Computer crime: fraudsters with a future
Article Abstract:
Information stored in computers remains at risk despite the passage of the Computer Misuse Act in the UK. Many firms are reluctant to prosecute for fear that the publicity it would attract would be seen as a sign of the company's weakness. The threat to the computer security grows even bigger with the increase in the use of computer networks. These networks connect users from different locations, thereby providing hackers with the opportunity to gain access to files from remote sites. The design of the network makes it easy to any 'skilled' individual to spy, copy and interfere at any point across the network. In the past, typical hackers had been around 23 years of age and male.With the UK's present economic conditions, perpetrators of computer-related fraud tend to be older, long-term employees in positions of trust.
Publication Name: Accountancy
Subject: Business
ISSN: 0001-4664
Year: 1993
User Contributions:
Comment about this article or add new information about this topic:
Canning the junk
Article Abstract:
Email is a boon to business but it has also become a burden as the worldwide cost of spam now amounts to more than $50 bn in lost productivity and other expenses, according to the US-based research firm, Ferris. Junk mail can be blocked at source so that it never reaches the in-box, so the business world has convinced some of the biggest Internet service providers such as AOL, MSN, and Yahoo to monitor account use and curtail the activities of spammers when they are identified.
Publication Name: Accountancy
Subject: Business
ISSN: 0001-4664
Year: 2006
User Contributions:
Comment about this article or add new information about this topic:
Survival of the fittest
Article Abstract:
Companies that are dependent on information technology need to take proper precautions to make sure their systems are secure from disaster. Companies should assess their potential risk by reviewing fire alarm and suppression systems and analyzing personnel access systems. Common emergency precautions include: making regular back-ups of important material; reviewing minimum system requirements; and storing important documentation in safe places.
Publication Name: Accountancy
Subject: Business
ISSN: 0001-4664
Year: 1989
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: The crunch for numbers. Future scenarios for the profession. Future research planning at the Institute
- Abstracts: ACH or wire transfers? Four factors behind the cash manager's choice. Transmitting bank account analysis information
- Abstracts: Congress grapples with a useful definition of insider trading
- Abstracts: The WM story: Scotland takes on the world. Taking the BES decision. A clear conscience and a cash return
- Abstracts: Financial management with Lotus 1-2-3. Using the logical IF function. Bringing uncertainty into the CVP analysis