Skip to main content
Log in

A forensic methodology for countering computer crime

  • Published:
Artificial Intelligence Review Aims and scope Submit manuscript

Abstract

This paper argues that the moves by police and consultancy firms to successfully enforce recent computer misuse legislation requires the bringing together of investigative, legal, courtroom and computing skills in an extension of forensic science. The term suggested for this new discipline is computer forensics'.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Albrecht, W. S., Howe, K. R. and Romney, M. B. (1984) Deterring Fraud: The Internal Auditor's Perspective, The Institute of Internal Auditors Research Foundation.

  • Audit Commission (1990) Survey of Computer Fraud and Abuse, HMSO, London.

    Google Scholar 

  • Bowcott, O. and Hamilton, S. (1990) Beating the System, Bloomsbury, London.

    Google Scholar 

  • Comer, M. J. (1985) Corporate Fraud (2nd ed.), McGraw-Hill.

  • Council of Europe Committee of Ministers (1989) Recommendation No. R (89) 9 of the Committee f Ministers to Member States on Computer-related Crime, Council of Europe.

  • Cornwall, H. (1988) Hacking away at computer law reform, New Law Journal 30 (September).

  • Hoffer, J. A. and Straub, D. W. Jr. (1989) The 9 to 5 underground: Are you policing computer crimes? Sloan Management Review (Summer).

  • Hollinger, R. C. and Lanza-Kaduce, L. (1988) The process of criminalisation: The case of computer crime laws, Criminology 26 (1).

  • Law Commission (1989) Computer Misuse (Law Com. No. 186 Cm 819), HMSO.

  • Law Commission (1990) Jurisdiction over Offenses of Fraud and Dishonesty with a Foreign Element (Law Com. 180 Cm 801), HMSO, London.

    Google Scholar 

  • Nasuti, F. W. (1986) Investigating computer crime, Journal of Accounting and EDP (Fall), 13–19.

  • Stanley, P. M. (1986) Computer crime investigation and investigators, Computers and Security 5, 309–313.

    Google Scholar 

  • Tapper, C. (1990) Computer Law, Longmans, London.

    Google Scholar 

  • Walden, I. (1989) EDI and the Law, Addison Wesley, New York.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Collier, P.A., Spaul, B.J. A forensic methodology for countering computer crime. Artif Intell Rev 6, 203–215 (1992). https://doi.org/10.1007/BF00150234

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF00150234

Key Words

Navigation