skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 67422 Find in a Library
Title: IS COMPUTER FRAUD A FACT OF BUSINESS LIFE?
Journal: NATIONAL PUBLIC ACCOUTANT  Volume:23  Issue:8  Dated:(AUGUST 1978)  Pages:16-22
Author(s): S A MOSCOVE
Corporate Author: National Soc of Public Accountants
United States of America
Date Published: 1978
Page Count: 5
Sponsoring Agency: National Soc of Public Accountants
Washington, DC 20006
Format: Article
Language: English
Country: United States of America
Annotation: AFTER DISCUSSING THE EXTENT AND EXPLANATIONS OF COMPUTER FRAUD, THE ARTICLE SUGGESTS METHODS TO IMPROVE COMPUTER SECURITY.
Abstract: COMPUTER FRAUD SCHEMES INVOLVE ENORMOUS AMOUNTS OF MONEY, AND THE PERPETRATORS ARE OFTEN CAUGHT ONLY BY ACCIDENT. SEVERAL ASPECTS OF A COMPUTERIZED SYSTEM CONTRIBUTE TO ITS VULNERABILITY TO EMBEZZLEMENT: ONE PROGRAMMER HANDLES NUMEROUS ACCOUNTS, RECORDS ARE INVISIBLE AND MANY DETAILS NEVER APPEAR ON A PRINTOUT, AND SYSTEM CONTROLS ARE STORED IN THE COMPUTER WHERE THEY CAN BE MANIPULATED BY A SKILLED PROGRAMMER. MANY EXECUTIVES LACK AN UNDERSTANDING OF COMPUTERS AND THEIR POTENTIAL FOR FRAUD AND THUS NEGLECT SECURITY. AN ORGANIZATION CAN IMPROVE COMPUTER SECURITY BY LIMITING ACCESS TO COMPUTER ROOM AND RESTRICTING ACCESS TO THE COMPUTER ITSELF. PASSWORD SYSTEMS WHICH PERMIT USERS TO 'LOG ON' TO THE COMPUTER DO NOT PROVIDE COMPLETE SECURITY, ALTHOUGH PROCEDURAL REFINEMENTS HAVE REDUCED THEIR WEAKNESSES. OTHER ACCESS CONTROL METHODS INCLUDE MAGNETICALLY ENCODED CARDS AND MATCHING OF SIGNATURES, VOICEPRINTS, AND HAND GEOMETRY. BUILTIN CONTROLS OVER THE VALIDITY OF DATA FIELDS CAN ALSO BE ESTABLISHED. USING THIS APPROACH, THE COMPUTER CAN BE PROGRAMMED TO PRINT AN EXCEPTION NOTICE FOR ANY WORK HOURS THAT EXCEEDED A SET LIMIT. A FORMULA IS PROVIDED TO DETERMINE THESE LIMITS, TAKING INTO ACCOUNT INDIVIDUAL FACTORS ABOUT EMPLOYEES. SINCE A FEW KEY EMPLOYEES AND SOME EXPENSIVE MACHINERY REPLACE MANY ACCOUNTING CLERKS, FIRMS MUST CAREFULLY SELECT INDIVIDUALS FOR COMPUTER POSITIONS. COMPANIES SHOULD ALSO SEPARATE PROGRAMMING AND OPERATING DUTIES AND ROTATE ASSIGNMENTS. TECHNIQUES FOR AUDITING COMPUTERIZED INFORMATION SYSTEMS HAVE IMPROVED AND INCLUDE CHECKLISTS SUCH AS SAFE, THE SECURITY AUDIT AND FIELD EVALUATION FOR COMPUTER FACILITIES AND INFORMATION SYSTEMS. FOOTNOTES ARE PROVIDED. (MJM)
Index Term(s): Audits; Computer abuse; Computer crime prevention measures; Computer related crime; Electronic funds transfer; Embezzlement; Fraud
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=67422

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.