Date of Award

5-1-1989

Document Type

Independent Study

Degree Name

Master of Business Administration (MBA)

Abstract

The area of computer crime is a new and complex one. Corporations are increasingly feeling the ramifications of computer crime. It is estimated that computer crime has an impact of over four billion dollars yearly.

The types of computer crime include vandalism, theft of industrial secrets, and theft of financial assets. The range of computer crime includes profit organizations, service centers, and research facilities. A new danger for research and medical centers is the possibility of destroying vital research data.

The type of people involved in computer crime are varied. Most of the people are not super intelligent; rather they are people who have had an opportunity to use the computer and understand ways of circumventing computer safeguards. The most common abuser is the company employee who uses his or her position and has the skill, knowledge, and access. Their are numerous methods of entering the system; including data diddling and the trojan horse technique.

Because of the rise in computer crime, including data there has been a need to upgrade security systems. Until recently, the gap between computer technology and security technology has been increasing. New innovations have started to add more security to the system. New computer systems must have the capability to be upgraded as the techniques of computer crime improve.

There has also been a push to get legislation passed aimed at slowing down computer crime. Because the area of computer crime is new, it is taking time to implement the laws. The courts are also having to approach the area slowly. There are few cases pertaining to computer crime, so many of the cases now in court are setting precedents.

The purpose of this study is to enlighten managers and users of computers on the need for a secure system. There are a number of useful policies and procedures which can be implemented to keep computers and their assets safe increasing. New innovations have started to add more security to the system. New computer systems must have the capability to be upgraded as the techniques of computer crime improve.

There has also been a push to get legislation passed aimed at slowing down computer crime. Because the area of computer crime is new, it is taking time to implement the laws. The courts are also having to approach the area slowly. There are few cases pertaining to computer crime, so many of the cases now in court are setting precedents.

The purpose of this study is to enlighten managers and users of computers on the need for a secure system. There are a number of useful policies and procedures which can be implemented to keep computers and their assets safe.

Included in

Business Commons

Share

COinS