Skip to main content

Computer Crime and Victim Justice

  • Chapter
To Be a Victim
  • 257 Accesses

Abstract

This chapter does not deal with computer crime per se. Its objective is to demonstrate, by an analysis of this type of crime, that the traditional approach to criminal law and justice is cumbersome and ineffective, and that new legislation could quickly become obsolete with the advancement of science and technology. Furthermore, if victim justice is given more careful consideration and emphasis, the legal system should improve significantly. The time is ripe for more systematic and scientific approaches to criminal and tort laws so that existing laws can be simplified and made more effective while reducing the need for new laws to include technological changes. General discussions of ways to improve the legal system can be found in Chapter 8 of this book. This chapter is an application of similar ideas to a specific area. General information on computer crime is available in the articles and books cited in the chapter reference list.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Ball, Leslie D. (1982, April). “Computer Crime.” Technology Review, p. 21.

    Google Scholar 

  • Becker, Louise. (1982). Computer Crime and Security, Issue Brief No. 1B0047. Washington, DC: Library of Congress, Congressional Research Service.

    Google Scholar 

  • Conly, Catherine H., and McEwen, J. Thomas. ( 1990, January-February). “Computer Crime.” National Institute of Justice Reports, No. 218, Washington, DC: National Institute of Justice, U.S. Department of Justice, pp. 2–5.

    Google Scholar 

  • Delaney, John. (1986). Criminal Law. Bogota, NJ: John Delaney.

    Google Scholar 

  • Francis, Dorothy B. (1987). Computer Crime. New York: Dutton.

    Google Scholar 

  • Frankel, Karen A. (1982, April). “Computer in Court.” Technology Review, pp. 28–29.

    Google Scholar 

  • Greenhouse, Linda. (1991). “Evidence a Fleeing Suspect Drops Is Ruled Legal.” The New York Times, April 24, p. A20L.

    Google Scholar 

  • Howlett, Debbie. (1990). “Computer Fraud: A Big-Bite Crime.” USA Today/ International Edition, July 10, p. 34.

    Google Scholar 

  • Ifill, Gwen. (1991). “Panel Endorses Waiting Period to Buy Pistols.” The New York Times, April 24, pp. Al, A16.

    Google Scholar 

  • Koba Associates, Inc. (1980a). Computer Crime: Expert Witness Manual. Washington, DC: U.S. Department of Justice, Bureau of Justice Statistics.

    Google Scholar 

  • Koba Associates, Inc. (1980b). Computer Crime: Legislative Resource Manual. Washington, DC: U.S. Department of Justice, Bureau of Justice Statistics.

    Google Scholar 

  • Markoff, John. (1990a). ‘Arrests in Australia Underscore Global Computer Tampering Peril.“ The New York Times, April 4, pp. 1, 16.

    Google Scholar 

  • Markoff, John. (1990b). “Computer Invader Is Found Guilty.” The New York Times, January 23, p. A21.

    Google Scholar 

  • Markoff, John. (1990c). “Drive to Counter Computer Crime Aims at Invaders.” The New York Times, June 3, pp. 1, 30.

    Google Scholar 

  • McKinney’s. (1988). Consolidated Laws of New York, Annotated, Book 39, Penal Law. St. Paul, MN: West Publishing.

    Google Scholar 

  • Meyer, Philip N. (1990). “The Failure of Traditional Law Schools.” The New York Times, September 2, p. F13.

    Google Scholar 

  • th Congress, 1st Session. (1981). H.R. 3970. Washington, DC: Government Printing Office.

    Google Scholar 

  • th Congress, 2nd Session. (1980). Hearings on Computer Systems Protection Act of 1979. S/240, Serial No. 96–75. Washington, DC: Government Printing Office.

    Google Scholar 

  • Nycum, Susan Hubbell. (1978). Hearings on Federal Computer Systems Protection Act of 1977, S.1766. Washington, DC: Government Printing Office.

    Google Scholar 

  • Organization for Economic Cooperation and Development. (1986). Com-puter-Related Crime: Analysis of Policy, Information, Computer and Communication Policy Series No. 10. Amsterdam, The Netherlands: North- Holland Publishing.

    Google Scholar 

  • Parker, Donn B. (1978). Hearings on Federal Computer Systems Protection Act of 1977, S. 1766. Washington, DC: Government Printing Office.

    Google Scholar 

  • Parker, Donn, and Nycum, Susan Hubbell. (1981). Hearings on Federal Computer Systems Protection Act of 1981, H.R. 3970. Washington, DC: Government Printing Office.

    Google Scholar 

  • Perry, Robert L. (1986). Computer Crime. New York: Franklin Watts. Prager, Kenneth. (1991). “Physicians Shouldn’t Assist Patients in Suicide.” The New York Times, April 8, p. A14L.

    Google Scholar 

  • Wessel, Milton R. (1981). Hearings on Federal Computer Systems Protection Act of 1981, H.R. 3970. Washington, DC: Government Printing Office.

    Google Scholar 

  • Wilke, John R. (1990). “In the Arcane Culture of Computer Hackers, Few Doors Stay Closed.” The Wall Street Journal, August 22, pp. 1, 4.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1991 Springer Science+Business Media New York

About this chapter

Cite this chapter

Chu, J.T. (1991). Computer Crime and Victim Justice. In: Sank, D., Caplan, D.I. (eds) To Be a Victim. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-5974-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-1-4899-5974-4_14

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-306-43962-9

  • Online ISBN: 978-1-4899-5974-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics