Computer Fraud

Masters
Essay
Miscellaneous
Pages 8 (2008 words)
Download 0
Computer frauds while less frightening than physical violence or intrusion can inflict enormous damage to an organization and community. To prevent this high-tech crimes we must recognized the nature of computer frauds and understand how and why this is being done…

Introduction

Finally, we present our views on how individual computer users and businesses can help in the successful implementation of various anti-fraud programs.
Computer fraud according to the United States Computer Fraud and Abuse Act is generally committed when a person intentionally or consciously accesses a computer without or exceeding given authorization or such act is intended to obtain valuable things (Vasiu et. al., 2004, p.3). The definition of computer frauds may vary in ways but they all end in one common conclusion; it is an act causing loss of property to another by input, alteration, deletion, and suppression in which offenders are also classified as insiders or outsiders. However, computer frauds are normally committed by "insiders" (Vasiu et. al., 2004, p.4) for an obvious reason. Insiders do know the system and are courageous enough to challenge detection due to their long time exposure and familiarity of the system's weak points. Nonetheless, this does not negate the possibility that in some situation, the perpetrators may not always necessarily an insider. They may also come externally pretending to be a person with an authorization to take advantage of the vulnerabilities of the system.
A good example given by Vasiu et. al. ...
Download paper
Not exactly what you need?

Related papers

Computer Fraud
Finally, we present our views on how individual computer users and businesses can help in the successful implementation of various anti-fraud programs.…
Computer Crime and Security
Later investigations revealed that it was an insider incident, involved the theft of subsequent selling of patients' credit card numbers, and that the activities emanates from the Call Centre. Having provided you with a general overview of the situation, I will now explain its potential and actual consequences, summarize the results of the post-mortem and clarify both lessons learnt and future…
Computer Science-Information System
in the case of industrial espionage or actions on the competitors' side) or inadvertent. Anyway, uncontrolled distribution of private information (especially about customers, e.g. card numbers, addresses, orders, business transactions, etc.) will result in withdrawal of customers and business partners, numerous lawsuits, and reducing revenues and profits. Therefore, often companies try to protect…
FIanacial Statement Fraud Worldcom Case
The research essentially begins with an examination of the growth of WorldCom over the years, and the industrial background and other factors that had caused the company to engage in fraudulent accounting practice. The case study shall then discuss the specific nature, and occurrence of financial statement fraud and examines how the fraud was discovered from a forensic accounting perspective. The…
Computer Forensics
We live in borderless world. Although people our bounded by geographic terrain, the World Wide Web has made it possible for people to connect with each other with a click of the mouse. Truly, this is a wonderful world to live.…
Fraud detection in accounting
While the company grew rapidly through the 1990s, some of the worst manifestations of its culture - obsessions with bonuses, the stock price and exotic accounting - were also growing, and out of controlThough the corporation's character flaws can be traced to its earliest days, they flourished under top executive Jeff Skilling. He didn't act in a vacuum. Enron had a distracted, hands-off chairman,…
Plastic Card Fraud in the UK
It has profoundly changed not only the banking industry but also trade and commerce, social dynamics and value systems (Danes & Hira, 1990; Levi, 1998b). Plastic cards have now become an important part of people's daily lives.In addition, Hayashi (2003) has investigated the effects of ATM on banking operation. The first ATM network founded in the UK in 1986, it was used for dispensing money at the…