AustLII Home | Databases | WorldLII | Search | Feedback

Edited Legal Collections Data

You are here:  AustLII >> Databases >> Edited Legal Collections Data >> 2011 >> [2011] ELECD 1001

Database Search | Name Search | Recent Articles | Noteup | LawCite | Help

Smith, Russell G.; Jorna, Penny --- "Corrupt Misuse of Information and Communications Technologies" [2011] ELECD 1001; in Graycar, Adam; Smith, G. Russell (eds), "Handbook of Global Research and Practice in Corruption" (Edward Elgar Publishing, 2011)

Book Title: Handbook of Global Research and Practice in Corruption

Editor(s): Graycar, Adam; Smith, G. Russell

Publisher: Edward Elgar Publishing

ISBN (hard cover): 9781849805018

Section: Chapter 14

Section Title: Corrupt Misuse of Information and Communications Technologies

Author(s): Smith, Russell G.; Jorna, Penny

Number of pages: 28

Extract:

14 Corrupt misuse of information and
communications technologies
Russell G. Smith and Penny Jorna


INTRODUCTION

Computers have not only provided an efficient means of communication
for individuals, businesses and government agencies alike, but have also
allowed criminals to plan and execute their illegal activities more quickly
and with reduced risks of detection. Since their development in the 1970s,
computerized technologies have developed rapidly and in imaginative
ways (Smith, 2010), not only with respect to their speed of operation and
capacity for storage of information, but also in relation to the physical size
of devices which are now highly portable ­ and even attractive as fashion
accessories.
One area of criminal misuse of information and communications
technology (ICT) that has been identified as of growing concern is the
use of electronic devices in connection with corrupt practices ­ both in
government and in the private sector (Heeks, 1998; Bell and Zipparo,
2001). Under the provisions of the United Nations Convention Against
Corruption (UNCAC), which entered into force on 14 December 2005
(United Nations, 2004), corruption includes not only the conventional
activities such as bribery of public officials and embezzlement of public
funds, but also trading in influence and acts of concealment and launder-
ing of the proceeds of corrupt behaviour. Corruption in connection with
private sector business activities is also included. Each of these areas of
risk intersects closely with modern use of ICT, both in terms of the facili-
tation of the commission of corrupt acts, and in relation to technology
being ...


AustLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback
URL: http://www.austlii.edu.au/au/journals/ELECD/2011/1001.html