IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Computer Fraud Challenges and Its Legal Implications

Computer Fraud Challenges and Its Legal Implications
View Sample PDF
Author(s): Amber A. Smith-Ditizio (Texas Woman's University, USA) and Alan D. Smith (Robert Morris University, USA)
Copyright: 2019
Pages: 14
Source title: Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics
Source Author(s)/Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-5225-7492-7.ch013

Purchase

View Computer Fraud Challenges and Its Legal Implications on the publisher's website for pricing and purchasing information.

Abstract

In this chapter, the authors provide a position-based discussion in reference to selective cyberthreats to devices and data breaches (which include malware, phishing, social engineering, data communication interception, malicious insider actions, just to name a few), and further provide information on applicable defenses and their legal implications. Although the authors do not assess the different threats and defenses in order to help prevent future vulnerability towards hacking for consumers, they do provide a conceptual understanding of the growing threats of such attacks and the inability of current legal safeguards to counter such threats. Particularly vulnerable are mobile systems, which are more prone to loss and theft once intercepted.

Related Content

Securing the Cloud for Big Data
Michael Robinson, Kevin Jones. © 2020. 23 pages.
View Details View Details PDF Full Text View Sample PDF
Big Data: Challenges and Solutions
P. Lalitha Surya Kumari. © 2020. 42 pages.
View Details View Details PDF Full Text View Sample PDF
Human Factors in Cybersecurity: Issues and Challenges in Big Data
Xichen Zhang, Ali A. Ghorbani. © 2020. 31 pages.
View Details View Details PDF Full Text View Sample PDF
Security and Privacy Challenges in Big Data
Dharmpal Singh, Ira Nath, Pawan Kumar Singh. © 2020. 28 pages.
View Details View Details PDF Full Text View Sample PDF
Cloud-Centric Blockchain Public Key Infrastructure for Big Data Applications
Brian Tuan Khieu, Melody Moh. © 2020. 16 pages.
View Details View Details PDF Full Text View Sample PDF
Security Vulnerabilities, Threats, and Attacks in IoT and Big Data: Challenges and Solutions
Prabha Selvaraj, Sumathi Doraikannan, Vijay Kumar Burugari. © 2020. 27 pages.
View Details View Details PDF Full Text View Sample PDF
Threat Hunting in Windows Using Big Security Log Data
Mohammad Rasool Fatemi, Ali A. Ghorbani. © 2020. 21 pages.
View Details View Details PDF Full Text View Sample PDF
Body Bottom