Publication Cover
Policing and Society
An International Journal of Research and Policy
Volume 2, 1992 - Issue 4
54
Views
6
CrossRef citations to date
0
Altmetric
Original Articles

Problems in policing computer crime

&
Pages 307-320 | Received 24 Sep 1990, Published online: 07 May 2010

Bibliography

  • Best , R. , Picquet , A. and Cheryn , D. , eds. 1985 . Computer Crime, Abuse, Liability and Security, A Comprehensive Bibliography, 1970–84. , McFarland & Co .
  • Cornwall , H. 1988 . ‘Hacking away at computer law reform’ . New Law Journal , 30 September
  • Scottish Law Commission . 1987 . Report on Computer Crime. , HMSO .
  • Duyn , J. Van . 1985 . Human Factor in Computer Crime. , Petrocelli Books .
  • Elsevier International Bulletins . 1983 . ‘Computer Crime Needs International Countermeasures,’ . December
  • Schweitzer , J.A. 1985 . Computer Crime and Business Information: A Practical Guide for Managers. , North‐Holland Pub, Co. .
  • Sieber , U. 1986 . International Handbook on Computer Crime, Computer‐related Economic Crime and the Infringements of Privacy , Wiley .
  • Spaul , B.J. 1990 . ‘Old‐fashioned theft in a hi‐tech environment.’ . Accountancy , November
  • Tapper , C. 1990 . Computer Law , London : Longmans .
  • Wasik , M. 1990 . Crime and the Computer. , Oxford University Press .

References

  • 1990 . The Treasurer , 12 ( 3 ) March : 1
  • Stanley , P.M. Computer Crime Investigation and Investigators . Computers and Security , 5 309 – 313 .
  • Carr‐Hill , R.A. and Stern , N.H. , eds. 1979 . Crime, The Police and Criminal Statistics , 59 Academic Press . There are, however, good reasons for supposing that the recorded clear‐up rate depends, ceteris paribus on the recorded offence rate, if only because a certain number of policemen can deal only with a limited number of offences. Similarly the numbers of (and possibly the expenditure rate per officer on) policmen are likely to be a function of the offence rate.
  • The Act belatedly brings English law into line with the situation in the US, Canada and much of Europe. For example, in the US virtually all states (excepting District of Columbia, Maine, Vermont and West Virginia) have followed the lead of Florida and Arizona in 1978 (Tapper 1990) and have enacted specific laws against computer abuse often following a model computer law available from the Data Processing Management Association. In 1984 and 1986 Congress enacted two pieces of computer crime legislation (US Public Laws 98–473 and 99–474) and in January 1988 state laws were strengthened by a federal Computer Crime Act. Similarly in Canada, the Criminal Code Section 301.2 states that a mischief is committed by persons who wilfully: destroy or alter data; render data meaningless, useless or ineffective; obstruct, interrupt or interfere with any person in the lawful use of data; or denies access to data to any person who is entitled to access thereto. In France, Article 462–2 of the Law 88–19 provides an offence of fraudulent access to a machine, West German legislation made it illegal to gain unauthorised access to secure computers and the Swedish Data Act 1973 is probably the earliest creation of the offence of gaining unauthorised access to a computer. Currently, according to the Law Commission (1989) only Belgium and Japan of major industrial countries rely upon existing laws to counter computer crime and abuse.
  • The Guardian 01 Mar 90 Computer Guardian: ‘The Stange case of the disappearing Computer Crime statistics’.
  • Walker , Nigel . 1987 . Crime and Criminology: A Critical Introduction , Oxford University Press .
  • ‘The challenge of Computer Crime:’ . The Independent on Sunday , 90 14 & 21 Oct
  • Simons , G. 1989 . The Hazards of Unsafe Computing , NCC Blackwell .
  • Stoll , C. 1990 . The Cuckoo's Egg , Pan Books .
  • Joneas , H. 1990 . The Biography of Edward Singh , Penguin .
  • Bowcott , O. and Hamilton , S. 1990 . Beating the System , London : Bloomsbury .
  • Gaskill , S.J. Computer Misuse . Proceedings of the Second National Conference on Law, Computers and Artificial Intelligence . November 15–16 , pp. 31 – 34 . University of Exeter .
  • BIS Applied Systems . Computer‐related Fraud Casebook , 1987
  • Audit Commission . 1991 . Survey of Computer Fraud and Abuse , London : HMSO .
  • Wong , K. ‘Risk Management and Computer Security’ . Computers and Security , 4 ( 4 ) 287 – 295 .
  • Hoffer , J.A. and Straub , D.W. Jr. 1989 . ’The 9 to 5 Underground: Are You Policing Computer Crimes?’ . Sloan Management Review , Summer
  • Council of Europe Committee of Ministers . 1989 . Recommendation No. R (89) 9 of the Committee of Ministers to Member States on Computer‐related Crime , Council of Europe .
  • Ibid.
  • Ibid.
  • Ibid.
  • Ibid.
  • City of London Police . 1989 . Fraudstop , September
  • Cornwall , H. 1988 . ‘Hacking away at computer law reform’ . New Law Journal , September 30th
  • Ibid.
  • Nasuti , F.W. 1986 . ‘Investigating Computer Crime’ . Journal of Accounting and EDP , Fall : 13 – 19 .
  • Albrecht , W.S. , Howe , K.R. and Romney , M.B. 1984 . Deterring Fraud: The Internal Auditor's Perspective , The Institute of Internal Research Foundation .
  • Ibid.
  • Hutchinson , S. 1990 . ‘Access control of ZAP programs’ . EDPACS , 18 ( 1 ) : 1 – 3 . Zap and Super Zap are privileged access programs for a discussion of their operation and implications see.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.