Computer Fraud - Essay Example

Only on StudentShare

Extract of sample
Computer Fraud

Finally, we present our views on how individual computer users and businesses can help in the successful implementation of various anti-fraud programs.
Computer fraud according to the United States Computer Fraud and Abuse Act is generally committed when a person intentionally or consciously accesses a computer without or exceeding given authorization or such act is intended to obtain valuable things (Vasiu et. al., 2004, p.3). The definition of computer frauds may vary in ways but they all end in one common conclusion; it is an act causing loss of property to another by input, alteration, deletion, and suppression in which offenders are also classified as insiders or outsiders. However, computer frauds are normally committed by "insiders" (Vasiu et. al., 2004, p.4) for an obvious reason. Insiders do know the system and are courageous enough to challenge detection due to their long time exposure and familiarity of the system's weak points. Nonetheless, this does not negate the possibility that in some situation, the perpetrators may not always necessarily an insider. They may also come externally pretending to be a person with an authorization to take advantage of the vulnerabilities of the system.
A good example given by Vasiu et. al. ...
Download paper


Computer frauds while less frightening than physical violence or intrusion can inflict enormous damage to an organization and community. To prevent this high-tech crimes we must recognized the nature of computer frauds and understand how and why this is being done…
Author : ngutmann

Related Essays

Computer Science-Information System
in the case of industrial espionage or actions on the competitors' side) or inadvertent. Anyway, uncontrolled distribution of private information (especially about customers, e.g. card numbers, addresses, orders, business transactions, etc.) will result in withdrawal of customers and business partners, numerous lawsuits, and reducing revenues and profits. Therefore, often companies try to protect own information systems at the expense of employees privacy. This is a part of computer crime prevention measures with usage of specialized encrypting and authentication hardware and software,...
3 pages (753 words) Essay
FIanacial Statement Fraud Worldcom Case
The research essentially begins with an examination of the growth of WorldCom over the years, and the industrial background and other factors that had caused the company to engage in fraudulent accounting practice. The case study shall then discuss the specific nature, and occurrence of financial statement fraud and examines how the fraud was discovered from a forensic accounting perspective. The research shall also look at the results of the regulatory investigation and criminal prosecution in trying to understand the potential consequences of the fraud to the corporation - the management,...
30 pages (7530 words) Essay
Computer Forensics
We live in borderless world. Although people our bounded by geographic terrain, the World Wide Web has made it possible for people to connect with each other with a click of the mouse. Truly, this is a wonderful world to live.
9 pages (2259 words) Essay
Fraud detection in accounting
While the company grew rapidly through the 1990s, some of the worst manifestations of its culture - obsessions with bonuses, the stock price and exotic accounting - were also growing, and out of controlThough the corporation's character flaws can be traced to its earliest days, they flourished under top executive Jeff Skilling. He didn't act in a vacuum. Enron had a distracted, hands-off chairman, a compliant board of directors and an impotent staff of accountants, auditors and lawyers. But it was Skilling's relentless push for creativity and competitiveness that fostered a growth-at-any-cost...
11 pages (2761 words) Essay
Plastic Card Fraud in the UK
It has profoundly changed not only the banking industry but also trade and commerce, social dynamics and value systems (Danes & Hira, 1990; Levi, 1998b). Plastic cards have now become an important part of people's daily lives.In addition, Hayashi (2003) has investigated the effects of ATM on banking operation. The first ATM network founded in the UK in 1986, it was used for dispensing money at the beginning. However, it is recently provided with multifunction from cash withdrawal to mobile top-up. (Flier, 2003). One of the biggest challenge for the credit card industry is not only to maintain...
30 pages (7530 words) Essay
Categories of Computer Crime
codes; the creation of false bank accounts; theft of personal information and misuse of the stolen information; the virus infection created on computers that can hamper the proper software operations and damage records. Today, the biggest crime created through computer use is the electronic financial account transfer (Computer-Based Crime, 2011).
2 pages (502 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!