21
Views
7
CrossRef citations to date
0
Altmetric
Original Articles

Computer abuse: Problems of instrumental control

Pages 113-130 | Received 22 Sep 1986, Accepted 20 Feb 1987, Published online: 18 May 2010

References

  • Alexander , Tom . 1974 . “Waiting for the Great Computer Rip‐off” . Fortune , July : 143 – 150 .
  • Allen , Brandt . 1975 . “Embezzler's Guide To The Computer” . Harvard Business Review , 53 July/August : 79 – 89 .
  • Altheide , David L. , Adler , Patricia A. , Adler , Peter and Altheide , Duane A. 1978 . “The Social Meanings of Employee Theft” . In Crime At The Top, Deviance in Business and the Professions , Edited by: Johnson , John M. and Douglas , Jack D. 90 – 124 . Philadelphia : J.B. Lippincott Co .
  • 1984 . “Hackers go overboard” . Arizona Business Gazette (Phoenix) , December 17 : A‐4
  • 1983a . “Fight Crime, Mot Kids,” editorial . Arizona Republic (Phoenix) , October 15 : A‐22
  • _____ . 1983b . “Dealing With The Hackers,’ editorial . November 22 : A‐22
  • _____ . 1984 . “Computer crime finds holes in law,’ . February 20 : A‐7
  • _____ . 1985 . “23 teens crack bank computer,’ . October 20 : B‐16
  • Berk , Richard A. , Brackman , Harold and Lesser , Selma . 1977 . A Measure of Justice , New York : Academic Press .
  • Bequai , August . 1983 . How to Prevent Computer Crime , New York : John Wiley and Sons .
  • BloomBecker , Jay . 1985 . “Computer Crime Update: The View As We Exit 1984” . Western New England Law Review, , 7 (3) : 627 – 649 .
  • _____ . 1986 . Computer Crime, Computer Security, Computer Ethics , The first Annual Report of the National Center for Computer Crime Data Los Angeles, Calif.
  • Brissett , Dennis and Snow , Robert P. 1970 . “Vicarious Behavior: Leisure and the Transformation of Playboy Magazine” . Journal of Popular Culture , 3 ( 4 ) Winter : 428 – 440 .
  • Bumke , David . 1980 . “Computer Crime” . Saturday Evening Post , January/February : 28ff
  • 1977 . “The growing threat to computer security” . Business Week , 1 August : 44 – 45 .
  • _____ . 1982 . “Locking the electronic file cabinet” . October , 18 : 123 – 124 .
  • Chambliss , William J. 1964 . “A Sociological Analysis of the Law of Vagrancy,’ . Social Problems, , 12 Summer : 46 – 67 .
  • Coates , Joseph F. 1982 . “The Future of Computer Data Security,’ . Vital Speeches of the Day , 48 February 15 : 280 – 284 .
  • Dart , Bob . 1983 . “Computer hackers threaten nation's datasystems” . Tempe Daily News (Arizona) , October 2 : D‐3
  • Friedman , Robert . 1980 . “The Dalton Gang's Computer Caper” . New York, December , 8 : 65 – 75 .
  • Gellman , Harvey S. 1970 . “Crime In Industry, Using the Computer to Steal,’ . Vital Speeches of the Day , 37 December 15 : 152 – 155 .
  • Gunnels , Kerry . 1983 . “Crime ‘myth’ exaggerated, consultant says” . Tempe Daily Mews (Arizona) , October 2 : D‐3
  • Gusfield , Joseph . 1967 . “Moral Passage: The Symbolic Process in Public Designations of Deviance” . Social Problems, , 15 Fall : 175 – 188 .
  • Huizinga , Johan . 1950 . Homo Ludens, A Study of the Play‐Element in Culture , Boston : Beacon Press .
  • James , I.T. 1969 . “Fraud and the Computer,’ . Data Systems , July : 36 – 37 .
  • Landreth , Bill and Rheingold , Howard . 1985 . Out of the Inner Circle, A Hacker's Guide to Computer Security , Bellevue, Wash. : Microsoft Press .
  • Mano , D. Keith . 1984 . “Computer Crime” . National Review , 27 July : 51 – 52 .
  • McClain , Leanita . 1983 . “'Hacking'” A Fad Or A Crime?” . Arizona Republic (Phoenix) , October 9 : C‐6
  • Michalowski , Raymond J. 1985 . Order, Law, and Crime, An Introduction to Criminology , New York : Random House .
  • Nader , Laura . 1980 . No Access to Law, Alternatives to the American Judicial System , New York : Academic Press .
