Finally, we present our views on how individual computer users and businesses can help in the successful implementation of various anti-fraud programs.
Computer fraud according to the United States Computer Fraud and Abuse Act is generally committed when a person intentionally or consciously accesses a computer without or exceeding given authorization or such act is intended to obtain valuable things (Vasiu et. al., 2004, p.3). The definition of computer frauds may vary in ways but they all end in one common conclusion; it is an act causing loss of property to another by input, alteration, deletion, and suppression in which offenders are also classified as insiders or outsiders. However, computer frauds are normally committed by "insiders" (Vasiu et. al., 2004, p.4) for an obvious reason. Insiders do know the system and are courageous enough to challenge detection due to their long time exposure and familiarity of the system's weak points. Nonetheless, this does not negate the possibility that in some situation, the perpetrators may not always necessarily an insider. They may also come externally pretending to be a person with an authorization to take advantage of the vulnerabilities of the system.
A good example given by Vasiu et. al. ...Show more