Computer fraud

Results: 842



#Item
361Data privacy / Privacy law / Europe / Computer law / Agencies of the European Union / European Union / European Data Protection Supervisor / European Anti-fraud Office

July[removed]PRIVACY STATEMENT FOR IMPLEMENTATION OF OLAF RECOMMENDATIONS (OLAF DPO-180)

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2012-07-25 04:04:06
362Election fraud / Internet activism / Ushahidi / Web mapping / Oracle Corporation / Oracle Database / Natural language processing / Technology / Computing / Software / Crowdsourcing

Smarter Crisis Crowdsourcing Kayla Jacobs Kwang-Sung Jun Computer Science

Add to Reading List

Source URL: dssg.uchicago.edu

Language: English - Date: 2014-08-10 01:11:46
363Computer crimes / Spamming / Phishing / Fraud / Deception / Malware / Phone fraud / Internet privacy / Automated teller machine / Business / Technology / Social engineering

Microsoft Word - Privacy Professor The 12 Security and Privacy Threats of the Holiday Season 2014

Add to Reading List

Source URL: www.privacyguidance.com

Language: English - Date: 2014-11-16 21:59:48
364Privacy law / Computer law / Government / European Data Protection Supervisor / European Anti-fraud Office / Data privacy

March[removed]PRIVACY STATEMENT FOR OLAF ANTI-FRAUD COMMUNICATORS’ NETWORK (OAFCN) CONTACTS (OLAF DPO-46)

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2012-06-27 03:01:06
365Email / Internet privacy / Security clearance / Computing / National security / Internet / Password

SYSTEM AUTHORIZATION ACCESS REQUEST (SAAR) PRIVACY ACT STATEMENT AUTHORITY: Executive Order 10450, 9397; and Public Law[removed], the Computer Fraud and Abuse Act. PRINCIPAL PURPOSE: To record names, signatures, and other

Add to Reading List

Source URL: www.imcom.army.mil

Language: English - Date: 2014-11-14 13:30:02
366Computing / Computer-mediated communication / Social engineering / Confidence tricks / Spam filtering / Advance-fee fraud / Internet fraud / Phishing / Spam / Spamming / Internet / Email

Recognizing and Avoiding Email Scams US-CERT Summary Email provides us a convenient and powerful communications tool. Unfortunately, it also provides scammers and other malicious individuals an easy means for luring pote

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2013-04-15 13:11:50
367Susquehanna Valley

Finding 1: Inadequate accounting and computer controls increase risk of errors and fraud Recommendations: 1. The District should ensure that it requires an independent review and approval for all of its purchases prior

Add to Reading List

Source URL: www.azauditor.gov

Language: English - Date: 2013-12-18 12:41:39
    368Software Engineering Institute / Law / Fraud / Insider / Ethics / Carnegie Mellon University / Crimes / Computer crimes

    Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector

    Add to Reading List

    Source URL: resources.sei.cmu.edu

    Language: English - Date: 2012-07-01 00:00:00
    369Susquehanna Valley

    Finding 1: Inadequate accounting and computer controls increase risk of errors and fraud Recommendations: 1. The District should ensure that it requires an independent review and approval for all of its purchases prior

    Add to Reading List

    Source URL: www.auditorgen.state.az.us

    Language: English - Date: 2013-12-18 12:41:39
      370

      FINDING 1 District had much lower administrative costs but inadequate accounting and computer controls increased risk of errors and fraud Recommendations 1. The District should implement proper controls over its payroll

      Add to Reading List

      Source URL: www.azauditor.gov

      Language: English - Date: 2013-12-27 09:57:12
        UPDATE