crime (CAC). In the former, the computer or its contents is the subject of the criminal act (eg hacking or deni...
متن کاملCriminology of Computer Crime
With the huge growth in computer connectivity and usage over the last decade there has never been such a wealth of opportunity for prospective criminals. While motives tend not to change, the variety and number of opportunities for cyber crime are constantly growing (Grabosky, 2000). Given the increase in computer and internet-based crime, it is surprising to note that “there have been very few...
متن کاملFifth Generation Computer Crime Law
As. the "shock absorber" of social change, criminal law will serve to deal with the most troublesome-results of the progress in articial intelligence and expert systems research and applications. Wo will have to redefine crimes against the person/ property, public morality, and the public order. To do this will require considerable change in our standard.3 of culpability, computer performance, ...
متن کاملComputer Crime: A Criminological Overview
This paper provides an overview of computer-related crime. Nine varieties of crime are considered: theft of services; communications in furtherance of criminal conspiracies; information piracy and forgery; the dissemination of offensive materials (including extortion threats); electronic money laundering; electronic vandalism and terrorism; telemarketing fraud; illegal interception; and electro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGCAS Computers and Society
سال: 1981
ISSN: 0095-2737
DOI: 10.1145/957869.957871