skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 70393 Find in a Library
Title: Computer-Related Management Misdeeds (From Management Fraud, P 185-193, 1980, by Robert K Elliott and John J Willingham - See NCJ-70386)
Author(s): D B Parker
Date Published: 1980
Page Count: 9
Sponsoring Agency: PBI
Princeton, NJ 08540
Sale Source: PBI
Petrocelli Books, Inc
1101 State Road
Princeton, NJ 08540
United States of America
Language: English
Country: United States of America
Annotation: Following descriptions of how computers may be used to perpetrate various types of management fraud for and against a company, steps that must be taken to improve auditing that involves computers are discussed.
Abstract: Although the development of computers has not changed the essential nature of management fraud, it has made the detection of fraud much more difficult, since the perpetrators often cloak their fraud behind complex computer operations obscure to the would-be fraud detector. Further, computer operations can overcome the geographic and time constraints that hampered many instances of fraud under manual business systems. Several efforts must be undertaken to deal with computer-related fraud. First, auditors need their own independent specialized computers to reduce reliance on the client's computers. Second, audit tools and techniques must be further developed beyond the present state-of-the-art, as presented in the report 'Systems Auditability and Control,' produced by SRI International and available from the Institute of Internal Auditors. Third, computer systems and business application systems must be included at the time the systems are designed to ensure full integration. Fourth, specialization of the auditor and team auditing must be realized through training programs and staffing. Footnotes are not provided.
Index Term(s): Audits; Computer related crime; Crime specific countermeasures; Fraud; Investigative auditing procedures; White collar crime
Note: Paper prepared for the Peat, Marwick, Mitchell and Company Symposium on Management Fraud, June 1978.
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=70393

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.