Trends in the Fight Against Computer-Related Delinquency

  • Bart De Schutter
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1528)


The grasp of information technology upon almost all societal activities is an indisputable and irreversible fact. Transfer of data, information, knowledge or know-how has undergone with the technological wave a profound change in its form, speed and distance coverage. This mutative effect can certainly be beneficial to society in all its components (economic, strategic, intellectual, cultural).


Supra Note Penal Code Trade Secret Unauthorized Access OECD Guideline 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    It seems that from the start of scientific activity in the field every major writer uses its own terms. See: SchjØlberg, Computers and penal legislation, Oslo, 1983, p. 3; Solarz, Computer technology and computer crime, Stockholm, 1981, p. 23 The computer is sometimes the instrument or target of an act (Von zur Muhlen, Computer KriminalitÄt, Berlin 1972, p. 17); The specific purpose (Parker, D.B., Computer Abuse Assessment, Washington, 1975, p. 3); Bequai only goes for “part of larger forms of criminal activity: white collar crime” (Bequai, Computer crime, Lexington, 1978, P.1). See also: Rec.n.R(89)9 on computer-related crime and final report of the European Committee on Crime Problems, Council of Europe, Strasbourg, 1990.Google Scholar
  2. [2]
    OECD-ICCP, Computer related crime-analysis of legal policy, Paris (1986), p. 7.Google Scholar
  3. [3]
    See U.K.: A. Norman, Computer Insecurity, London, 1983 and K. Wong & Farquhar, W., Computer related Fraud Casebook, BIS Applied Systems, Ltd., Manchester, 1983, 106 p. See also: Australia’s information at the Caulfield Institute of Technology, Computer-Abuse Research Bureaus (CIT-CARB); Japan, National Police Department, White paper on computer crime; the yearly reports of CLUSIF in France.Google Scholar
  4. [4]
    Within SRI, D. Parker’s publications are the more important ones: Parker, D.B., Crime by computer, New York, Charles Scibner’s and Sons, 1976, 308 p. Parker, D.B., Nycum, S.B., Computer abuse, U.S. Department of Commerce, Springfield, NTIS, 1973, 131 p. D. Icove, K. Seger and W. Von Storch, Computer Crime A crimefighter’s handbook, Sebastopol (CA) O-Reilly and assoc. 1995, 437p. Drs. J.C. Von Dijk R.A., “Computercriminaliteit”, Ars Aequi Libri (ser. Strafrecht en criminologie, dl. 3), p. 203, 1984; Ph. JOST, “Les pillards d’ordinateur défient le FBI”, VSD, 27 jan. 1983, p. 10.Google Scholar
  5. [5]
    Local government Audit Inspectorate-Department of the Environment, Computer Fraud Survey Report, Crown copyright, July 1981, 33 pgs.Google Scholar
  6. [6]
    Scottish Law Commission, Consultative Memorandum nr. 68, Computer Crime, (March 1986), p. 1. See also: the regular publication Newsware (V.De Pous editor)-Clusifreport 1995.Google Scholar
  7. [7]
    L.J. SEIDLER, F. ANDREWS and M.J. EPSTEIN: “The Equity Funding Papers, the anatomy of a fraud”, New York (J. Wiley and Sons, Inc., 1977).Google Scholar
  8. [8]
    “10.2 Million $ theft may yield profit for victim”, EDCAPS, Jan.’ 79, blz. 11–12, Aug.’ 79, Pg. 14–15.Google Scholar
  9. [9]
    Whiz-kids managed to establish a link with a private network of the General Telephone Electronic Telenet. S. Herten, “Computercriminaliteit: er is nog toekomst in de toekomst”, Humo, 26 jan. 1984, nℴ 2264, p. 32.-A similar incident occured in Tokyo, where patient files were copied by hackers with blackmail as a consequence (Newsware, dec. 94).Google Scholar
  10. [10]
    S. O’DY, “Informatique: La chasse aux perceurs de codes”, L’express, 9 march 1984, P. 74–75.Google Scholar
  11. [11]
    L’express, 26 april 1980, L’informatique nouvelle, sept. 1980, p. 25.Google Scholar
  12. [12]
    BLOOMBECKER, J., International Computer Crime: Where Terrorism and Transboder Data Flow meet, Computers and Security, 1982, p. 41–53.-e.g. fraudelent telemarketing, according to the FBI a 40 million dollar issue.Google Scholar
  13. [13]
    These and other ex. of telematic crime in: P. Van Eecke, Criminaliteit in Cyberspace, Mys en Breesch, Gent, 1997, p. 6.Google Scholar
  14. [14]
