computer fraud
Recently Published Documents


TOTAL DOCUMENTS

153
(FIVE YEARS 9)

H-INDEX

4
(FIVE YEARS 2)

Author(s):  
Willliams H. Tega ◽  
Adeyanju O. David

This study demonstrated new evidence sustaining the idea that the issue of fraud has a long history and that fraud in deposit money banks affect performance when fraud are proxied with data extracted from inappropriate auditing process, peer group pressure, computer fraud and management looting using the Generalized Least Square Method (GLS) and the z-statistics as method of data analysis. The data used in the study were adjusted with the Jarque-Bera test of normality to remove any form of spurious result as variable normality is a standardized requirement for any linear model while the cronbach apha value was used to test the validity, consistency and reliability of the data. The main aim of the study is to investigate if variables like computer fraud, managers looting; inappropriate auditing, peer group pressure affect bank performance. To achieve this objective, research questions and hypotheses were formulated and variables were proxied for fraud and deposit banks performance as distilled from related literatures. The GLS result was used to test the formulated hypotheses with a standard z-value of 1.96. The GLS regression results revealed that there are negative relationships between bank frauds and performance while the z-test shows that bank frauds affect deposit money bank performance in Nigeria. The study therefore recommends that an efficient and modern financial technological structure such as Computer Aided Auditing Tools & Techniques (CAATTs) would combat fraud in deposit money banks in Nigeria.


2020 ◽  
pp. 203-220
Author(s):  
Ian J. Lloyd

This chapter examines key forms of computer related crimes. Computer fraud is a topic that attracts much legal and media attention. As the name suggests, it is essentially a variant of well-established principles of this area of the law. If a perpetrator obtains funds belonging to a victim through some form of deception or manipulation, this will be considered criminal with the most significant legal issues being concerned with the question when or where an offence has occurred. The deliberate promulgation of computer viruses or malware is also generally regarded as a criminal offence although there are issues regarding the degree of intent that needs to be established to secure a conviction. Viruses are generally spread through the conduct of individuals other than those who create to program. Conduct might be characterized as negligent rather than deliberate and will generally not be criminal. Similar issues of intent and knowledge may arise in respect of other forms of conduct such as denial of service attacks.


2019 ◽  
Vol 5 (1) ◽  
pp. 405-418
Author(s):  
Galina Myskiv ◽  
Olesya Irshak

Cybercrime is clearly linked with financial relations: for some, it is profit, for others – expenses or big losses. The article contains the research of the essence, causes, conse-quences and counteraction to computer fraud in Ukraine and countries of the world, as well as research of financial flows that accompany these processes. However, the authors tried to analyze quantitatively and qualitatively the dynamics of cybercrimes. It also focus-es on bodies that provide cybersecurity and normative legal documents in this area. The authors concluded that cybersecurity in Ukraine has not been sufficiently developed yet, which requires adopting the experience of cybercrime prevention in the advanced countries of the world and enhanced cooperation between international law enforcement agencies.


2019 ◽  
Author(s):  
Leslie Street ◽  
David R. Hansen

Each state has its own method for officially publishing the law. This article looks at the history of legal publishing for the fifty states before looking at how legal publishing even in moving to electronic publishing may not ensure public access to the law. The article addresses barriers to free access to the law in electronic publishing including copyright, contract law, and potentially, the Computer Fraud and Abuse Act. The article concludes with prescriptions for how different actors, including state governments, publishers, libraries, and others can ensure robust public access to the law moving forward.


Author(s):  
Amber A. Smith-Ditizio ◽  
Alan D. Smith

In this chapter, the authors provide a position-based discussion in reference to selective cyberthreats to devices and data breaches (which include malware, phishing, social engineering, data communication interception, malicious insider actions, just to name a few), and further provide information on applicable defenses and their legal implications. Although the authors do not assess the different threats and defenses in order to help prevent future vulnerability towards hacking for consumers, they do provide a conceptual understanding of the growing threats of such attacks and the inability of current legal safeguards to counter such threats. Particularly vulnerable are mobile systems, which are more prone to loss and theft once intercepted.


Pro Futuro ◽  
2018 ◽  
Vol 8 (1) ◽  
pp. 66-83
Author(s):  
Kitti Mezei
Keyword(s):  

Az internet többféle informatikai támadásnak nyújt lehetőséget, ezek közül a legrégebbi támadási formák közé tartozik a szolgáltatásmegtagadással járó, avagy túlterheléses támadás, a DDoS-támadás, amely a hálózat sebezhetőségét használja ki a megtámadott rendszerhez való hozzáférés nélkül. Elkövetésének száma, összetettsége évről évre növekvő tendenciát mutat, ami köszönhető annak, hogy egyszerűen és gyorsan végrehajtható, azonban egyszerűsége ellenére jelentős társadalmi, gazdasági és anyagi kárt képes okozni. Az elkövetést továbbá segíti az is, hogy az informatikai bűnözés egy szolgáltatásalapú iparággá nőtte ki magát az elmúlt években. A különböző online feketepiacokon keresztül könnyen hozzá lehet jutni a támadások alapját képező botnet infrastruktúrákhoz és egyéb eszközökhöz, mintegy szolgáltatásként. A tanulmány célja, hogy bemutassa először röviden a DDoS-támadások technikai alapját, majd a támadások mögött húzódó lehetséges motivációkat, ezt követően a büntetőjogi szabályozásra tér ki, különösen az Egyesült Államok Computer Fraud and Abuse Act (a továbbiakban: CFAA) rendelkezéseire, az Európai Unió fellépésére a botnetekkel szemben a 2013/40/EU irányelvet figyelembe véve, végül a hazai tényállásokra.


Sign in / Sign up

Export Citation Format

Share Document