Access the full text.
Sign up today, get DeepDyve free for 14 days.
(1981)
Data Security Personal ComputingData Security Products: What's Available?
(1986)
Data Security Products Roundup: Loose Lips Skin Systems
(1986)
Computer Crime Data Management
(1986)
Useful Product Surfaced at Trade Show
(1984)
State Computer-Related Crime Laws and Regulations
(1985)
Computer Systems and Fraud Prevention
(1985)
Is Your Computer Insecure? DatamationEffective Security Programs Start With Awareness
(1984)
Report on EDP Fraud, American Institute of Certified Public Accountants
(1983)
Loose Lips Sink Systems InfosystemsKeeping Data Safe From Prying EyesFoiling Snoopers: Use 'See-Through' SecurityComputers Don't Commit Crime, People Do
(1986)
Computer Crime: What it is and How to counter it
(1985)
Computer Security and the Threat from Within
(1984)
Management Must Learn to Cope with Computer Crime ~'' OfficeWhy Are We Reluctant to Prosecute Computer Crime 9
(1986)
Computer Crime Theft in Bits and Bytes
(1985)
Computer Security: Plenty of Questions But No Easy AnswersNew federal law bolsters computer security effortsThe Security VowThe Mob: Break Into the Information Age
H. Brower (1985)
THE TIME FOR ACTION IS NOWJournal of Gerontological Nursing, 11
(1985)
Data Security Products: What is available
Programs Security (1984)
91, 100
J. Zimmerman (1985)
Is your computer insecureDatamation archive, 31
(1984)
Twelve States Add Computer Crimes Laws During
(1985)
rThe Real Odds on Computer Security
(1985)
How To Combat the Computer Crime Wave
(1983)
Multiple Control Combat Computer Crime
(1984)
Security Programs: Only As Good As We Make Them The Office
Computers are becoming more affordable and, therefore, more accessible. This accessibility provides a unique opportunity for potential criminals to commit computer crimes. These crimes could and do cause serious problems for businesses and the society. Therefore, securing computer data should be the top priority of the society. Many security measures along with good legislation could go a long way to help secure the data. Many states have passed legislation to help prevent computer crimes. In addition, there are many hardware and software available to help secure the computer data. All these measures are discussed in this paper.
ACM SIGSAC Review – Association for Computing Machinery
Published: Aug 1, 1987
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.