Cyber Crime

A New Kind of Fraud


Our next complex problem area, cyber crime, is different from the drugs challenge and requires different methodological approaches. The competencies and skills required to tackle drugs are not far removed from those of a doctor. They require a holistic approach in which the total situation is understood and a strategy for cure or improvement is developed. There are many subproblems that have to be recognized, understood, and managed with each likely to affect the others. Also, a number of groups have to cooperate and coordinate their activities if progress toward a solution is to be made.


Criminal Activity Computer Crime Military Installation Criminal Intent German Police 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    European (November 13–19, 1997).Google Scholar
  2. 2.
    Mark Mottershead, “Taking the Complexity out of Encryption,” Computer Bulletin, no. 3: 12–14.Google Scholar
  3. 3.
    European, April 10–16, 1997.Google Scholar
  4. 4.
    Chris Sundt, “Security Problems of Electronic Data Interchange,” Intersec 4,no. 1 (January 1994): 21–24.Google Scholar
  5. 5.
    Othmar Kyas, Internet Security (London: International Thomson Computer Press, 1997).Google Scholar
  6. 6.
    Joel P. Friedman and Frank Terzuoli, “Operating Risk in Financial Services,” in Risk Management: Problems and Solutions, eds. William H. Beaver and George Parker (London: McGraw Hill, 1995).Google Scholar
  7. 7.
    Stephen Fay, The Collapse of Barings (London: Arrow Business Books, 1996).Google Scholar
  8. 8.
    Katie Hafner and John Markoff, Cyberpunk (London: Fourth Estate, 1991).Google Scholar
  9. 9.
    Alvin Toffler, Powershift (New York: Bantam Books, 1990).Google Scholar
  10. 10.
    Hafner and Markoff, Cyberpunk.Google Scholar
  11. 11.
    Secure Computing (May 1997). Editorial.Google Scholar
  12. 12.
    Othmar Kyas, Internet Security (London: International Thomson Computer Press, 1997).Google Scholar
  13. 13.
    Alan Routledge, “A Question of Responsibility,” Secure Computing (June 1997): 38–40.Google Scholar
  14. 14.
    Neil Barrett, “Digital Crime: Policing the Cybernation,” Secure Computing (November 1997): 21–24.Google Scholar
  15. 15.
    “Hackers for Hire,” Secure Computing (December 1997): 22–28.Google Scholar
  16. 16.
    Clifford Stall, The Cuckoo’s Egg (London: Bodley Head, 1990).Google Scholar
  17. 17.
    Ibid., p. 104.Google Scholar

Copyright information

© Kluwer Academic/Plenum Publishers 1999

Personalised recommendations