× Didn't find what you were looking for? Ask a question
Top Posters
Since Sunday
5
o
5
4
m
4
b
4
x
4
a
4
l
4
t
4
S
4
m
3
s
3
New Topic  
mbowdish mbowdish
wrote...
Posts: 470
Rep: 4 0
4 years ago
Explain the various computer fraud classifications using the data processing model. Provide an example for each computer fraud classification.
Textbook 
Accounting Information Systems

Accounting Information Systems


Edition: 14th
Authors:
Read 107 times
1 Reply

Related Topics

Replies
wrote...
4 years ago
Computer fraud can be classified into the following categories: data fraud, input fraud, processor fraud, computer instructions fraud, and output fraud. Illegally using, copying, browsing, searching, or harming company data constitutes data fraud. The simplest and most common way to commit a computer fraud is to alter or falsify computer input. Processor fraud includes unauthorized system use, including the theft of computer time and services. Computer instructions fraud includes tampering with company software, copying software illegally, using software in an unauthorized manner, and developing software to carry out an unauthorized activity. Unless properly safeguarded, displayed or printed output can be stolen, copied, or misused. Students answer may vary depending on the examples they used.
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  1116 People Browsing
Related Images
  
 228
  
 830
  
 271
Your Opinion