  • _____ . November 3 1981 . Odyssey: Little Injustices , November 3 , Public Broadcasting System .
  • 1973 . “Conning by Computers” . Newsweek , 23 April : 90 – 91 .
  • _____ . 1983 . “Milwaukee Discovers ‘WarGamesmanship’,’ . August 22 : 22
  • 1983a . “Coast Computer Buff Seized in Intrusion Into Military‐Civilian Data” . N.Y. Times , November 3 : 14
  • _____ . 1983b . “Intruder Pranks in NASA Computers,’ . October 19 : 10
  • _____ . 1984 . “Pupils’ Computer Break‐In Gag That ‘Snowballed’ . February 21 : 9
  • Parker , Donn B. 1975 . Computer Abuse Perpetrators and Vulnerabilities of Computer Systems , Menlo Park, Calif. : Stanford Research Institute . Project 5068
  • _____ . 1976 . Crime by Computer , New York : Charles Scribner's Sons .
  • _____ . 1980 . “Computer‐Related White Collar Crime,’ ” . In White Collar Crime, Theory and Research , Edited by: Geis , Gilbert and Stotland , Ezra . 199 – 220 . Beverly Hills, Calif. : Sage Publications .
  • _____ . 1983 . Fighting Computer Crime , New York : Charles Scribner's Sons .
  • Perry , William E. 1985 . Management Strategies for Computer Security , Boston : Butterworth Publishers .
  • Pfuhl , Erdwin H. Jr. 1986 . The Deviance Process , 2nd ed. , Belmont, Calif. : Wadsworth Publishing Company .
  • Rothman , David H. 1984 . “Five Myths About Computer Crime ‐ And 10 Ways To Stop It,’ . Arizona Republic (Phoenix) , December 9 : C‐1ff
  • Ryan , William . 1971 . Blaming the Victim , New York : Random House (Vintage Books) .
  • Smigel , Erwin O. and Ross , H. Lawrence , eds. 1970 . Crimes Against Bureaucracy , New York : Van Nostrand Reinhold .
  • Solomon , Toby . 1985 . “Personal Privacy and the ‘1984’ Syndrome” . Western New England Law Review, , 7 (3) : 753 – 790 .
  • Soma , John T. , Smith , Paula J. and Sprague , Robert D. 1985 . “Legal Analysis of Electronic Bulletin Board Activities” . Western New England Law Review , 7 (3) : 571 – 626 .
  • Stern , Nancy A. and Stern , Robert A. 1983 . Computers in Society , Englewood Cliffs, N.J. : Prentice‐Hall, Inc. .
  • Sykes , Gresham M. and Matza , David . 1957 . “Techniques of Neutralization: A Theory of Delinquency” . American Sociological Review , 22 December : 664 – 670 .
  • 1983 . “Computer tap ‘game of Monopoly’” . Tempe Daily News (Arizona) , November 5 : A‐7
  • 1972 . “Computers: Key Punch Crooks” . Time , December 25 : 69
  • _____ . 1982 . “Here Come the Microkids” . May , 3 : 5 – 56 .
  • _____ . 1983 . “Playing Games, data banks become kids’ stuff” . August 22 : 14
  • Toffler , Alvin . 1971 . Future Shock , New York : Bantam .
  • Treaster , Joseph B. 1983 . “Curiosity led youths to pick silicon brains,’ . Arizona Republic (Phoenix) , August 28 : AA‐1
  • 1973 . “Using Computers to Steal‐Latest Twist in Crime” . U.S. News and World Report , 18 June : 38 – 42 .
  • _____ . 1979 . “As Computers Start to Transform Schools‐Are Colleges Training Computer Criminals?’ . January 8 : 39
  • _____ . 1980 . “The Push‐Button Criminals of the “80's” . September , 22 : 68 – 69 .
  • _____ . 1984 . “When Theives Sit Down at Computers . June 25 : 8
  • VanTassel , D. “Computer Crime’ . Proceedings of the 1970 Fall Joint Computer Conference . November 17–19 , Houston, Texas. pp. 445 – 450 .
  • Wesson , Robert . 1983 . “Letters to the Editor,’ . New York Times , November 14 : 20
  • Witt , Howard . 1985 . “Horror stories about ‘hackers’ rated nonsense” . Arizona Republic (Phoenix) , November 4 : C‐1 C‐5
  • Wolfenstein , Martha . 1958 . “The Emergence of Fun Morality” . In Mass Leisure , Edited by: Larabee , Eric and Meyersohn , Rolf . 86 – 96 . Glencoe, Ill. : The Free Press .
  • Wrong , Dennis H. 1968 . “Some Problems in Defining Social Power’ . American Journal of Sociology , 73 May : 673 – 681 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.