NCJ Number
182465
Date Published
April 2000
Length
21 pages
Annotation
This paper provides an overview of computer-related crime.
Abstract
The paper considers nine varieties of crime: theft of services; communications in furtherance of criminal conspiracies; information piracy and forgery; dissemination of offensive materials (including extortion threats); electronic money laundering; electronic vandalism and terrorism; telemarketing fraud; illegal interception; and electronic funds transfer fraud. Computer-related crime, like crime in general, may be explained by the conjunction of motivation, opportunity and the absence of capable guardianship. Motivations will vary depending on the nature of the crime in question, but may include greed, lust, revenge, challenge or adventure. Opportunities are expanding dramatically with the rapid proliferation and penetration of digital technology. The most appropriate strategies for controlling computer-related crime entail a mix of law enforcement, technological and market-based solutions. Pursuit of a strict enforcement agenda is, in most cases, not feasible because of the state’s limited capacity. Over-regulation may stifle commercial and technological development. The paper argues that, in some contexts, the marketplace may be able to provide more efficient solutions to the problems of computer-related crime than state interventions. Notes, figures, references