Abstract
This chapter does not deal with computer crime per se. Its objective is to demonstrate, by an analysis of this type of crime, that the traditional approach to criminal law and justice is cumbersome and ineffective, and that new legislation could quickly become obsolete with the advancement of science and technology. Furthermore, if victim justice is given more careful consideration and emphasis, the legal system should improve significantly. The time is ripe for more systematic and scientific approaches to criminal and tort laws so that existing laws can be simplified and made more effective while reducing the need for new laws to include technological changes. General discussions of ways to improve the legal system can be found in Chapter 8 of this book. This chapter is an application of similar ideas to a specific area. General information on computer crime is available in the articles and books cited in the chapter reference list.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ball, Leslie D. (1982, April). “Computer Crime.” Technology Review, p. 21.
Becker, Louise. (1982). Computer Crime and Security, Issue Brief No. 1B0047. Washington, DC: Library of Congress, Congressional Research Service.
Conly, Catherine H., and McEwen, J. Thomas. ( 1990, January-February). “Computer Crime.” National Institute of Justice Reports, No. 218, Washington, DC: National Institute of Justice, U.S. Department of Justice, pp. 2–5.
Delaney, John. (1986). Criminal Law. Bogota, NJ: John Delaney.
Francis, Dorothy B. (1987). Computer Crime. New York: Dutton.
Frankel, Karen A. (1982, April). “Computer in Court.” Technology Review, pp. 28–29.
Greenhouse, Linda. (1991). “Evidence a Fleeing Suspect Drops Is Ruled Legal.” The New York Times, April 24, p. A20L.
Howlett, Debbie. (1990). “Computer Fraud: A Big-Bite Crime.” USA Today/ International Edition, July 10, p. 34.
Ifill, Gwen. (1991). “Panel Endorses Waiting Period to Buy Pistols.” The New York Times, April 24, pp. Al, A16.
Koba Associates, Inc. (1980a). Computer Crime: Expert Witness Manual. Washington, DC: U.S. Department of Justice, Bureau of Justice Statistics.
Koba Associates, Inc. (1980b). Computer Crime: Legislative Resource Manual. Washington, DC: U.S. Department of Justice, Bureau of Justice Statistics.
Markoff, John. (1990a). ‘Arrests in Australia Underscore Global Computer Tampering Peril.“ The New York Times, April 4, pp. 1, 16.
Markoff, John. (1990b). “Computer Invader Is Found Guilty.” The New York Times, January 23, p. A21.
Markoff, John. (1990c). “Drive to Counter Computer Crime Aims at Invaders.” The New York Times, June 3, pp. 1, 30.
McKinney’s. (1988). Consolidated Laws of New York, Annotated, Book 39, Penal Law. St. Paul, MN: West Publishing.
Meyer, Philip N. (1990). “The Failure of Traditional Law Schools.” The New York Times, September 2, p. F13.
th Congress, 1st Session. (1981). H.R. 3970. Washington, DC: Government Printing Office.
th Congress, 2nd Session. (1980). Hearings on Computer Systems Protection Act of 1979. S/240, Serial No. 96–75. Washington, DC: Government Printing Office.
Nycum, Susan Hubbell. (1978). Hearings on Federal Computer Systems Protection Act of 1977, S.1766. Washington, DC: Government Printing Office.
Organization for Economic Cooperation and Development. (1986). Com-puter-Related Crime: Analysis of Policy, Information, Computer and Communication Policy Series No. 10. Amsterdam, The Netherlands: North- Holland Publishing.
Parker, Donn B. (1978). Hearings on Federal Computer Systems Protection Act of 1977, S. 1766. Washington, DC: Government Printing Office.
Parker, Donn, and Nycum, Susan Hubbell. (1981). Hearings on Federal Computer Systems Protection Act of 1981, H.R. 3970. Washington, DC: Government Printing Office.
Perry, Robert L. (1986). Computer Crime. New York: Franklin Watts. Prager, Kenneth. (1991). “Physicians Shouldn’t Assist Patients in Suicide.” The New York Times, April 8, p. A14L.
Wessel, Milton R. (1981). Hearings on Federal Computer Systems Protection Act of 1981, H.R. 3970. Washington, DC: Government Printing Office.
Wilke, John R. (1990). “In the Arcane Culture of Computer Hackers, Few Doors Stay Closed.” The Wall Street Journal, August 22, pp. 1, 4.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1991 Springer Science+Business Media New York
About this chapter
Cite this chapter
Chu, J.T. (1991). Computer Crime and Victim Justice. In: Sank, D., Caplan, D.I. (eds) To Be a Victim. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-5974-4_14
Download citation
DOI: https://doi.org/10.1007/978-1-4899-5974-4_14
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-306-43962-9
Online ISBN: 978-1-4899-5974-4
eBook Packages: Springer Book Archive