Computer frauds, while less dramatic than crimes of violence, can inflict significant damage at community, organizational or individual level. In order to properly quantify and mitigate the risk, computer frauds needs to be well understood. In this paper, in a conceptual-analytical research approach, we propose a dissection of computer fraud. First, we look into the elements of an offense, the act of fraud in general, than explain what is and what is not computer fraud. Next, from a prevention perspective, we propose a taxonomy of computer fraud with respect to perpetration platform, and to perpetration method. We believe that our contributions extend the existing knowledge of the phenomenon, and can assist those fighting computer fraud to ...
Offenders have embraced the use of technology to commit fraud. Through emails, social networking sit...
Hacking involves the attempt to compromise the security of a computer system in orderto gain unautho...
The main purpose of the thesis is a specification of so called COMPUTER or so called CYBERNETIC CRIM...
Fraud is one of the besetting evils of our time. While less dramatic than crimes of violence like mu...
Fraud is one of the besetting evils of our time. While less dramatic than crimes of violence like mu...
In this paper, the authors deal with the problem of computer- related fraud. Computer- related fraud...
Organizations use forensic auditing to mitigate the risks associated with fraud, optimizing their in...
Computer and communications networks have greatly enhanced the effectiveness and efficiencies of org...
A methodology is proposed for optimizing the allocation of resources in the detection of computer fr...
This research provides a "rich insight'' into the management of Information Systems (IS) security wi...
Abstract — Over the past ten years, crime (traditionally based in the world of physical entity) has ...
Crime is undergoing a metamorphosis. The online technological revolution has created new opportuniti...
The advent of IT has created unprecedented opportunities for the occurrence of computer crime like f...
As computers enter the business environment with increasing regularity, their introduction is also c...
The diversity in cyber crime is vast and it is a challenge to solve the cases related to data theft,...
Offenders have embraced the use of technology to commit fraud. Through emails, social networking sit...
Hacking involves the attempt to compromise the security of a computer system in orderto gain unautho...
The main purpose of the thesis is a specification of so called COMPUTER or so called CYBERNETIC CRIM...
Fraud is one of the besetting evils of our time. While less dramatic than crimes of violence like mu...
Fraud is one of the besetting evils of our time. While less dramatic than crimes of violence like mu...
In this paper, the authors deal with the problem of computer- related fraud. Computer- related fraud...
Organizations use forensic auditing to mitigate the risks associated with fraud, optimizing their in...
Computer and communications networks have greatly enhanced the effectiveness and efficiencies of org...
A methodology is proposed for optimizing the allocation of resources in the detection of computer fr...
This research provides a "rich insight'' into the management of Information Systems (IS) security wi...
Abstract — Over the past ten years, crime (traditionally based in the world of physical entity) has ...
Crime is undergoing a metamorphosis. The online technological revolution has created new opportuniti...
The advent of IT has created unprecedented opportunities for the occurrence of computer crime like f...
As computers enter the business environment with increasing regularity, their introduction is also c...
The diversity in cyber crime is vast and it is a challenge to solve the cases related to data theft,...
Offenders have embraced the use of technology to commit fraud. Through emails, social networking sit...
Hacking involves the attempt to compromise the security of a computer system in orderto gain unautho...
The main purpose of the thesis is a specification of so called COMPUTER or so called CYBERNETIC CRIM...