Fraud by computer manipulation
Program or data manipulation
Common internal computer fraud schemes
Fraud by damage to or modification of computer data or programs
Economic advantage over a
Theft of data or programs
Holding data for ransom
Common external computer fraud schemes
Source: Fundamentals of computer fraud. (1999). Association of Certified Fraud Examiners: Austin, TX.
© Copyright 2000 Raymond S. Kulzick. All rights reserved. 000613.
This publication provides business, financial planning, and/or tax information to our clients. All material is for general information only and should not be acted upon without seeking appropriate professional assistance.