skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 150264 Find in a Library
Title: Prevention of Purchasing Fraud in the EDI Setting
Journal: Security Journal  Volume:4  Issue:2  Dated:(April 1993)  Pages:97-104
Author(s): D L Whelchel
Date Published: 1993
Page Count: 8
Type: Report (Technical Assistance)
Format: Article
Language: English
Country: United States of America
Annotation: The implementation of electronic data interchange (EDI) to create a paperless purchasing environment presents new security challenges that require both small and large businesses to increase their vigilance toward the possibility of fraud and ensure effective security measures.
Abstract: Purchasing is a basic function for all businesses. Clerical functions are one of the most visible parts of purchasing activity, involving quotation requests, supplier surveys, specifications, statements of work, correspondence, and many kinds of forms. EDI is a comparatively new technology but is not in use worldwide in purchasing functions. Like every other financial process, purchasing is vulnerable to internal and external fraud. A fraud prevention plan should be a team project involving security, network, accounting, and purchasing management. Crucial areas of a prevention plan include authority and responsibility for supplier selection; the procedures for controlling supplier information and order entry; the controls for both manual and EDI purchasing; the physical setting of the purchasing department; computer, network, and communications security; and purchasing staffing. Specific measures should include clear definition and documentation of authority, strict control and verification procedures, sophisticated passwords, encryption, physical security of the purchasing area, and staffing by qualified personnel. Tables and 33 references
Main Term(s): Computer crime prevention measures
Index Term(s): Business security; Computer privacy and security; Crime prevention planning; Data integrity; Data security
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.