IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Computer Fraud Challenges and Its Legal Implications

Computer Fraud Challenges and Its Legal Implications
View Sample PDF
Author(s): Amber A. Smith-Ditizio (Texas Woman's University, USA) and Alan D. Smith (Robert Morris University, USA)
Copyright: 2019
Pages: 14
Source title: Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics
Source Author(s)/Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-5225-7492-7.ch013

Purchase

View Computer Fraud Challenges and Its Legal Implications on the publisher's website for pricing and purchasing information.

Abstract

In this chapter, the authors provide a position-based discussion in reference to selective cyberthreats to devices and data breaches (which include malware, phishing, social engineering, data communication interception, malicious insider actions, just to name a few), and further provide information on applicable defenses and their legal implications. Although the authors do not assess the different threats and defenses in order to help prevent future vulnerability towards hacking for consumers, they do provide a conceptual understanding of the growing threats of such attacks and the inability of current legal safeguards to counter such threats. Particularly vulnerable are mobile systems, which are more prone to loss and theft once intercepted.

Related Content

Michael Robinson, Kevin Jones. © 2020. 23 pages.
P. Lalitha Surya Kumari. © 2020. 42 pages.
Xichen Zhang, Ali A. Ghorbani. © 2020. 31 pages.
Dharmpal Singh, Ira Nath, Pawan Kumar Singh. © 2020. 28 pages.
Brian Tuan Khieu, Melody Moh. © 2020. 16 pages.
Prabha Selvaraj, Sumathi Doraikannan, Vijay Kumar Burugari. © 2020. 27 pages.
Mohammad Rasool Fatemi, Ali A. Ghorbani. © 2020. 21 pages.
Body Bottom