Universidad Autónoma de Occidente
Local cover image
Local cover image

Preventing computer fraud /

By: Series: seriesPublication details: McGraw-Hill Estados Unidos 1993Edition: 1ERA EDICIONDescription: 294 ilustraciones, tablas, graficas 23cmISBN:
  • 0-07-061200-5
Subject(s):
Contents:
Part 1. Misrepresentation, Contractual Agreements, Sabotage, Source Code, Copyright, Data Omission, Fraud in Government 1. Misrepresentation Case Histories 3 2. Contractual Agreements Case Histories 9 3. Sabotage Case Histories 13 4. Source Code Purchasing Source Code 19 Escrow 20 Case Histories 5. Copyright 24 What Works Are Protected? 26 Case Histories 20 How to Secure a Copyright Copyright Registration 27 26
Summary: The cost of white-collar crime in the United States alone is estimated at $200 billion annually in lost money, products, and business opportuni-ties. It is my sincere hope that this quick reference book will help raise the awareness of professionals in the business community to computer fraud and thus prevent its proliferation. The arrival of the computer has created a huge industry. This indus-try has prospered in part because it has followed business ethics. However, it is not unreasonable to say that some segments of the com-puter industry have no business ethics at all. I have seen a sharp increase in computer fraud. Computer fraud can be prevented by a few simple shortcut methods. These methods are presented in Quick Checklist in Chapter 13 and the Quick Network Checklist in Chapter 14. The Quick Network Checklist is a set of guidelines intended to be used by network administrators to maintain a secure network. This book is brief and to the point. I have personally documented many acts of fraud for clients and testified as an expert witness. This book will help you avoid some common pitfalls. Because there are so many different types of fraud that most ethical businesspeople would not think of, I have presented actual case histo-ries of fraud that I have encountered during my career. These case his-tories represent millions of dollars worth of fraud. Names of the vic-timized companies are always withheld. After each case an analysis is presented followed by a summary that lists appropriate preventive measures. In all instances if the appropriate preventive measure had been used, fraud could have been avoided. These situations were not only costly but also embarrassing to the entities involved. Some enti-
No physical items for this record

EDITORIAL
McGraw-Hill
ISBN
0-07-061200-5

Part 1. Misrepresentation, Contractual Agreements, Sabotage, Source Code, Copyright, Data Omission, Fraud in Government

1. Misrepresentation

Case Histories 3

2. Contractual Agreements

Case Histories 9

3. Sabotage

Case Histories 13

4. Source Code

Purchasing Source Code 19

Escrow 20

Case Histories

5. Copyright

24 What Works Are Protected? 26

Case Histories

20

How to Secure a Copyright

Copyright Registration 27

26

The cost of white-collar crime in the United States alone is estimated at $200 billion annually in lost money, products, and business opportuni-ties. It is my sincere hope that this quick reference book will help raise the awareness of professionals in the business community to computer fraud and thus prevent its proliferation.

The arrival of the computer has created a huge industry. This indus-try has prospered in part because it has followed business ethics. However, it is not unreasonable to say that some segments of the com-puter industry have no business ethics at all.

I have seen a sharp increase in computer fraud. Computer fraud can be prevented by a few simple shortcut methods. These methods are presented in Quick Checklist in Chapter 13 and the Quick Network Checklist in Chapter 14. The Quick Network Checklist is a set of guidelines intended to be used by network administrators to maintain a secure network. This book is brief and to the point. I have personally documented many acts of fraud for clients and testified as an expert witness. This book will help you avoid some common pitfalls.

Because there are so many different types of fraud that most ethical businesspeople would not think of, I have presented actual case histo-ries of fraud that I have encountered during my career. These case his-tories represent millions of dollars worth of fraud. Names of the vic-timized companies are always withheld. After each case an analysis is presented followed by a summary that lists appropriate preventive measures. In all instances if the appropriate preventive measure had been used, fraud could have been avoided. These situations were not only costly but also embarrassing to the entities involved. Some enti-

Ingeniería en Tecnologías de la Información y Comunicación

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image

Libros electrónicos

eLibro eLibro

Recursos de investigación libres

image host image host image host image host image host image host image host image host image host image host

Recursos informativos



TecNM | Tecnológico Nacional de México

© 2025 by Biblionexus