skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 64659 Find in a Library
Title: HOW CAN ACCOUNTANTS AND AUDITORS PREVENT COMPUTER FRAUD?
Journal: GOVERNMENT ACCOUNTANTS JOURNAL  Volume:27  Issue:2  Dated:(SUMMER 1978)  Pages:10-15
Author(s): P O GATES
Date Published: 1978
Page Count: 6
Format: Article
Language: English
Country: United States of America
Annotation: WAYS TO DETECT COMPUTER FRAUD AND MANAGEMENT CONTROLS AND TECHNIQUES TO PREVENT IT ARE EXAMINED.
Abstract: COMPUTER FRAUD IS DEFINED AS ANY DECEPTION OR EMBEZZLEMENT ACCOMPLISHED BY TAMPERING WITH COMPUTER PROGRAMS, DATA FILES, OPERATIONS, EQUIPMENT, OR MEDIA WHICH RESULT IN FINANCIAL LOSSES TO THE ORGANIZATION WHOSE COMPUTER SYSTEM HAS BEEN MANIPULATED. ALSO INCLUDED ARE THEFTS OF COMPUTER INFORMATION, USE OF COMPUTER TIME FOR PERSONAL GAIN, ALTERATION OF COMPUTER RECORDS TO DISTORT FINANCIAL REPORTS, AND SCHEMES IN WHICH GOVERNMENT, BUSINESS, OR THE PUBLIC IS THE VICTIM. BECAUSE COMPUTERS COMPRESS OLDFASHIONED BOOKKEEPING PROCESSES INTO A SINGLE PRODUCT, THEY PERMIT FRAUD IN WAYS NOT POSSIBLE BEFORE. EQUITY FUNDING'S CREATION OF OVER $100 MILLION IN FICTITIOUS ASSETS IS A PRIME EXAMPLE OF COMPUTERIZED FRAUD. CASES OF COMPUTER FRAUD IN GOVERNMENT HAVE INCLUDED STEALING SUPPLIES, MAKING FRAUDULENT PAYMENTS, PROCESSING FRAUDULENT CLAIMS, MISUSING COMPUTER TIME, AND STEALING INFORMATION. A RECENT SURVEY OF 150 MAJOR COMPUTER FRAUD CASES SHOWED THAT MANIPULATION OF TRANSACTIONS IS THE MOST FREQUENT METHOD OF FRAUD AND THAT MUCH COLLUSION IS INVOLVED. TO PREVENT SUCH FRAUD, A TIGHT SYSTEM OF INTERNAL CONTROL IS NEEDED. SPECIAL ATTENTION SHOULD BE GIVEN TO (1) SEPARATION OF RESPONSIBILITIES, (2) WRITTEN PROCEDURES, (3) TRAINING, (4) COMMUNICATION, (5) TRANSACTION CONTROLS, (6) CONTINUOUS AUDITS, (7) IMPROVED RESPONSIBLE REPORTING, (8) PROGRAM CONTROLS, (9) FILE CONTROLS, (10) ORGANIZATION OF COMPUTER CENTERS, AND (11) PHYSICAL SECURITY. TO MAINTAIN CONTINUED COMPUTER SYSTEM INTEGRITY, IT IS MOST IMPORTANT TO SEPARATE THE SYSTEM PLANNING AND PROGRAMMING FUNCTION, THE MACHINE OPERATING FUNCTION, AND THE PROGRAM MAINTENANCE AND TAPE LIBRARY FUNCTION. SUCH A SEPARATION OF FUNCTIONS IN ADDITION TO PROPER PERSONNEL TRAINING AND SUPERVISION WILL NOT ONLY MINIMIZE THE CHANCES FOR FRAUD BUT WILL ALSO INSURE THAT FRAUD IS EASILY DETECTED IF IT DOES OCCUR. TABLES AND FOOTNOTES ARE INCLUDED. (CFW)
Index Term(s): Computer privacy and security; Computer related crime; Corruption of public officials; Crime prevention measures; Crime specific countermeasures; Crimes against businesses; Data integrity; Data security; Embezzlement; Employee theft; Fraud; White collar crime
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=64659

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.