In seventy five pages this paper discusses IS security training and computer crime issues. Fifty five sources are cited in the bibliography.