Technology, property, and law: the case of computer crime

Between 1975 and 1986 forty-eight states passed laws specifically criminalizing unauthorized access to computer-based information. Thirty of these states passed their computer crime laws between 1982 and 1985. This flurry of legislative activity occurred in a climate of concern for the need to stem...

Full description

Saved in:  
Bibliographic Details
Authors: Michalowski, Raymond J. (Author) ; Pfuhl, Erdwin H. (Author)
Format: Electronic Article
Language:English
Published: 1991
In: Crime, law and social change
Year: 1991, Volume: 15, Issue: 3, Pages: 255-275
Online Access: Volltext (lizenzpflichtig)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000caa a22000002 4500
001 1884551653
003 DE-627
005 20240612132235.0
007 cr uuu---uuuuu
008 240328s1991 xx |||||o 00| ||eng c
024 7 |a 10.1007/BF00196724  |2 doi 
035 |a (DE-627)1884551653 
035 |a (DE-599)KXP1884551653 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Michalowski, Raymond J.  |e VerfasserIn  |0 (DE-588)170522830  |0 (DE-627)060625066  |0 (DE-576)131401351  |4 aut 
109 |a Michalowski, Raymond J.  |a Michalowski, Raymond  |a Michalowski, Ray 
245 1 0 |a Technology, property, and law: the case of computer crime  |c Raymond J. Michalowski and Erdwin H. Pfuhl 
264 1 |c 1991 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Between 1975 and 1986 forty-eight states passed laws specifically criminalizing unauthorized access to computer-based information. Thirty of these states passed their computer crime laws between 1982 and 1985. This flurry of legislative activity occurred in a climate of concern for the need to stem what was characterized as a ‘wave of computer crime.’ The data presented here, however, indicate that these laws did not result in any corresponding wave of prosecutions of computer criminals. This suggests that social forces other than an instrumental need for a mechanism to prosecute computer criminals played a role in the passage of computer crime laws. Specifically, we argue that the passage of computer crime laws resulted from the need to incorporate a new form of value within the establish framework of property rights, and a desire to preserve established relationships between power and knowledge that were threatened by the emergence of computer technology. We conclude by suggesting that the study of law-making is enhanced by examining the structural bases for the motives of legislators and advocates of legal change, in addition to the motives themselves. 
650 4 |a Computer Technology 
650 4 |a International Relation 
650 4 |a Social Force 
650 4 |a Structural Base 
650 4 |a Unauthorized Access 
700 1 |a Pfuhl, Erdwin H.  |e VerfasserIn  |4 aut 
773 0 8 |i Enthalten in  |t Crime, law and social change  |d Getzville, NY : HeinOnline, 1991  |g 15(1991), 3, Seite 255-275  |h Online-Ressource  |w (DE-627)320525325  |w (DE-600)2015096-9  |w (DE-576)252295854  |x 1573-0751  |7 nnns 
773 1 8 |g volume:15  |g year:1991  |g number:3  |g pages:255-275 
856 4 0 |u https://doi.org/10.1007/BF00196724  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4505167615 
LOK |0 003 DE-627 
LOK |0 004 1884551653 
LOK |0 005 20240612132235 
LOK |0 008 240328||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21-110  |c DE-627  |d DE-21-110 
LOK |0 092   |o n 
LOK |0 852   |a DE-21-110 
LOK |0 852 1  |9 00 
LOK |0 935   |a krzo 
ORI |a WA-MARC-krimdoka001.raw