IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Combating Computer Fraud

Combating Computer Fraud
View Sample PDF
Author(s): Steve Brown (Capella University, USA)
Copyright: 2008
Pages: 6
Source title: Encyclopedia of Information Technology Curriculum Integration
Source Author(s)/Editor(s): Lawrence A. Tomei (Robert Morris University, USA)
DOI: 10.4018/978-1-59904-881-9.ch019

Purchase

View Combating Computer Fraud on the publisher's website for pricing and purchasing information.

Abstract

Money is to be made with computer fraud. While this statement seems to be shocking, it is nonetheless a very real indication of the seriousness of the nature. As we are becoming more dependent on technology for our information and convenience, and the lack of process being made in stopping computer fraud, we are increasing the risk we place on ourselves. Computer fraud is often perpetuated by computer professionals who have an understanding of information technology. They have an advantage over the normal computer user, and due to the anonymous nature of the Internet, it is often difficult to catch and try suspects (Lynch, 2003).

Related Content

Jessica A. Manzone, Julia L. Nyberg. © 2024. 22 pages.
Angela Marie Novak, Brittany N. Anderson. © 2024. 27 pages.
Lucy K. Hunt, Erin Yoshida-Ehrmann. © 2024. 20 pages.
Angela Marie Novak. © 2024. 36 pages.
Lynne F. Henwood. © 2024. 19 pages.
Sean Doyle. © 2024. 20 pages.
Nyree D. Clark. © 2024. 26 pages.
Body Bottom