skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 68084 Find in a Library
Title: WHO IS RESPONSIBLE FOR COMPUTER FRAUD?
Journal: JOURNAL OF ACCOUNTANCY  Volume:139  Issue:2  Dated:(FEBRUARY 1975)  Pages:35-39
Author(s): R L STONE
Date Published: 1975
Page Count: 5
Format: Article
Language: English
Country: United States of America
Annotation: RESPONSIBILITY FOR FRAUD AND COMPUTER SECURITY METHODS IS DISCUSSED AS IT RELATES TO THE VENDOR, THE DATA PROCESSING MANAGER, AND THE AUDITOR.
Abstract: NO COMPUTER SECURITY SYSTEM IS ABSOLUTELY SAFE, AND PERSONS RESPONSIBLE FOR THE SYSTEM ARE INCREASINGLY VULNERABLE TO LEGAL CHARGES OF FAILURE TO DETECT FRAUD. THE COMPUTER VENDOR IS OBLIGATED TO FURNISH A MACHINE WITH BUILTIN SECURITY DEVICES. MANY MANUFACTURERS HAVE DONE THIS, BUT ALSO PROVIDE THE CAPACITY TO BYPASS OR REMOVE THE SECURITY FEATURES. IN ORDER TO PROTECT THEMSELVES, VENDORS SHOULD PROMOTE SECURITY CONTROLS IN A SYSTEM, PERIODICALLY CHECK TO SEE IF THEY ARE BEING USED, AND INSTALL SECURITY DEVICES THAT CANNOT BE CIRCUMVENTED IN FUTURE MODELS. THE DATA PROCESSING MANAGER IS RESPONSIBLE FOR SECURITY OF THE DATA CENTER AND SHOULD CONCENTRATE ON INTERNAL CONTROLS. EVERY COMPUTER SYSTEM HAS THE CAPACITY TO DETECT ABUSE SUCH AS UNSCHEDULED RUNS AND UNAUTHORIZED ACCESS TO DATA FILES. SEPARATION OF OPERATING AND DEVELOPMENT ACTIVITIES IS ESSENTIAL TO PREVENT COLLUSION. PSYCHOLOGICAL SECURITY TOOLS INCLUDE PUBLICIZING THE IMPORTANCE OF SECURITY TO ALL STAFF, PAYING ATTENTION TO EMPLOYEE MORALE, AND PROVIDING TEMPORARY ASSISTANCE TO FIRED EMPLOYEES. AUDITORS SHOULD USE AUDIT SOFTWARE PACKAGES THAT HAVE BEEN DEVELOPED TO DETERMINE THE ACCURACY OF DATA FILES USED TO CREATE FINANCIAL STATEMENTS. INTERNAL CONTROL GUIDELINES, FLOWCHARTING, MAPPING TECHNIQUES, AND OTHER SPECIALIZED TESTING PROGRAMS ARE AVAILABLE. DEFINITION OF THE CONCEPT OF AUDITABILITY DEVELOPMENT FOR THE SMALL CENTER WILL HELP TO COMBAT FUTURE ABUSE. REFERENCES ARE CITED IN THE ARTICLE AND FOOTNOTES ARE PROVIDED. (MJM)
Index Term(s): Audits; Computer crime prevention measures; Computer privacy and security; Computer related crime
Note: THIS ARTICLE IS ADAPTED FROM A SPEECH PRESENTED AT A RECENT MEETING OF THE IBM (INTERNATIONAL BUSINESS MACHINES) ACCOUNTANTS COMPUTER USERS GROUP, ACUTE (ACCOUNTANTS COMPUTER-USERS TECHNICAL EXCHANGE)
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=68084

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.