Preview

The Effect and Prevention of Cyber Crime Among Malaysian Society

Good Essays
Open Document
Open Document
707 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Effect and Prevention of Cyber Crime Among Malaysian Society
FRAUD, CORRUPTION AND CYBER CRIME IN A GLOBAL DIGITAL NETWORK
Economics, Management and Financial Markets, June 2011
Journal Article
Authors: Blajan, Adrian; Ionescu, Luminita; Mirea, Viorica
ISSN: 1842-3191
Volume: 6
Issue: 2
Start Page: 373
ABSTRACT.
Fraud cannot be eradicated, but fraud and corruption risks can be managed like any other risks. The economic crunch created the premises for a substantial increase of the computer crime and fraud. Computer crime or cyber crime refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of the crime. The global total of criminal gain from cyber fraud is impossible to estimate precisely, but has increased exponentially in the past 4 years. However, in the last few years, the computer specialist and internal controllers understood the fraud schemes and their characteristics and they know how to act to prevent them.
Keywords: fraud, corruption, cyber fraud, digital network
1. Introduction
Bishop and Hydoski show how in today's highly leveraged global economy, major fraud or corruption can set off a chain reaction resulting in serious corporate harm or failure. According to Bishop and Hydoski since the "Crash of 2008" led to economic conditions softening dramatically around the globe, fraud risks for businesses appear to be on the rise.
Their research show how a slowing economy may increase pressure on corporate executives to meet performance goals set in rosier times, or to demonstrate that the current executive team should be retained by shareholders. Individual managers may feel a much greater risk of job loss than usual, potentially making them eager to avoid having to report a performance shortfall in their operating unit.
From all the potential loss, fraud is the most complex and difficult to detect. Fraud represents intentional actions of the part of the client or its personnel to the client's financial

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Financial stability of any corporation as well as our country is threatened by fraud. This article shows…

    • 502 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Professional auditing standards discuss the three key “conditions” that are typically present when a financial fraud occurs and identify a lengthy list of “fraud risk factors.” Briefly explain the difference between a fraud “condition” and a “fraud risk factors,” and provide examples of each. What fraud conditions and fraud risk factors were apparently present in the Madoff case?…

    • 1261 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Double Deceit Summary

    • 1476 Words
    • 6 Pages

    The reality is that fraud is a growing epidemic that is unavoidable in other words it can very well happen to anyone at any time. As shown by Statistics Canada, Fraud, the most common property violation, accounted for 54% of all cybercrimes reported to police in Canada in 2012 (Star 1). As a result, educating oneself in strategies on how to detect fraud can help one decide in avoiding common mistakes most people make, especially fraud schemes which can be prevented. Applying these practices on a corporate level will reduce costs in investigating fraud claims, and would allow businesses to make better decisions that would benefit the economy in the long run. Moreover, realizing that an honest person with personal integrity could still commit fraud, there are motives, situational pressures, and many other reasons that drive regular people to commit…

    • 1476 Words
    • 6 Pages
    Better Essays
  • Good Essays

    The Rich Brother is a story about two brothers, Pete and Donald. Pete, the older brother, is an American middle-class guy with the success story of having plenty of money from real estate, a wife, two daughters, nice home, and a sailboat. Donald, the younger brother, is a loner, paints houses, and sometime lives in an ashram in Berkeley. Although raised in the same household, the two live two totally different lives. Their display of sibling resentment, jealousy and utter disgust are evident. (Waxler) The brothers really do need each other, but Pete seems to be dependent upon Donald just a little more.…

    • 1044 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Week 5 Article Review

    • 457 Words
    • 2 Pages

    Fraud is a real threat to the financial stability of a corporation and even the country. The legal issues presented in the article show how damaging fraud truly is. Of the over 1,200 companies that filed for bankruptcy in the study, 77.8% had some sort of fraud (Nogler & Inwon, 2011). These numbers show that…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    emma

    • 823 Words
    • 4 Pages

    4. Professional auditing standards discuss the three key “conditions” that are typically present when a financial fraud occurs and identify a lengthy list of “fraud risk factors.” Briefly explain the difference between a fraud “condition” and a “fraud risk factor,” and provide examples of each. What fraud conditions and fraud risk factors were apparently present in the Madoff case? 5.…

    • 823 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Fraud is a malicious obtaining of money or property by deception then accompanied by concealment of theft and translation of stolen property or money into personal resources for private use. The costs of fraud are difficult to estimate because not all uncovered fraud is disclosed for correct action to be pursued. Most fraud is committed by the trusted and valued employees and it leads to shock and disbelief when such cases are discovered (Jones, 2011). Such fraudulent behavior may include cutting costs, spending corporate and shareholder money on personal expenses, and manipulating financial records for personal needs.…

