Portrait of the Computer Criminal

  • Carroll J
N/ACitations
Citations of this article
4Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper assesses the past, present and future of computer crime-from its origins a quarter century ago when dissident students bombed and burned computers, while greedy programmers altered programs so their checking accounts would be forever full; to the present day when the massive Internet is so thoroughly penetrated that no user can rely on the integrity of data. It presents the computer as the victim, environment and tool of the criminal. Then it characterizes the computer criminal and explores his/her motivation, opportunities, means and methods.

Cite

CITATION STYLE

APA

Carroll, J. M. (1995). Portrait of the Computer Criminal (pp. 577–589). https://doi.org/10.1007/978-0-387-34873-5_42

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free