Advertisement

Artificial Intelligence Review

, Volume 6, Issue 2, pp 203–215 | Cite as

A forensic methodology for countering computer crime

  • P. A. Collier
  • B. J. Spaul
Article

Abstract

This paper argues that the moves by police and consultancy firms to successfully enforce recent computer misuse legislation requires the bringing together of investigative, legal, courtroom and computing skills in an extension of forensic science. The term suggested for this new discipline is computer forensics'.

Key Words

Computer crime Forensics 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Albrecht, W. S., Howe, K. R. and Romney, M. B. (1984) Deterring Fraud: The Internal Auditor's Perspective, The Institute of Internal Auditors Research Foundation.Google Scholar
  2. Audit Commission (1990) Survey of Computer Fraud and Abuse, HMSO, London.Google Scholar
  3. Bowcott, O. and Hamilton, S. (1990) Beating the System, Bloomsbury, London.Google Scholar
  4. Comer, M. J. (1985) Corporate Fraud (2nd ed.), McGraw-Hill.Google Scholar
  5. Council of Europe Committee of Ministers (1989) Recommendation No. R (89) 9 of the Committee f Ministers to Member States on Computer-related Crime, Council of Europe.Google Scholar
  6. Cornwall, H. (1988) Hacking away at computer law reform, New Law Journal 30 (September).Google Scholar
  7. Hoffer, J. A. and Straub, D. W. Jr. (1989) The 9 to 5 underground: Are you policing computer crimes? Sloan Management Review (Summer).Google Scholar
  8. Hollinger, R. C. and Lanza-Kaduce, L. (1988) The process of criminalisation: The case of computer crime laws, Criminology 26 (1).Google Scholar
  9. Law Commission (1989) Computer Misuse (Law Com. No. 186 Cm 819), HMSO.Google Scholar
  10. Law Commission (1990) Jurisdiction over Offenses of Fraud and Dishonesty with a Foreign Element (Law Com. 180 Cm 801), HMSO, London.Google Scholar
  11. Nasuti, F. W. (1986) Investigating computer crime, Journal of Accounting and EDP (Fall), 13–19.Google Scholar
  12. Stanley, P. M. (1986) Computer crime investigation and investigators, Computers and Security 5, 309–313.Google Scholar
  13. Tapper, C. (1990) Computer Law, Longmans, London.Google Scholar
  14. Walden, I. (1989) EDI and the Law, Addison Wesley, New York.Google Scholar

Copyright information

© Kluwer Academic Publishers 1992

Authors and Affiliations

  • P. A. Collier
    • 1
  • B. J. Spaul
    • 1
  1. 1.Computer Crime Research GroupUniversity of ExeterExeterU.K.

Personalised recommendations