skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 67396 Find in a Library
Title: STATEMENTS IN QUOTES - COMPUTER PERSONNEL FRAUDS
Journal: JOURNAL OF ACCOUNTANCY  Volume:148  Issue:2  Dated:(AUGUST 1979)  Pages:44,46,50
Author(s): J F HUBBERT
Corporate Author: American Institute of Certified Public Accountants
United States of America
Date Published: 1979
Page Count: 3
Sponsoring Agency: American Institute of Certified Public Accountants
Jersey City, NJ 07311-3881
Format: Article
Language: English
Country: United States of America
Annotation: A SPECIALIST IN COMPUTER AUDITING DESCRIBES TYPES OF COMPUTER CRIMES AND THE POTENTIAL OF VARIOUS COMPUTER PERSONNEL TO DEFRAUD OR STEAL FROM THEIR EMPLOYERS.
Abstract: BASIC INTERNAL CONTROLS THAT REDUCE OPPORTUNITIES FOR COMPUTER FRAUD INCLUDE PHYSICAL SECURITY, DIVISION OF DUTIES, GOOD SUPERVISION, AND CONSCIENTIOUS MANAGEMENT. WHILE ALMOST ANY COMPUTER PROFESSIONAL CAN MANIPULATE A SYSTEM, IT REQUIRES CLEVERNESS AND BUSINESS KNOWLEDGE TO FIGURE OUT HOW TO GAIN ACCESS TO THE MONEY. COLLUSION IS ALSO IMPORTANT, PARTICULARLY THE FAILURE OF OTHER EMPLOYEES TO CHALLENGE UNUSUAL ACTIVITIES OF FELLOW WORKERS OR SUPERVISORS. TYPES OF CRIME RANGE FROM THEFT OF COMPUTER TIME TO STEALING DATA. THE COMPUTER CAN ALSO BE USED TO CREATE FALSE OR MISLEADING DATA, SUCH AS ALTERED CREDIT BUREAU RECORDS. A KNOWLEDGEABLE PROGRAMMER CAN CHANGE CODES FOR HIS BENEFIT, BUT NORMAL ACCOUNTING AND SYSTEM CONTROLS MAKE IT DIFFICULT TO OBTAIN SIGNIFICANT AMOUNTS OF FUNDS WITHOUT DETECTION. DATA PROCESSING PERSONNEL CAN ALSO EXTRACT BRIBES AND KICKBACKS FROM SUPPLIERS. THE MANAGEMENT INFORMATION SYSTEM MANAGER IS IN AN EXCELLENT POSITION TO EXPLOIT THE COMPUTER IF HE IS DIRECTLY INVOLVED IN THE DAILY OPERATION OF THE COMPUTER CENTER. A SYSTEMS ANALYST DOES NOT PARTICIPATE IN ROUTINE COMPUTER OPERATIONS, BUT DOES KNOW HOW TO MAKE KEY PROGRAM CHANGES. OVERALL, THE BIGGEST THREAT FROM APPLICATIONS PROGRAMMERS IS THAT THEY WILL USE SMALL INCREMENTS OF COMPUTER TIME TO DEVELOP THEIR OWN BUSINESSES. BECUASE OF DETAILED KNOWLEDGE OF COMPUTER SYSTEMS, THE SOFTWARE PROGRAMMER OCCUPIES A POTENTIALLY DANGEROUS POSITION. ALSO IN RISK POSITIONS ARE DATA LIBRARIANS WHO COULD SELL RECORDS OR SUPPLIES, OPERATIONS MANAGERS, WHO COULD COVERUP UNAUTHORIZED PROCESSING, AND COMPUTER OPERATORS WHO ARE OFTEN UNSUPERVISED AND HAVE OPPORTUNITIES TO STEAL DATA. THE AUDITING PROFESSION IS CONCERNED ABOUT THE FRAUD POTENTIAL OF ELECTRONIC FUNDS TRANSFER. (MJM)
Index Term(s): Computer abuse; Computer crime prevention measures; Computer related crime
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=67396

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.