Skip to main content

Part of the book series: Texts in Computer Science ((TCS))

  • 253 Accesses

Abstract

It is difficult to define a computer crime without getting tangled up in the legal terminology. We will try to make it simple for the rest of us nonlawyers. A computer crime is a crime like any other crime, except that in this case the illegal act must involve a computer system either as an object of a crime, an instrument used to commit a crime, or a repository of evidence related to a crime. With the Internet, the scope of computer crimes has widened to actually include crimes that would normally be associated with telecommunication facilities. Because of this, we want to expand our definition of a computer crime to be an illegal act that involves a computer system or computer-related system like a telephone, microwave, satellite or other telecommunications system that connect one or more computers or computer-related systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. “Section A: The Nature and Definition of a Critical Infrastructure.” http://www.nipc.gov/nipcfaq.html

  2. Joseph M. Kizza. Computer Network Security and Cyber Ethics. McFarland, NC, 2001.

    Google Scholar 

  3. Karen Forchet. Computer Security Management. Boyd & Fraser Publishing, 1994, Danvers, MA.

    Google Scholar 

  4. Timeline of hacking. http://fyi.cnn.com/fyi/interactive/school.tools/timehnes/1999/computer.hacking/frameset.exclude.html

  5. Peter J. Denning. Computers Under Attack: Intruders, Worms and Viruses. New York: ACM Press, 1990.

    Google Scholar 

  6. Louis J. Freeh. “FBI Congressional Report on Cybercrime.” http://www.fbi.gov/congress00/cyber021600.htm

  7. Steven Levy. Hackers: Heroes of the Computer Revolution, 1984.

    Google Scholar 

  8. Security in Cyberspace: U.S. Senate Permanent Subcommittee on Investigations. June 5, 1996.

    Google Scholar 

  9. John Christensen. “Bracing for Guerilla Warfare in Cyberspace,” CNN Interactive, April 6, 1999.

    Google Scholar 

  10. Carnegie Mellon University. CERT Coordination Center. “CERT/CC Statistics 1998–1999.” http://www.cert.org/stats/cert-stats.html

  11. David S. Alberts. “Information Warfare and Deterrence—Appendix D: Defensive War: Problem Formation and Solution Approach.” http://www.ndu.edu/inns/books/ind/appd.htm

  12. “Hacker Sittings and News: Computer Attacks Spreading (11/19/99).” http://www.infowav.com/hacker/99/hack-11/1999-b.shtml

  13. “Annual Cost of Computer Crime Rise Alarmingly,” Computer Security Institute. http://www.gocsi.com/prela11.html

  14. Trigaux, R., “Hidden Dangers,” St. Petersburg Times, June 16, 1998.

    Google Scholar 

Further Reading

  1. Anderson, K.E., “Criminal Threats to Business on the Internet: A White Paper,” Global Technology Research, Inc., June 23, 1997. This is a discussion of the increasing trend of criminal activity against information systems, from the low-level, amateur intruder to organized crime, and industrial and international espionage.

    Google Scholar 

  2. Chaturvedi, A., et al., “Fighting the Wily Hacker: Modeling Information Security Issues for Online Financial Institutions Using the SEAS Environment.” INET JAPAN 2000 Conference, July 18, 2000. The paper discusses proposed methods to analyze the online risks faced by the financial industry.

    Google Scholar 

  3. Computer Security Institute/Federal Bureau of Investigation, “Annual Cost of Computer Crime Rise Alarmingly: Organizations Report $136 Million in Losses,” Press Release, Computer Security Institute, March 4, 1998. This is a summary of the 1998 survey on computer crime.

    Google Scholar 

  4. Counterintelligence Office of the Defense Investigative Service, “Industry CI Trends,” OASD-PA/96-S-1287, December 26, 1996. This paper discusses threats and techniques used for low-level intelligence collecting by foreign companies and governments against U.S. DoD contractors.

    Google Scholar 

  5. General Accounting Office (GAO), “GAO Executive Report—B-266140,” Report to the Committee on Governmental Affairs, U.S. Senate, May 22, 1996. This gives a detailed report on attacks to U.S. Department of Defense computer systems with recommendations for improved security.

    Google Scholar 

  6. Kapor, M., “Civil Liberties in Cyberspace: When Does Hacking Turn from an Exercise of Civil Liberties into Crime?” Scientific American, September 1991. This is a discussion of the various legal, social, and privacy-related issues within computer networks using the U.S. Secret Service’s raid on Steve Jackson Games as a case study.

    Google Scholar 

  7. National Counterintelligence Center, “Annual Report to Congress on Foreign Economic Collection and Industrial Espionage,” Annual Report to the U.S. Congress, 1998. This is a summary of the espionage threat to the United States Specific highlights include the interest in information security and information warfare.

    Google Scholar 

  8. Overill, R.E., “Computer Crime—An Historical Survey,” Defence Systems International, 1998. This paper discusses the historical development of computer crime.

    Google Scholar 

  9. United Nations, “International Review of Criminal Policy—United Nations Manual on the Prevention and Control of Computer-Related Crime,” International Review of Criminal Policy, No. 43 and 44, 1994. These are extensive documents reviewing all aspects of international computer crime.

    Google Scholar 

  10. U.S. Department of Justice. News Release, March 1, 1998. “Israel Citizen Arrested in Israel for Hacking U.S. and Israel Government Computers” http://www.usdoj.gov/opa/pr/1998/march/125.htm.html

  11. “Section A: The Nature and Definition of Critical Infrastructure” http://www.nipc.gov/nipcfaq.htm

  12. Andrew Grosso. “The Economic Espionage ACT: Touring the Minefields.” Communications of the ACM, August 2000, 43(8), 15–18.

    Google Scholar 

  13. Grampp, F. and Morris, R. “Unix Operating System Security” AT&T Bell Laboratories Tech J. 63,8, Part 2 (October 1984), 1649.

    Google Scholar 

  14. Peter G. Neumann. “Risks of Insiders.” Communications of the ACM, December 1999, 42(12), p. 160.

    Google Scholar 

  15. Joseph M. Kizza. Civilizing the Internet: Global Concerns and Efforts Toward Regulation. McFarland, Jefferson, N.C., 1999.

    Google Scholar 

  16. “Computer Attacks: What They Are and How to Defend Against Them,” ITL Bullettins, May 1999. http://www.nist.gov/iti/lab/bulletins/may99.html

Download references

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag New York, Inc.

About this chapter

Cite this chapter

(2003). Computer Crimes. In: Kizza, J.M. (eds) Ethical And Social Issues In The Information Age. Texts in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-0-387-22466-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-22466-4_9

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-0-387-95421-9

  • Online ISBN: 978-0-387-22466-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics