Abstract
This paper argues that the moves by police and consultancy firms to successfully enforce recent computer misuse legislation requires the bringing together of investigative, legal, courtroom and computing skills in an extension of forensic science. The term suggested for this new discipline is computer forensics'.
Article PDF
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
References
Albrecht, W. S., Howe, K. R. and Romney, M. B. (1984) Deterring Fraud: The Internal Auditor's Perspective, The Institute of Internal Auditors Research Foundation.
Audit Commission (1990) Survey of Computer Fraud and Abuse, HMSO, London.
Bowcott, O. and Hamilton, S. (1990) Beating the System, Bloomsbury, London.
Comer, M. J. (1985) Corporate Fraud (2nd ed.), McGraw-Hill.
Council of Europe Committee of Ministers (1989) Recommendation No. R (89) 9 of the Committee f Ministers to Member States on Computer-related Crime, Council of Europe.
Cornwall, H. (1988) Hacking away at computer law reform, New Law Journal 30 (September).
Hoffer, J. A. and Straub, D. W. Jr. (1989) The 9 to 5 underground: Are you policing computer crimes? Sloan Management Review (Summer).
Hollinger, R. C. and Lanza-Kaduce, L. (1988) The process of criminalisation: The case of computer crime laws, Criminology 26 (1).
Law Commission (1989) Computer Misuse (Law Com. No. 186 Cm 819), HMSO.
Law Commission (1990) Jurisdiction over Offenses of Fraud and Dishonesty with a Foreign Element (Law Com. 180 Cm 801), HMSO, London.
Nasuti, F. W. (1986) Investigating computer crime, Journal of Accounting and EDP (Fall), 13–19.
Stanley, P. M. (1986) Computer crime investigation and investigators, Computers and Security 5, 309–313.
Tapper, C. (1990) Computer Law, Longmans, London.
Walden, I. (1989) EDI and the Law, Addison Wesley, New York.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Collier, P.A., Spaul, B.J. A forensic methodology for countering computer crime. Artif Intell Rev 6, 203–215 (1992). https://doi.org/10.1007/BF00150234
Issue Date:
DOI: https://doi.org/10.1007/BF00150234