Skip to main content

Computer Crimes

  • Chapter
  • First Online:
Ethical and Social Issues in the Information Age

Part of the book series: Texts in Computer Science ((TCS))

  • 3242 Accesses

Abstract

This chapter surveys the history and examples of computer crimes, their types, costs to society, and strategies for detection and prevention. In the discussion, it is noted that a great number of computer attacks fall into two categories: penetration and denial of service attacks. And these are discussed in-depth. Attack motives are also discussed. Are the nations, businesses, and individuals prepared for computer attacks? Are they ready to pay the price? We look for answers to these questions as we ponder the costs and consequences of computer crimes. We note also that although it is difficult to estimate the actual costs of e-attacks on physical system resources, progress is being made for better and more accurate estimates. An in-depth discussion of the social and ethical consequences that include psychological effects, moral decay , loss of privacy , and loss of trust follows. We end this chapter with recommendations for educating the computing device users in computer ethics. The need to educate the user to be aware of possible sources of computer crimes and what to do if and when one becomes a victim of these crimes is stressed. It is noted that education can go a long way in reducing computer crimes if the users take crime preventive steps every time they use the computer and computer-related technologies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Forchet K (1994) Computer security management. Boyd & Fraser, Danvers

    Google Scholar 

  2. The history of hacking—timeline of hacking techniques [Infographic]. https://tbgsecurity.com/the-history-of-hacking-timeline-of-hacking-techniques-infographic/

    Google Scholar 

  3. Denning PJ (1990) Computers under attack: intruders, worms and viruses. ACM Press, New York

    Google Scholar 

  4. Mirko Zorz. Organizations still unprepared for malicious insiders. Help Net Security. 17 Aug 2016. https://www.helpnetsecurity.com/2016/08/17/malicious-insiders/

    Google Scholar 

  5. Levy S (1984) Hackers: heroes of the computer revolution. Anchor Press/Doubleday, Garden City

    Google Scholar 

  6. Security in cyberspace: U.S. senate permanent subcommittee on investigations. 5 June 1996

    Google Scholar 

  7. Kizza JM (2001) Computer network security and cyber ethics. McFarland, Jefferson

    Google Scholar 

  8. Christensen J (1999) Bracing for guerilla warfare in cyberspace. CNN Interactive, 6 Apr 1999

    Google Scholar 

  9. Morgan S (2016) Cyber crime costs projected to reach $2 trillion by 2019. Tech. 17 Jan 2016. https://www.forbes.com/sites/stevemorgan/2016/01/17/cyber-crime-costs-projected-to-reach-2-trillion-by-2019/#71eb5e033a91

    Google Scholar 

  10. Ponemon cost of data breach study. IBM Security. https://www.ibm.com/security/data-breach/index.html

    Google Scholar 

  11. 2010 annual study: U.S. cost of a data breach compliance pressures, cyber attacks targeting sensitive data drive leading IT organizations to respond quickly and pay more. Ponemon Institute LC. http://www.symantec.com/content/en/us/about/media/pdfs/symantec_ponemon_data_breach_costs_report.pdf?om_ext_cid=biz_socmed_twitter_facebook_marketwire_linkedin_2011Mar_worldwide_costofdatabreach

  12. Warwick A (2011) The cost of cyber attacks is up 56%, study reveals. Computer Weekly. 4 Aug 2011. http://www.computerweekly.com/news/2240105258/The-cost-of-cyber-attacks-is-up-56-study-reveals

Further Reading

  • Anderson KE (1997) Criminal threats to business on the internet: a white paper. Global Technology Research, Inc., 23 June 1997. This is a discussion of the increasing trend of criminal activity against information systems, from the low-level, amateur intruder to organized crime, and industrial and international espionage

    Google Scholar 

  • Chaturvedi A et al (2000) Fighting the Wily Hacker: modeling information security issues for online financial institutions using the SEAS environment. INET JAPAN 2000 conference, 18 July, 2000. The paper discusses proposed methods to analyze the online risks faced by the financial industry

    Google Scholar 

  • Computer Security Institute/Federal Bureau of Investigation (1998) Annual cost of computer crime rise alarmingly: organizations report $136 million in losses Press Release. Computer Security Institute, 4 March, 1998. This is a summary of the 1998 survey on computer crime

    Google Scholar 

  • Counterintelligence Office of the Defense Investigative Service (1996) Industry CI trends. OASDPA/96-S-1287, 26 December 1996. This paper discusses threats and techniques used for low-level intelligence collecting by foreign companies and governments against U.S. DoD contractors

    Google Scholar 

  • General Accounting Office (GAO) (1996) GAO executive report—B-266140. Report to the Committee on Governmental Affairs, U.S. Senate, 22 May, 1996. This gives a detailed report on attacks to U.S. Department of Defense computer systems with recommendations for improved security

    Google Scholar 

  • Grampp F, Morris R (1984) Unix operating system security. AT&T Bell Lab Tech J 63 (8, part 2):1649

    Google Scholar 

  • Grosso A (2000) The economic espionage ACT: touring the minefields. Commun ACM 43(8):15–18

    Google Scholar 

  • Kapor M (1991) Civil liberties in cyberspace: when does hacking turn from an exercise of civil liberties into crime? Sci Am, September 1991. This is a discussion of the various legal, social, and privacy-related issues within computer networks using the U.S. Secret Service’s raid on Steve Jackson Games as a case study

    Google Scholar 

  • Kizza JM (1999) Civilizing the internet: global concerns and efforts toward regulation. McFarland, Jefferson

    Google Scholar 

  • National Counterintelligence Center (1998) Annual report to congress on foreign economic collection and industrial espionage. Annual report to the U.S. Congress. This is a summary of the espionage threat to the United States Specific highlights include the interest in information security and information warfare

    Google Scholar 

  • Neumann PG (1999) Risks of insiders. Commun ACM 42(12):160

    Google Scholar 

  • Overill RE (1998) Computer crime—an historical survey. Defence Systems International. This paper discusses the historical development of computer crime

    Google Scholar 

  • Section A: the nature and definition of critical infrastructure. http://www.nipc.gov/nipcfaq.htm

  • United Nations (1994) International review of criminal policy—United Nations manual on the prevention and control of computer-related crime. Int Rev Crim Policy (43–44). These are extensive documents reviewing all aspects of international computer crime

    Google Scholar 

  • U.S. Department of Justice (1998) Israel citizen arrested in Israel for hacking U.S. and Israel government computers, News release, 1 March. http://www.usdoj.gov/opa/pr/1998/March/125.htm.html

  • Chris King. Spotlight on: malicious insiders and organized crime activity. Software Engineering Institute. CERTâ Insider Threat Center. January 2012, TECHNICAL NOTE CMU/SEI-2012-TN-001 http://resources.sei.cmu.edu/asset_f/TechnicalNote/2012_004_001_15425.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joseph Migga Kizza .

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kizza, J.M. (2017). Computer Crimes. In: Ethical and Social Issues in the Information Age. Texts in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-70712-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-70712-9_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-70711-2

  • Online ISBN: 978-3-319-70712-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics