NCJ Number
13958
Journal
DATAMATION Volume: 20 Issue: 1 Dated: (JANUARY 1974) Pages: 56-58
Date Published
1974
Length
3 pages
Annotation
COMPUTER ABUSERS OF THE FUTURE ARE LIKELY TO BE ELECTRONIC DATA PROCESSING ORIENTED PERSONS OFTEN ETHICALLY UNCERTAIN OF THE IMPROPRIETY OF THEIR CRIME.
Abstract
SEVERAL CASE HISTORIES AND TECHNIQUES OF COMPUTER-RELATED CRIMES ARE PRESENTED, FOLLOWED BY A DESCRIPTION OF AN IMAGINARY VULNERABLE COMPUTER FACILITY. SEPARATION OF SENSITIVE JOB FUNCTIONS AND THE PRESENCE OF SUFFICIENT PROPRIETARY CONTROLS ON PROGRAMS ARE STRESSED FOR FACILITY SECURITY. SOME OF THE RATIONALIZATION SYNDROMES EMPLOYED BY PERPETRATORS OF COMPUTER CRIMES ARE REVIEWED. LEGAL AMBIGUITIES AND INSUFFICIENT SYSTEM SECURITY ARE SEEN AS BEING RESPONSIBLE FOR THE LOW LEVEL OF ETHICAL AGREEMENT WITHIN THE INDUSTRY