Since the advent of the computer, there has been increasing concern regarding its inherent vulnerability to deviant and criminal behavior (McKningt, 1974). Computer criminality is generally classified as an "occupational" form of white-collar crime that benefits the perpetrator by victimizing an individual or organization and is usually committed during the course of one's occupational activity (Clinard and Quinney, 1973). Parker (1976;17-21) has delineated four distinct types of criminal behavior involving computers. In the first type, the computer is the direct "object" of the illegal act. Examples include physical abuse, sabotage, vandalism, or arson directed against computer "hardware." The second type involves the "symbolic" use of the computer and data processing output "to intimidate, deceive, or defraud victims." These offenses, such as the false invoice scam, rely partially on the perceived infallibility of computer-generated information. In the third type the computer is used as the "instrument" of the offense. Here, electronic data processing equipment is used for theft and trespassing in ways that previously required physically removing something or entering the premises of the victim.