Skip to main content
Log in

Computer crime: Assessing the lawyer's perspective

  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

The past decade has seen a rapid development and proliferation of sophisticated computer systems in organizations. Designers, however, have minimized the importance of security control systems, (except for those systems where data security and access control have obviously been of major importance). The result is an increasing recognition that computer systems security is often easily compromised.

This research will provide the initial step in assessing ways in which attorneys retained to prosecute computer crimes and computer people who discover these violations can work together to strengthen both our computer systems to thwart violators and the laws that are currently “on the books” that can be used to prosecute violators.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Bloombecker, Jay: 1986, ‘Computer Crime, Computer Security, Computer Ethics’, The First Annual Statistical Report of the National Center for Computer Crime Data, 2700 N. Cahuenga Boulevard, Los Angeles, CA 90681, (Drawings are based on information contained in this publication.)

  • Bologna, Jack: 1985, ‘Internal Security Issues and Answers’, Office Administration and Automation, July 1.

  • ‘Crime Bill Passes House’, Computerworld, October 19, 1986, page 1.

  • ‘Data Security ... Beware of the Insiders’, Comp-U-Fax, Data Processing Management Association, Park Ridge, Illinois, May/June 1985, Vol. 12, Nos. 3. (Drawings are based on information contained in this publication.)

  • ‘FBI Pursues Computer Crime’, Computer Law Strategist, December 1985, Volume 11, No. 8.

  • Nimmer, Raymond L.: 1985, The Law of Computer Technology, Boston: Warren, Gorham, and Lamont, Inc.

    Google Scholar 

  • Schweiter, James A.: 1986, Computer Crime and Russian Information ... Practical Guide for Managers, Elsevier Publishing Company, New York, 195 pages.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

Dr. Karen A. Forcht is currently an Associate Professor in the Information and Decision Sciences Department at James Madison University in Harrisonburg, Virginia. She has published over 20 articles in the following journals: Dat Management, Journal of Data Education, Interface, Journal of CIS, Computer Security Management, Journal of Systems Management, Security Management Journal, for the Computer Security Institute, and numerous other computer journals. She presented the MIS portion of the National Computer Educator's Institute, sponsored by Mitchell Publishing Company, at Central State University during the summer of 1986. Dr. Forcht received her doctorate from Oklahoma State University and is a Certified Data Educator (CDE).

Dr. Daphyne Saunders Thomas is currently an Assistant Professor of Business Law and Ethics in the Department of Finance and Business law at James Madison University in Harrisonburg, Virginia. She has published articles in numerous journals including the SWFAD Business Law Proceedings, The Mid-Atlantic Business Law Journal, Security Management Journal, The Encyclopedia of Professional Management, and Commerce Clearinghouse. In addition, she has presented papers at regional and national conferences in the areas of law, business, and computer security. Dr. Thomas received her Juris Doctorate degree from the Washington and Lee University School of Law.

Karen Worrell Wigginton is currently an Instructor of Management at James Madison University. Mrs. Wigginton received a B.A. degree in Journalism from Radford University in 1980, followed by a M.S. degree in Educational Research and Foundations in 1982. She joined the Department of Management as an Instructor in 1987. Mrs. Wigginton instructs various courses in management including Small and Family Business Management. She has also taught courses in Hospitality Industry Management.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Forcht, K.A., Thomas, D. & Wigginton, K. Computer crime: Assessing the lawyer's perspective. J Bus Ethics 8, 243–251 (1989). https://doi.org/10.1007/BF00383337

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF00383337

Keywords

Navigation