Skip to Main Content
Keywords: Crime
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Journal Articles
Information Management & Computer Security (1998) 6 (2): 78–101.
Published: 01 May 1998
...David Thompson Describes how the Office of Strategic Crime Assessments (OSCA) and the Victoria Police Computer Crime Investigation Squad conducted the 1997 Computer Crime and Security Survey in order to establish some reliable base‐line information regarding the extent of computer‐related crime...
Journal Articles
Information Management & Computer Security (1995) 3 (1): 18–20.
Published: 01 March 1995
...Jay Bloombecker Computer fraud, Law, Procedures, Punishment, USA Outlines in chart format the definitions, prohibitions, procedures and punishments of computer crime laws in the USA. The computer crime laws currently in force in every state except Vermont and under federal jurisdiction present...
Journal Articles
Information Management & Computer Security (1994) 2 (3): 43–45.
Published: 01 August 1994
...”. Computers Crime Encryption Privacy Security Expensive, flawed technology is being aggressively proposed by the US administration which may permanently erode personal privacy and will not accomplish its stated goal. It is generically referred to as the Clipper chip. The Clipper chip...
Journal Articles
Information Management & Computer Security (1994) 2 (2): 29–31.
Published: 01 May 1994
...James M. Geary A new Federal regulation aimed at tackling white‐collar crime has sobering implications for CEOs, information systems managers, and other senior management. Simply stated, the regulation holds the CEO and senior management responsible for crime involving their organization. Officials...

or Create an Account

Close Modal
Close Modal