Abstract
Although computer fraud continues to be a thorn in the side of many organizations, fresh perspectives to addressing this type of crime are rare. This paper advances a preventive approach which reduces those criminal opportunities that permit computer fraud to take place. The construction of crime specific opportunity structures, which enable the relevant parties to conceptualize the fraud environment, is advocated. This aids and promotes an inter-departmental preventive effort, so vital to combating and containing fraud.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35515-3_53
Chapter PDF
Similar content being viewed by others
References
Audit Commission. (1997) Ghost in the Machine: An Analysis of IT Fraud and Abuse. Audit Commission Publications. London.
Brantingham, P.J. and Brantingham, P.L. (1975) The Spatial Patterning of Burglary. Howard Journal of Criminal Justice. 14. 11–23.
Clarke, R. (1980) Situational Crime Prevention: Theory and Practice. British Journal of Criminology. 20. 136–137.
Clarke, R. (ed.) (1992) Situational Crime Prevention: Successful Case Studies. Harrow and Heston. New York.
Clarke, R. (1995) Situational Crime Prevention. In M. Tonry and D. Farrington (eds.), Building a Safer Society. Strategic Approaches to Crime Prevention. Crime and Justice: A Review of Research. Vol. 19. University of Chicago Press. Chicago.
Clarke, R. and Martin, D. (1971) Absconding from Approved Schools. Home Office Research Study No. 12. H.M.S.O. London.
Cohen, L. and Felson, M. (1979) Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review. 44. 588–608.
Corner, M. (1998) Corporate Fraud. 3rd ed. Gower Publishing Limited. Aldershot.
Cornish, D. and Clarke, R. (1986) Situational Prevention, Displacement of Crime and Rational Choice Theory. In K. Heal, and G. Laycock (eds.), Situational Crime Prevention: From Theory into Practice. H.M.S.O. London.
Cusson, M. (1986) L’analyse strategique et quelques developpements recente en Criminologue. Criminologie. XIX. 51–72.
Felson, M. (1986) Linking Criminal Choices, Routine Actvities and Informal Control, and Criminal Outcomes. In D.B. Cornish and R.V. Calrke (eds.), The Reasoning Criminal. Springer Verlag. New York.
Jenner, P. (1996) The Role of Information Technology in Combating Fraud. PA Consulting Group. February.
Matza, D. (1964) Delinquency and Drift. Wiley. New York.
Mischel, W. (1968) Personality and Assessment. Wiley. New York.
Poyner, B. and Webb, B. (1991) Crime Free Housing. Butterworth Architect. Oxford.
Reppetto, T.A. (1974) Residential Crime. Ballinger. Cambridge, M.A.
Scarr, H.A. (1973) Patterns of Burglary. 2•d ed. U.S. Department of Justice, National Institute of Law Enforcement and Criminal Justice. Washington, D.C.
Short, J.F., Jr and Strodtbeck, F.L. (1965) Group Processes and Gang Delinquency. University of Chicago Press. Chicago.
Sinclair, I. (1971) Hostels for Probationers. Home Office Research Study No. 6. H.M.S.O. London.
Tizard, J., Sinclair, I. and Clarke, R.V. (1975) Varieties of Residential Experience. Routledge and Kegan Paul. London.
Waller, I. and Okihiro, N. (1979) Burglary: The Victim and the Public. University of Toronto Press. Toronto.
Yablonsky, L. (1962) The Violent Gang. Macmillan. New York.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 IFIP International Federation for Information Processing
About this paper
Cite this paper
Willison, R. (2000). Reducing Computer Fraud Through Situational Crime Prevention. In: Qing, S., Eloff, J.H.P. (eds) Information Security for Global Information Infrastructures. SEC 2000. IFIP — The International Federation for Information Processing, vol 47. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35515-3_11
Download citation
DOI: https://doi.org/10.1007/978-0-387-35515-3_11
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5479-7
Online ISBN: 978-0-387-35515-3
eBook Packages: Springer Book Archive