    • 272 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Accounting, Fraud

    • 2038 Words
    • 9 Pages

    Madura, Jeff. What Every Investor Needs to Know About Accounting Fraud. New York: McGraw-Hill, 2004. 1-156…

    • 2038 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Because the wide world of technology has developed at such an astounding pace, there are many problems for victims as well as investigators of cyber crime and computer-related crimes. First, we must familiarize ourselves with the definitions of cyber crime and computer-related crime. For this paper, we will define cyber crime as the use of a computer as a tool to commit a crime or as a crime committed where a computer is the target. We will define computer-related crime as a traditional crime where a computer is used to carry out, record actions, or provide evidence of a crime. The beginnings of the problem of investigating cyber crime come in the form of reporting. For many reasons cyber crimes tend to go unreported or severely underreported. Another problem is that law enforcement officials (as well as parents and their children) do not have adequate training, allocation of funds, coordination with other agencies, or proper understanding of applicable laws that pertain to cyber crime. From all angles cyber crime is a difficult problem to tackle, and there is a definite need for law enforcement to catch up with the technology of cyber space, which is quickly becoming a feeding ground for illegal and illicit activity.…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    3d Risk Assessment Model

    • 6713 Words
    • 27 Pages

    Risk, Chance, Fraud and Corruption .........................................................................9 1.2.2. Classifications of Fraud and Corruption ................................................................... 11 1.3. Fraud Risk Assessment Framework ..............................................................30 1.3.1. Contemporary Fraud Risk Assessment Developments ..................................................30 1.3.2.…

    • 6713 Words
    • 27 Pages
    Powerful Essays
  • Powerful Essays

    Accounts of corporate wrong-doing have always been with us. Certainly most of the railroad barons and the steel magnates of the 1800s were not examples of financial rectitude, and the years prior to the Great Depression were filled with stories of manipulative dealings in business firms ranging from street railways to insurance companies and savings banks. Then, during 1990s, it was found that senior executives at a number of large companies had deliberately…

    • 2730 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Information system has been playing a grave essential role in daily business activities. Over the past decade, the detection rate of computer crimes concerning information system attacks has risen sharply. According to Kunz and Wilson (2004), reported computer crimes have been septupled from 2000 to 2003 and leads to inestimable economic loss. Therefore, themes on information security, especially the prevention of computer fraud, have attracted increasingly attentions (Romney and Steinbart, 2009). However, it seems that perpetrators can always find new techniques to theft invaluable business secrets stored, processed or protected by those information systems. Moreover, some abuse techniques have been used in economic espionage, which causes a yearly loss of $250 billion (ibid). Oracle Corp vs. SAP AG could be one of the relating cases occurred in the recent 2007 and is not yet closed till present. This essay will firstly introduce the Case. Then by using Fraud Triangle, analyze the reason of SAP’s commitment of computer fraud and data theft. Finally, suggestions on how to improve the security of company’s information system will be addressed with some reflections of the Case.…

    • 2645 Words
    • 11 Pages
    Good Essays
  • Better Essays

    Edgar Allan Poe Thesis

    • 1138 Words
    • 5 Pages

    When you hear the name Edgar Allan Poe it’s sure to conjure up thoughts of the macabre, mystery, death, and madness all of which are pivotal in the writings of Poe. His first works, Tamerlane and Other Poems, was published in 1827 with many short stories, poems, essays, and other writings to follow. He was a resourceful writer, but he was particularly known for his short stories and poems, even being dubbed the architect of the modern short story. Some of his classic and best known writings were “The Tell-Tale Heart”, “The Raven”, “The Black Cat”, and “The Fall of the House of Usher”, all of which included the morbid characters and melancholy themes he was so famous…

    • 1138 Words
    • 5 Pages
    Better Essays
  • Good Essays

    cyber fraud

    • 341 Words
    • 2 Pages

    How Cyber Frauds occur?: Frauds in manual payment system were mainly related to tampering of cheques or presentation of fraudulent cheques. These were detectable on close examination at bank level. However, in an e-payment scenario, funds are disbursed on genuine but stolen identities by the fraudsters. The establishment of liability in such cases has become an uphill task. The steps followed for a Cyber Fraud are as:…

    • 341 Words
    • 2 Pages
    Good Essays

Related Topics