匹配条件: “” ,找到相关结果约100条。
Computer Fraud
Kevin Curran,Laura Mc Elwee,Shubhanker Upadhyaya
Asian Journal of Information Technology , 2012,
Abstract: Examples of fraud include the unauthorized obtaining of information from a computer e.g. ‘hacking`, taking unauthorized copies of company records, trade secrets, etc. The ‘Salami` fraud this is when the perpetrator carefully ‘skims` small sums from the balances of a large number of accounts in order to bypass internal controls and escape detection. Software theft is also becoming more common with the comparative ease of making copies of computer software which has led to a huge illegal market, depriving authors of very significant revenues. This study provides an overview of some aspects of computer fraud.
Indian Streams Research Journal , 2013,
Abstract: Computer crime or Cyber crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime or it may be the target. Netcrime refers to criminal exploitation of the Internet
Legal Issues Alone Are Not Enough to Manage Computer Fraud Committed by Employees
Shalini Kesar
Journal of International Commercial Law and Technology , 2006,
Abstract: The advent of IT has created unprecedented opportunities for the occurrence of computer crime like fraud, committed by employees in particular. This paper focuses upon computer fraud committed by employees because reports claim that it is the employees who pose one of the greatest threats to organisations today. Further it argues that solely relying only on current legalisation and other sophisticated measures alone are inadequate for the managing the occurrence of computer fraud committed by employees. Therefore the onus of detecting and managing computer fraud committed by employee(s) lies within the organisations itself. In conducting the argument it discusses the shortcoming of the current legalisation and the challenges it can pose to deal with such acts. Consequently the main contribution of this paper is to enhance the awareness about management of computer fraud committed by employees.
Dal computer crime al computer-related crime
Antonio Apruzzese
Rivista di Criminologia, Vittimologia e Sicurezza , 2007,
Abstract: Nowadays, Digital Identity Theft has become one of the most lucrative illegitimate business. Also known as “phishing”, it consists in unauthorized access to an individual’s personal financial data aiming to capture information relative to on line banking and on line financial services. At the beginning people were the victims of such scams, currently the attention is directed to computer networks. “Pharming” and “keylogging” are some of the latest and utmost sophisticated data processing techniques used by computer crime fraudsters. Latest entries are the “botnets”, herds of infected machines, usually managed by one sole command centre which can determine serious damages to network systems. Botnets have made large scale identity theft much simpler to realize. Organized crime is becoming more and more involved in this new crime world that can easily assure huge profits. The Italian State Police, in order to respond more effectively to this new rising challenge, has created, with the Postal and Communication Police, an agency highly specialized in combating such new phenomenon
Survey on Computer Crime Scene Investigation Forensic Tools
Dr.A.S.N.Chakravarthy,T.V.Sarath Kumar
International Journal of Computer Trends and Technology , 2012,
Abstract: In the day to day life, the crime is becoming a big issue in the computer field. So to avoid and to protect from crime, Computer Forensics is used. This paper describes different tools that are used in the Computer Forensics. These tools are used to recover the data that is lost (ex., Hard disks).The universal truth says that the coin has two sides where as the technology also has both good and bad. We need to protect the technology by minimizing the impact of threat.
Creative Accounting Scam at Satyam Computer Limited: How the Fraud Story Unfolded?  [PDF]
Madan Lal Bhasin
Open Journal of Accounting (OJAcct) , 2016, DOI: 10.4236/ojacct.2016.54007
Abstract: Keen to project a perpetually rosy picture of the Satyam to the investors, employees and analysts, Mr. Raju (CEO and Chairman) manipulated the account books so that it appeared to be a far bigger enterprise than it actually was. The Satyam fraud has shattered the dreams of different categories of investors, shocked the government and regulators alike, and led to questioning of the accounting practices of statutory auditors and CG norms in India. An attempt has been made to provide an explanation for various “intriguing” questions about Satyam scam, such as: What was the need to commit a fraud on such a large scale? How Raju managed to cook-up books? What was Raju’s real modus-operandi to manipulate the accounts for eight years? Why was Raju forced to blow his own whistle? Why was not there a stricter punitive action against the auditors of Satyam PwC?, etc.” Now, after thorough investigations done by the CBI and SEBI, they have unveiled the methodology by which Satyam fraud was engineered. Finally, we recommend that “CA practices should be considered as a serious crime, and as such, accounting bodies, law courts and other regulatory authorities in India need to adopt very strict punitive measures to stop such unethical CA practices”.
