The psychology of computer crime
Article Abstract:
Computer crime is rising by up to 15 percent annually, much of it goes unreported or undetected, and more than 75 percent of it is committed by insiders. Companies cannot rely on security technology for protection against computer crime, and must realize that their greatest threat comes from people who work with their computer systems daily. Offenders often see data as abstract or intangible, and its theft therefore occurs in an 'ethical vacuum'; offenders also commonly believe theft of data cannot be traced to them, or cannot be detected at all. It is important for management to become actively involved in reducing abuse of computer data, and their most important step is to raise employees' security awareness. Companies can also use such precautionary measures as effective pre-employment screening, rotation of personnel in sensitive posts, and log-on audit trails.
Publication Name: Accountancy
Subject: Business
ISSN: 0001-4664
Year: 1988
User Contributions:
Comment about this article or add new information about this topic:
The threat to computer systems - learning the rules of risk
Article Abstract:
A systematic approach to analyzing the risks to corporate computer systems is presented. Some threats to computer security are common to all installations, but the degree of risk in different areas varies from firm to firm. All risk consists of a threat of damage and the system's vulnerability to the threatened danger. The qualitative approach to risk analysis assesses the effectiveness of existing safeguards against a particular threat, identifies necessary improvements, and establishes the steps needed to implement improvements. Under the quantitative approach, a value is established for all of the assets associated with the computer system, and then the risks to the system and their probability of occurring are identified. The likely cost of a single occurrence is assessed and used to determine the amount to be spent on risk prevention.
Publication Name: Accountancy
Subject: Business
ISSN: 0001-4664
Year: 1987
User Contributions:
Comment about this article or add new information about this topic:
Loss of memory - an unforgettable experience
Article Abstract:
The loss of computer records can seriously impair a company's ability to operate. Planning steps involved in protecting computer systems against losses caused by natural disaster are discussed. A good disaster plan should identify possible emergencies, and establish the methods and costs involved in restoring services. All disaster plans should be formalized, detailed, and key personnel should know what their tasks are in the event of an accident.
Publication Name: Accountancy
Subject: Business
ISSN: 0001-4664
Year: 1987
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: The economic consequences of increased disclosure. The role of supplementary statements with management earnings forecasts
- Abstracts: The real interest rate puzzle. The real interest rates puzzle
- Abstracts: A rose.com by any other name. Equity premia as low as three percent? Evidence from analysts' earnings forecasts for domestic and international stocks
- Abstracts: Maturity intermediation and intertemporal lending policies of financial intermediaries. Optimal futures positions for large banking firms
- Abstracts: The horizon widens and auditors face new watershed. Law reform: It's in need of reform. Independence: a new perception needed