Computer fraud

Results: 842



#Item
501Internet / Internet fraud / Computing / Great Plains Communications / Email fraud / Email privacy / Email / Spamming / Computer-mediated communication

For Immediate Release Contact: Amy Moan Public Relations Marketing Manager Phone: [removed] Email: [removed]

Add to Reading List

Source URL: www.gpcom.com

Language: English - Date: 2013-11-25 10:45:28
502User interface techniques / Electronic commerce / Television in the United Kingdom / Consumer fraud / Click consonant / Consonants / Click

Reporting an Absence by Computer with No Substitute Required Go the Dillon School District Four webpage.

Add to Reading List

Source URL: www.dillon.k12.sc.us

Language: English - Date: 2013-09-25 12:19:26
503Email / Computer-mediated communication / Social engineering / Confidence tricks / Spam filtering / Advance-fee fraud / Phishing / Internet fraud / Spam / Spamming / Internet / Computing

Recognizing and Avoiding Email Scams US-CERT Summary Email provides us a convenient and powerful communications tool. Unfortunately, it also provides scammers and other malicious individuals an easy means for luring pote

Add to Reading List

Source URL: www.its.ms.gov

Language: English - Date: 2014-09-19 10:01:21
504Fraud / Criminology / Auditing / Crimes / Deception / Forensic accounting / Association of Certified Fraud Examiners / Forensic accountant / Certified Fraud Examiner / Accountancy / Business / Law

Thursday, September 11, 2014 White Collar Crime in a Digital World & Crossing the Ethical Boundary This seminar explores lessons learned from the trenches investigating white collar crime, the significance of computer f

Add to Reading List

Source URL: csd.sai.state.ok.us

Language: English - Date: 2014-04-24 13:51:56
505Business intelligence / Computer-aided audit tools / Risk / Technology / Enterprise resource planning / Internal control / Analytics / Separation of duties / Business / Auditing / Information technology audit

Solution Overview Segregation of Duties Overview Segregation of Duties The main elements required for fraud are motivation and opportunity. Accordingly, the best opportunity a company can offer a fraudster is weak or no

Add to Reading List

Source URL: www.casewareanalytics.com

Language: English - Date: 2014-01-15 13:06:52
506Hosanna-Tabor Evangelical Lutheran Church and School v. EEOC / Computer Fraud and Abuse Act / National Labor Relations Act / National Labor Relations Board / Government / American studies / Law / Religion in the United States / Ministerial exception

January 2, 2013  SEBRIS BUSTO JAMES   LABOR AND EMPLOYMENT LAW  YEAR IN REVIEW—2012 

Add to Reading List

Source URL: www.sebrisbusto.com

Language: English - Date: 2013-01-07 18:11:44
507Federated identity / Security / Federated identity management / Identity theft / Liberty Alliance / Identity management system / Digital identity / Identity fraud / Single sign-on / Identity management / Identity / Computer security

Whitepaper on Liberty Protocol and Identity Theft February 20, 2004 Editor: William Duserick, Fidelity Investments Contributors:

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2004-02-27 10:28:06
508Accounts payable / Invoice / Enterprise resource planning / Computer-aided audit tools / Procure-to-pay / E-procurement / Audit / Business process / Internal control / Business / Procurement / Supply chain management

Solution Overview Procure-to-Pay Overview Procurement Fraud The purchase to payment process (P2P) remains one of the most complex business processes, often spanning multiple systems and operations. Despite the level of

Add to Reading List

Source URL: www.casewareanalytics.com

Language: English - Date: 2014-03-12 08:55:24
509Business intelligence / Computer-aided audit tools / Risk / Technology / Enterprise resource planning / Internal control / Analytics / Separation of duties / Business / Auditing / Information technology audit

Solution Overview Segregation of Duties Overview Segregation of Duties The main elements required for fraud are motivation and opportunity. Accordingly, the best opportunity a company can offer a fraudster is weak or no

Add to Reading List

Source URL: www.casewareanalytics.com

Language: English - Date: 2014-01-15 13:07:39
510Identity theft / Credit card / Wayne Stenehjem / Theft / Fraud / Fair and Accurate Credit Transactions Act / Crimes / Law / Criminal law

May 25, 2006 NORTH DAKOTA VETERANS – STOP ID THEFT BEFORE IT OCCURS Use the “fraud alert” allowed by state law BISMARCK – A recent theft from the Department of Veterans Affairs of computer data on more than 26 m

Add to Reading List

Source URL: www.ag.nd.gov

Language: English - Date: 2006-09-12 17:41:12
UPDATE