Abstracts - faqs.org

Abstracts

Business

Search abstracts:
Abstracts » Business

Foiling the fraudsters

Article Abstract:

Computer fraud and abuse continue to escalate in the 1990s. Estimates show that annual damage to industries is within the range of 400 million to 2 billion pounds sterling. As such, the need to improve computer security is an urgent matter. Protecting systems against physical breach of security requires the improvement of security measures from theft, fire and other disasters and the development of contingency plans and disaster recovery procedures. On the other hand, threats of logical security may be avoided by hiring expert individuals. Also, because deliberate breaches of computer security are increasingly being committed by employees, personnel management should be enhanced to prevent internally-generated damages. Cooperation between the police and companies should be developed to ensure that offenders are discovered, prosecuted and imprisoned to deter future fraudsters.

Author: Meall, Lesley
Publisher: Institute of Chartered Accountants in England & Wales
Publication Name: Accountancy
Subject: Business
ISSN: 0001-4664
Year: 1992
Industry, Industries

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Gone but not forgotten

Article Abstract:

The protection of company information on laptop computers is discussed.

Author: Meall, Lesley
Publisher: Institute of Chartered Accountants in England & Wales
Publication Name: Accountancy
Subject: Business
ISSN: 0001-4664
Year: 2003
Financial management, Insurance, Laptop computers, Laptop/portable computer, Portable computers, Notebook computers

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Email anarchy

Article Abstract:

The importance of proper use of email on the job is discussed.

Author: Meall, Lesley
Publisher: Institute of Chartered Accountants in England & Wales
Publication Name: Accountancy
Subject: Business
ISSN: 0001-4664
Year: 2003
Legal issues & crime, Government regulation (cont), Government regulation, Telegraph & other communications, Wired Telecommunications Carriers, Electronic Mail Services, Legal/Government Regulation, Interpretation and construction, Laws, regulations and rules, Electronic mail systems, E-mail, Email, Work rules

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Subjects list: Safety and security measures, Prevention, Computer crimes, United Kingdom, Planning, Risk assessment, Business enterprises, Data security, Computer crime, Company business planning, Data security issue
Similar abstracts:
  • Abstracts: Risks in the foreground. Risk: a model approach. Continuing conflict, and how to resolve it
  • Abstracts: Servant of three masters. Expand or perish. At home on the range
  • Abstracts: Finding the right match. A segmented picture. Not-for-profits: the conclusion
  • Abstracts: After outsourcing: Texas Instruments remains a trade show champ. Marriott reaps marketing benefits from corporate split
  • Abstracts: Alliances dominate marketing race on the information highway. MCI, Sprint gun for AT&T's 800 market share
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2025 Advameg, Inc.