Computer Fraud - Essay Example

Only on StudentShare

Extract of sample
Computer Fraud

Finally, we present our views on how individual computer users and businesses can help in the successful implementation of various anti-fraud programs.
Computer fraud according to the United States Computer Fraud and Abuse Act is generally committed when a person intentionally or consciously accesses a computer without or exceeding given authorization or such act is intended to obtain valuable things (Vasiu et. al., 2004, p.3). The definition of computer frauds may vary in ways but they all end in one common conclusion; it is an act causing loss of property to another by input, alteration, deletion, and suppression in which offenders are also classified as insiders or outsiders. However, computer frauds are normally committed by "insiders" (Vasiu et. al., 2004, p.4) for an obvious reason. Insiders do know the system and are courageous enough to challenge detection due to their long time exposure and familiarity of the system's weak points. Nonetheless, this does not negate the possibility that in some situation, the perpetrators may not always necessarily an insider. They may also come externally pretending to be a person with an authorization to take advantage of the vulnerabilities of the system.
A good example given by Vasiu et. al. ...Show more


Computer frauds while less frightening than physical violence or intrusion can inflict enormous damage to an organization and community. To prevent this high-tech crimes we must recognized the nature of computer frauds and understand how and why this is being done…
Author : ngutmann
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Computer Fraud"
with a personal 20% discount.
Grab the best paper

Related Essays

Computer Science-Information System
Sometimes a company needs to know as much as possible about its employees (especially for HR managing); and almost always a company needs to be sure that its employees not serve as potential channels for business information leakage. Such information leaks can be intentional (e.g.
3 pages (750 words) Essay
FIanacial Statement Fraud Worldcom Case
history. Presenting significant clues and insights on the nature and implications of financial accounting frauds perpetrated by corporations, the case of WorldCom is particularly instructive from a forensic accounting perspective. The case study presents an analysis and discussion on the accounting frauds committed by WorldCom that led to its eventual bankruptcy and the criminal prosecution of key corporate executives.
30 pages (7500 words) Essay
Computer Forensics
Then, it proceeds to introduce the field of computer forensics, and the tools and technology that are used in this field for fighting Internet crimes. The paper finishes the discussion by enumerating applicable laws and notable contributions of computer forensics.
9 pages (2250 words) Essay
Fraud detection in accounting
Though the corporation's character flaws can be traced to its earliest days, they flourished under top executive Jeff Skilling. He didn't act in a vacuum. Enron had a distracted, hands-off chairman, a compliant board of directors and an impotent staff of accountants, auditors and lawyers.
11 pages (2750 words) Essay
Plastic Card Fraud in the UK
The rise in the plastic card industry has been result of the innovation and marketing competence of banks worldwide. These developments were enhanced by parallel developments in information and communications technology (ICT) which made real time online transaction a possibility within and across countries and financial markets (Almiron, 2007).
30 pages (7500 words) Essay
In what ways did humanists have an effect on cultural and religious development?
Since philosophers appear to be the rebels of the social establishment, and intend to bring revolutionary reforms in the world, they firmly stand against the prevailing perversion and deviancy from the true religious teachings and
9 pages (2250 words) Research Paper
Categories of Computer Crime
Criminals use computers to facilitate the embezzlement of money and properties; theft of confidential records; and alteration and destruction of valuable files. The misuse of the computer may involve the falsification of computer signatures through
2 pages (500 words) Essay
Find out how much would it cost
to get a custom paper written by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email