    G. Leveille, “Data base security systems, protecting the source”, Today’s Office, oct. 1982, p. 62. D. Parker, Computer abuse Assessment, Washington D.C.(National Science Foundation), 1975, p. 32. B. Allan, The biggest computer fraudes: lessons for CPA’s, The Journal of Accountancy, Mai 1977, p. 52–62.Google Scholar
  15. [15]
    U. Sieber, Gefahr und Abwehr der ComputercriminalitÄt, Betriebs-Berater 1982, p. 1433; A. Norman, Computer Insecurity, London (1983); US Department of Justice, Computer Crime, Criminal Justice Resource Manual, Washington, 1979.Google Scholar
  16. [16]-OECD, ICCP, Computer-related crime, Ananlysis of legal policy, nr. 10, Paris 1986.-Council of Europe, supra note 1.Google Scholar
  17. [23]
    U. Sieber, The international handbook on computer crime, West Chicester (1986) p. 94 et seq.Google Scholar
  18. [25]
    B. De Schutter & B. Sprayt, “Is international law on security of information systems emerging?” in Sizer (ed.), Security and Control of Information technology in Society, IFIP Transactions A-43, Amsterdam, North Holland, 1994, p. 15–23.Google Scholar
  19. [27]
    OECD guidelines (for the security) of information systems (1992)-E.C. on Information Technology Security Evaluation Criteria (ITSEC)Google Scholar
  20. [29]
    e.g. Denmark: (the Danish Private registers etc. Act Nℴ 293, 8 June 1978 and the Danish Public Authorities’ Registers Act, nℴ 294 of 8 June 1978) France: (La loi relative à l’informatique, aux fichiers et aux libertés, nℴ 78–17, 6 January 1977, B.G.B.I., I S 201) Luxembourg: (Loi du 31 mars 1979 réglementant l’utilisation des données nominatives dans les traitements informatiques Mém. 1 1979, p. 582). United Kingdom: (Data Protection Act 1984, 12 July 1984, Her Majesty’s Stationery Office, C. 30 9/84 CCP). Belgium: Act of 8 dec. 1992, M.B. 18 march 1993.Google Scholar
  21. [31]
    A. Van Mensel, “De bescherming van fabricagegeheimen of Technische know-how naar Belgisch recht”, R.W., 1981–82 kol. 2001, op kol. 2009.Google Scholar
  22. [32]
    A. Lucas, La protection des créations industrielles abstraites, Citée (Paris) 1978, p. 230 nr. 358.Google Scholar
  23. [35]
    Weiss, E., “Telecommunications policy: the users need for telecommunication systems. A review of trends in Europe” in Communication regulation and international business, Proceedings of a Workshop held at the I.M.I., April 1983, J.F. Rada, G.R. Pipe, ed., 1984, p. 136). E.g. what is the effect of the privatisation of B.T. ? Beesley M.E., “Liberalisation of the use of British Telecommunications Network”, Department of Industry, Report to the Secretary of State, London, 1981. France: Loi, nℴ 84, 939 du 23 octobre 1984, J.O., 25 octobre 1984, p.3335.Google Scholar
  24. [42]
    J. De Houwer, Privacy en grensoverschrijdend dataverkeer, in: Soften Hard, ware het niet om de fraude, IUS, nr. 7 (1985) pg. 92. Denmark: The Danish Private Registers etc. Act Nℴ 293, 8 June 1978. The Danish Public Authorities’ Registers Act Nℴ 294, 8 June 1978. France: Loi relative à l’informatique, aux fichiers et aux libertés, Nℴ 78-17, 6 January 1978, J.O., 7 January 1978. Israel: Protection of Privacy Law, 5741-1981 van 23 February 1981, Sefer Ha-Chukkim Nℴ 1011 of the 5th Adar Bet, 5741 (AA March 1981). Iceland: Act concerning the systematic recording of personal data. Wet nℴ 63 of May 25, 1981. Luxembourg: Loi du 31 mars 1979 réglementant l’utilisation des données nominatives dans les traitements informatiques, Mém. A 1979, P. 582. Norway: Act relating to personal data registers etc., Wet nℴ 48 van 9 juni 1978. Austria: Datenschutzgesetz D.S.G., October 18, 1978, Bundesgesetzblatt 1978, November 28, 1978, 3619-3631. U.K.: Data Protection Act 1984, chapter 35, July 12, 1984, Her Majesty’s Stationary Office, C30 9/84 CCP. West-Germany: Bundesdatenschutzgesets, January 27, 1977, BGBI, I S.201. Sweden: Data Act (1973: 289).Google Scholar
  25. [44]
    OECD, DSTI/ICCP/84.22 (1985) p. 53.Google Scholar
  26. [45]
    Council of Europe, Computer-related crime, Strasbourg, 1990, Appendix I, Nℴ Ia and b.Google Scholar
  27. [46]
    B. Spruyt (B. De Schutter, collaborating), Grensoverschrijdende Informaticacriminaliteit en de Europese strafrechtelijke samenwerking, Kluwer (Antwerpen), 1989, 163 p.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Bart De Schutter
    • 1
  1. 1.Center for the interaction between law and technologyVrije UniversiteitBrussel

Personalised recommendations