NCJ Number
35901
Journal
Trial Volume: 12 Issue: 8 Dated: (AUGUST 1976) Pages: 48-49
Date Published
1976
Length
2 pages
Annotation
BRIEF DESCRIPTION OF THE STEPS IN A COMPUTER OPERATION AT WHICH CRIMINAL ACTIVITY CAN BE INTRODUCED AS MEANS OF PERPETRATING FINANCIAL, PROPERTY, OR INFORMATION THEFT OR ACTS OF VANDALISM.
Abstract
A SHORT PROFILE IS SKETCHED OF THE TYPICAL COMPUTER CRIMINAL. THE AUTHOR ILLUSTRATES THE EXPLORATIONS OF CRIMINAL METHODS WITH CASE HISTORIES OF ACTUAL COMPUTER THEFTS. THE INABILITY OF CRIMINAL JUSTICE AGENCIES TO COPE WITH COMPUTER CRIMES IS DISCUSSED AND COST OF COMPUTER CRIMES IS ESTIMATED.