The Proceedings of the Information Systems Education Conference 2001: §05a    Home    Papers/Indices    prev (§04b)    Next (§05b)
    Paper (refereed)     Student-Faculty Papers
Recommended Citation: Smith, L, K S Koong, L C Liu, and R Rottman.  A Study of the Proliferation of Computer Crimes.  In The Proceedings of the Information Systems Education Conference 2001, v 18 (Cincinnati): §05a.
CDpic

A Study of the Proliferation of Computer Crimes

thumb
Refereed
 
Lauren Smith    [a1] [a2]
Computer Information Systems
Southern University at New Orleans    [u1] [u2]
New Orleans, Louisiana, USA    [c1] [c2]

Kai S. Koong    [a1] [a2]
Computer Information Systems
Southern University at New Orleans    [u1] [u2]
New Orleans, Louisiana, USA    [c1] [c2]

Lai C. Liu    [a1] [a2]
Computer Information Systems
Southern University at New Orleans    [u1] [u2]
New Orleans, Louisiana, USA    [c1] [c2]

Robert Rottman    [a1] [a2]
Kentucky State University    [u1] [u2]
Frankfort, Kentucky, USA    [c1] [c2]

The proliferation of computer crimes is a critical management issue for companies and organizations around the globe. This study examines the monetary losses of 13 categories of computer crimes for the period 1997 through 2000 as reported by the Computer Security Institute (CSI) and the Federal Bureau of Investigation (FBI). Specifically, this research examines the trend, magnitude, and direction for each of the different categories of computer crime. In addition, the total cost of computer crime over a four-year period was analyzed. The outcomes of this research should be most helpful to information systems administrators who are responsible for formulating information systems control strategies. Network and security administrators, Webmasters, and law enforcement officers of federal and state agencies such as the Federal of Bureau of Investigation (FBI), the Central Intelligence Agency (CIA), and the Telecommunications Commission of the various states will find the analysis contained in this report insightful. Individuals involved with analyzing and securing corporate information resources such as computer consultants, systems analysts, systems developers, software engineers, and security experts will find the results meaningful. Educators and security scholars will find the outcomes reported in this study useful for the development of instructional material as well as the formulation of training strategies.

Keywords: computer crimes, information systems security, computer security

Read this refereed paper in Adobe Portable Document (PDF) format. (136 K bytes)
Preview this refereed paper in Plain Text (TXT) format. (25 K bytes)

CDpic
Comments and corrections to
webmaster@isedj.org