Computer Crime and the Law from an Islamic Point of View  [PDF]
Mansoor Al-A`ali
Journal of Applied Sciences , 2007,
Abstract: Information technology is facing waves of laws guarding the interest of people using the Web technology. These laws were derived from the common laws and legislations applied in general crimes. One of these laws is the law of the state is Texas in the United States in 1985. In a world which has more than one billion Muslims, it is time to consider proposing a law that is in line with their teachings. Several calls were also raised in the Islamic countries to establish a law suitable to handle computer crimes which matches the Islamic Shar`iah law. The main question to ask here is how can the Islamic law which was established in the seventh century handle crimes resulting from the use or abuse of the new technology and provide suitable laws for the protection of its computer users. To answer this question our research has analyzed the Adellah () (Shar`iah Evidences of Quraan, Hadith and Imams sayings) that match Texas computer crime law items to verify the outlook of Islam in computer crime. We set out to prove that computer crime with its high technology is not entirely a new type of crime that needs a new Islamic theory and thus is already covered by the general Islamic Shar`iah laws. Based on the available computer crime laws and our understanding of the Quranic verses, we propose to tackle this very difficult area by proposing a computer crime law from an Islamic point of view. We believe this research is the first of its kind and will open the discussion in this important area with the exception of one study which addresses the e-commerce from an Islamic view point.
A Framework for Computer Aided Investigation of ATM Fraud in Nigeria
Azeez Nureni Ayofe,Sulaimon Bashir Adebayo,Azeez Raheem Ajetola,Atanda Funsho Abdulwahab
International Journal of Soft Computing , 2012, DOI: 10.3923/ijscomp.2010.78.82
Abstract: The conventional approach for criminal investigation and trial of cases in the law courts in developing countries like Nigeria is usually slow and unreliable. Consequently, the society is characterized by prolonged periods of detention of the suspects awaiting trial and congestion in the prisons and law courts. This paper attempts to describe the application of Artificial Intelligence (AI) in the investigation of ATM fraud in Nigeria. An Expert System (ES) is proposed which provides and supports the storage and intelligent interactive processing of the knowledge acquired by and experience of the human expert in the domain of criminal investigation, law and justice. One of the objectives of the study is to provide an intelligent computer-based system which will smooth, enhance and speed the efficient and reliable performance of the human expert in the domain of criminal investigation of ATM fraud in Nigeria. Other objective is to provide a system for computer aided learning of criminal investigation.
The fraud via a personal computer (Section 386A Greek Criminal Code)  [PDF]
Klianis Eleytherios
Intellectum , 2009,
Abstract: The great technological developments and public use of internet brought about new ‘intelligent’ forms of economic crime. This article examines, under the prism of new forms of criminality, the distinction and application respectively of the criminal provisions which regulate ‘common’ and ‘electronic’ fraud. The submission of the modern criminality to the proper legal rule as well as the legal combating of electronic crime in general does not only require an adequate knowledge of the penal law but also comprehension of the way the new technologies operate.
Attacking and Defending Perspective of E-Crime Behavior and Psychology: A Systemic Dynamic Simulation Approach  [cached]
Deng-Yiv Chiu,Chen-Shu Wang,Tien-Tsun Chung
Journal of Software , 2010, DOI: 10.4304/jsw.5.12.1349-1354
Abstract: Cybercrime is a worsening problem that can lead to loss of financial and personal information. However, ecrime is particular hard to detect since internet is boundless that make evidence hard to collect. Additionally, compare to others crime issues, e-crime is an emerging crime type thus previous crime theories should be refined and new methods of predicting e-crime should be further developed. In this research, we constructed a system dynamic simulation model from both e-crime attacking and defending side respectively. Various decision variables that related to behavior and psychology perspectives of victim and offender were added to proposed model. Furthermore, the actual ecrime data of Taiwan from Year 2000 to 2008 for cyber fraud (CF) and offend computer usage (OCU) are then further verified the proposed model. As the simulation result demonstrated, the accuracy rate of e-crime predication can be achieved about 80%. Additionally, some interest parameters are also revealed, such as the recidivism rate and report rate of victim were unknown in previous research. Finally, via inference of simulation result, some suggestions are also proposed to reduce potential e-crime behavior.

Copyright © 2008-2017 Open Access Library. All rights reserved.