Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-2 of 2
Keywords: Crime
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
New Technologies and Future Trends in Computer Security
Available to Purchase
Journal:
Industrial Management & Data Systems
Industrial Management & Data Systems (1994) 94 (8): 30–36.
Published: 01 October 1994
...Karen A. Forcht; Joan Pierson Looks at the wide‐ranging changes which are taking place in the computer industry and what this means for security issues. Highlights current computer crimes and looks at why computer crime has been able to increase, e.g. computer terrorism, sale of contaminated...
Journal Articles
The Automated Office and Computer Crime: A Preliminary Assessment
Available to Purchase
Journal:
Industrial Management & Data Systems
Industrial Management & Data Systems (1986) 86 (1-2): 14–19.
Published: 01 January 1986
...Clive Blatchford The opportunity for computer‐related crime in the automated office/distributed environment is greater than in the larger, centrally driven data‐processing facilities, where access to equipment is usually easier and there is no hierarchy of physical controls as in a separate...
