Fraud by computer manipulation
Input manipulation
Program or data manipulation
Output manipulation
Common internal computer fraud schemes
Billing schemes
Inventory fraud
Payroll fraud
Skimming
Check tampering
Register schemes
Fraud by damage to or modification of computer data or programs
Economic advantage over a
competitor
Theft of data or programs
Holding data for ransom
Sabotage
Common external computer fraud schemes
Telecommunications fraud
Hacking
Internet fraud
Software piracy
Source: Fundamentals of computer fraud. (1999). Association of Certified Fraud Examiners: Austin, TX.
© Copyright 2000 Raymond S. Kulzick. All rights reserved. 000613.
This publication provides business, financial planning, and/or tax information to our clients. All material is for general information only and should not be acted upon without seeking appropriate professional assistance.