Computer fraud

Results: 842



#Item
461Accountancy / Computer-aided audit tools / Risk / Auditing / Internal control / ACL / Credit card / ReD / Association of Certified Fraud Examiners / Fraud / Information technology audit / Business

ACL EBOOK $ How to Combat Government

Add to Reading List

Source URL: www.acl.com

Language: English - Date: 2014-05-20 16:21:00
462Accountancy / Risk / Business intelligence / Auditing / Formal sciences / ACL / Internal control / Analytics / Threat / Business / Information technology audit / Computer-aided audit tools

ACL WHITEPAPER The ACL Data Analysis Capability Model Leveraging analytics in the fight against fraud

Add to Reading List

Source URL: www.acl.com

Language: English - Date: 2014-05-15 17:31:37
463Information technology audit / Risk / Fraud / Computer-aided audit tools / Crimes / ACL / Internal control / David Coderre / Association of Certified Fraud Examiners / Accountancy / Auditing / Business

Discussion Paper Fraud Detection Using Data Analytics in the Healthcare Industry Fraud Detection Using Data Analytics in the Healthcare Industry

Add to Reading List

Source URL: www.acl.com

Language: English - Date: 2012-08-30 18:28:27
464Accountancy / Statistics / ACL / Accounting software / Business intelligence / Fraud / Continuous monitoring / Analytics / Association of Certified Fraud Examiners / Information technology audit / Computer-aided audit tools / Business

Building the Business Case for Data Analytics

Add to Reading List

Source URL: www.acl.com

Language: English - Date: 2013-03-06 15:50:45
465ACL / Accounting software / Continuous monitoring / FCPA / Business ethics / Computer-aided audit tools / Information technology audit / Business

7 Steps to Tackle Fraud Using Data Analytics

Add to Reading List

Source URL: www.acl.com

Language: English - Date: 2012-11-19 14:38:17
466Crimes / Personal finance / Theft / Identity theft / Credit card / Identity fraud / Insurance / Credit history / Annualcreditreport.com / Financial economics / Credit / Identity

Stealing or diverting mail. Hacking computer records. Making deceptive phone calls. Stealing wallets and purses. IDENTITY THEFT

Add to Reading List

Source URL: www.mmgins.com

Language: English - Date: 2010-03-23 15:31:17
467Business / Risk / Computer-aided audit tools / ACL / Internal control / Continuous monitoring / Continuous auditing / Certified Information Systems Auditor / Internal audit / Auditing / Information technology audit / Accountancy

ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC,

Add to Reading List

Source URL: www.acl.com

Language: English - Date: 2014-01-10 17:52:15
468Pica / Computer crime / Theft / Grand Theft Auto IV / Application software / Crimes / Digital media / Financial crimes

Corporate Theft Corporate Finance Officer Pleads Guilty in Payables Fraud In an investigation of financial irregularities at a leading international

Add to Reading List

Source URL: www.pica.net

Language: English - Date: 2014-06-16 16:41:17
469Computer-aided audit tools / ACL / Accounting software / Finance / Auditing / Continuous monitoring / FCPA / Internal audit / Accountancy / Business / Information technology audit

7 Steps to Tackle Fraud Using Data Analytics

Add to Reading List

Source URL: www.acl.com

Language: English - Date: 2012-11-19 14:38:18
470Email / Security clearance / Internet privacy / Computing / National security / Internet / Password

SYSTEM AUTHORIZATION ACCESS REQUEST (SAAR) PRIVACY ACT STATEMENT Executive Order 10450, 9397; and Public Law[removed], the Computer Fraud and Abuse Act. AUTHORITY: PRINCIPAL PURPOSE: To record names, signatures, and other

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2014-01-22 14:31:43
UPDATE