This paper assesses the past, present and future of computer crime-from its origins a quarter century ago when dissident students bombed and burned computers, while greedy programmers altered programs so their checking accounts would be forever full; to the present day when the massive Internet is so thoroughly penetrated that no user can rely on the integrity of data. It presents the computer as the victim, environment and tool of the criminal. Then it characterizes the computer criminal and explores his/her motivation, opportunities, means and methods.
CITATION STYLE
Carroll, J. M. (1995). Portrait of the Computer Criminal (pp. 577–589). https://doi.org/10.1007/978-0-387-34873-5_42
Mendeley helps you to discover research relevant for your work.