{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:09Z","timestamp":1754157669851,"version":"3.41.2"},"reference-count":9,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[1998,5,1]],"date-time":"1998-05-01T00:00:00Z","timestamp":893980800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998,5,1]]},"abstract":"<jats:p>Describes how the Office of Strategic Crime Assessments (OSCA) and the Victoria Police Computer Crime Investigation Squad conducted the 1997 Computer Crime and Security Survey in order to establish some reliable base\u2010line information regarding the extent of computer\u2010related crime in Australia today. A representative sample of over 300 Australian companies was surveyed. Of the respondents, 37 per cent had experienced some form of intrusion or other unauthorised use of computer systems in the last 12 months. Nearly 90 per cent of those that had experienced computer\u2010related incidents had been subjected to attacks from sources internal to their own organisation. Over 60 per cent were subjected to intrusions from external sources (meaning that a significant number of companies had been subjected to attacks from both employees and outsiders). States that the results of this study empirically support many elements of the anecdotal evidence and highlights a number of issues for Australian law enforcement.<\/jats:p>","DOI":"10.1108\/09685229810209414","type":"journal-article","created":{"date-parts":[[2007,4,13]],"date-time":"2007-04-13T10:16:45Z","timestamp":1176459405000},"page":"78-101","source":"Crossref","is-referenced-by-count":10,"title":["1997 computer crime and security survey"],"prefix":"10.1108","volume":"6","author":[{"given":"David","family":"Thompson","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"key":"key2022012320095174600_b1","doi-asserted-by":"crossref","unstructured":"Carter, D.L. and Katz, A.J. (1996, \u201cComputer crime and security\u201d, Security Journal, No. 7..","DOI":"10.1016\/S0960-2593(96)90066-X"},{"key":"key2022012320095174600_b2","unstructured":"Computer Security Institutes (CSI) (1996, Computer Crime and Security Survey, http:\/\/www.gocsi.com"},{"key":"key2022012320095174600_b3","doi-asserted-by":"crossref","unstructured":"Computer Security Issues and Trends, Computer Security Institute\/FBI Computer Crime Survey, 1996 and 1997.","DOI":"10.1016\/S1361-3723(97)82879-5"},{"key":"key2022012320095174600_b4","unstructured":"Financial Times (1997), UK, 1 April."},{"key":"key2022012320095174600_b5","unstructured":"Kamay, V. (1995, \u201cShifting and paradigm of computer crime and enterprise security\u201d, ACARB paper, RMIT, June."},{"key":"key2022012320095174600_b6","unstructured":"Power, R. (1996, Current and Future Danger, Computer Security Institute (CSI), San Francisco, CA."},{"key":"key2022012320095174600_b7","unstructured":"Strategic Survey 1994\u20101995 (1995), The International Institute for Strategic Studies, Oxford University Press."},{"key":"key2022012320095174600_b8","unstructured":"The Future of Computer Crime (1997), OSCA Seminar Proceedings, January."},{"key":"key2022012320095174600_b9","unstructured":"UN Commission on Crime and Criminal Justice (1995, Manual on the Prevention and Control of Computer\u2010related Crime, New York, NY, 1995."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685229810209414","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810209414\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810209414\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:47Z","timestamp":1753402187000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/6\/2\/78-101\/178427"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,5,1]]},"references-count":9,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1998,5,1]]}},"alternative-id":["10.1108\/09685229810209414"],"URL":"https:\/\/doi.org\/10.1108\/09685229810209414","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[1998,5,1]]}}}