![]() |
Home
| Databases
| WorldLII
| Search
| Feedback
Edited Legal Collections Data |
Book Title: Handbook of Global Research and Practice in Corruption
Editor(s): Graycar, Adam; Smith, G. Russell
Publisher: Edward Elgar Publishing
ISBN (hard cover): 9781849805018
Section: Chapter 14
Section Title: Corrupt Misuse of Information and Communications Technologies
Author(s): Smith, Russell G.; Jorna, Penny
Number of pages: 28
Extract:
14 Corrupt misuse of information and
communications technologies
Russell G. Smith and Penny Jorna
INTRODUCTION
Computers have not only provided an efficient means of communication
for individuals, businesses and government agencies alike, but have also
allowed criminals to plan and execute their illegal activities more quickly
and with reduced risks of detection. Since their development in the 1970s,
computerized technologies have developed rapidly and in imaginative
ways (Smith, 2010), not only with respect to their speed of operation and
capacity for storage of information, but also in relation to the physical size
of devices which are now highly portable and even attractive as fashion
accessories.
One area of criminal misuse of information and communications
technology (ICT) that has been identified as of growing concern is the
use of electronic devices in connection with corrupt practices both in
government and in the private sector (Heeks, 1998; Bell and Zipparo,
2001). Under the provisions of the United Nations Convention Against
Corruption (UNCAC), which entered into force on 14 December 2005
(United Nations, 2004), corruption includes not only the conventional
activities such as bribery of public officials and embezzlement of public
funds, but also trading in influence and acts of concealment and launder-
ing of the proceeds of corrupt behaviour. Corruption in connection with
private sector business activities is also included. Each of these areas of
risk intersects closely with modern use of ICT, both in terms of the facili-
tation of the commission of corrupt acts, and in relation to technology
being ...
AustLII:
Copyright Policy
|
Disclaimers
|
Privacy Policy
|
Feedback
URL: http://www.austlii.edu.au/au/journals/ELECD/2011/1001.html