To read this content please select one of the options below:

Computer‐related crime: the role of control in its prevention, detection and correction

John Mitchell (Managing Director of LHS — The Audit & Control Consultancy, and Chairman of BCS Computer Audit Specialist Group)

Journal of Financial Crime

ISSN: 1359-0790

Article publication date: 1 January 1995

151

Abstract

This three‐part briefing deals with the prevention, detection and correction of computer related crime by the application of straight‐forward control techniques. No attempt is made to identify the scale of computer abuse as the main thrust is that the implementation of controls to prevent mistakes will also help to mitigate abuse. The briefing raises a number of issues that are relevant to dealing with computer abuse as a control issue. First, it identifies the position of the computer in an abuse event as being either the object, subject, instrument or symbol of the crime. Secondly, it suggests that fraud is only achievable where the three attributes of ability, opportunity and conversion of assets come together, but that non‐fraud attacks only require ability and opportunity. Thirdly, it hypothesises that the number of crimes will be inversely proportional to the skill required to do them and proves the hypothesis by reference to the published cases. Finally, it makes the point that for real‐time systems, prevention of abuse by the authorised user may not be possible due to the very nature of the system. Under such circumstances the organisation has to rely on detection mechanisms with all the problems of living with a window of exposure.

Citation

Mitchell, J. (1995), "Computer‐related crime: the role of control in its prevention, detection and correction", Journal of Financial Crime, Vol. 2 No. 4, pp. 339-344. https://doi.org/10.1108/eb025660

Publisher

:

MCB UP Ltd

Copyright © 1995, MCB UP Limited

Related articles