Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Computer Fraud Challenges and Its Legal Implications

Computer Fraud Challenges and Its Legal Implications
View Sample PDF
Author(s): Amber A. Smith-Ditizio (Texas Woman's University, USA) and Alan D. Smith (Robert Morris University, USA)
Copyright: 2019
Pages: 14
Source title: Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics
Source Author(s)/Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-5225-7492-7.ch013


View Computer Fraud Challenges and Its Legal Implications on the publisher's website for pricing and purchasing information.


In this chapter, the authors provide a position-based discussion in reference to selective cyberthreats to devices and data breaches (which include malware, phishing, social engineering, data communication interception, malicious insider actions, just to name a few), and further provide information on applicable defenses and their legal implications. Although the authors do not assess the different threats and defenses in order to help prevent future vulnerability towards hacking for consumers, they do provide a conceptual understanding of the growing threats of such attacks and the inability of current legal safeguards to counter such threats. Particularly vulnerable are mobile systems, which are more prone to loss and theft once intercepted.

Related Content

. © 2021. 31 pages.
. © 2021. 23 pages.
. © 2021. 20 pages.
. © 2021. 29 pages.
. © 2021. 27 pages.
. © 2021. 20 pages.
. © 2021. 20 pages.
Body Bottom