This study examines the functionality and propagation patterns of computer viruses, worms, and Trojan horses detected during a 12-month period beginning on January 1, 2004. Using data obtained from threat reports prepared by a major vendor of computer security products, the authors find that these unique forms of cybercrime warrant general concern but that their overall threat to corporate, government, and end computer users thus far has been exaggerated. The authors conclude that greater attention must be paid to the role of the computer user in the spread of viruses and other malicious software and to the small handful of chronic offenders who contribute disproportionately to the problem.
- Computer crime
- Trojan horses
ASJC Scopus subject areas
- Social Sciences(all)
- Computer Science Applications
- Library and Information Sciences