SlideShare a Scribd company logo
Discussion topic 1: Computer Crime Versus Computer Fraud
Your friend has just come on board at the public accounting
firm where you work and needs some background in computer
crime and computer fraud, as they did not get a course in this at
their university. How would you explain this? You write an
outline containing the following and then attempt to explain
these items to her:
Define computer crime and computer fraud. In what ways are
they different? Give an example of a computer crime and a
computer fraud. Discuss the four ways in which computers are
used in cybercrime. What are some of the skills needed to
investigate cybercrime?
How have provisions of the Patriot Act made it easier to
apprehend cybercriminals?
The internet has enabled concealment in many money
laundering fraud schemes.
Define and explain the three stages of money laundering.
What are some of the methods money launderers use in
cyberspace to conceal illegitimate transactions?
Explain how alternate forms of currency are used in internet
transactions.

More Related Content

DOCX
Computer technology has provided the criminal justice system wit.docx
PPT
Cybercrime
DOCX
Computer technology has provided the criminal justice system with a .docx
DOCX
Write a Computer Use policy.Be sure to answer all the requ.docx
DOCX
1. List four primary ways identity theft can be accomplished.2. .docx
PDF
A Detailed Guide On How To Write The Best Essay Urg
PDF
Fish Lined Paper For Letter Writing Printable Stationar
DOCX
Week 10 Discussion Information Security and Digital Crime and .docx
Computer technology has provided the criminal justice system wit.docx
Cybercrime
Computer technology has provided the criminal justice system with a .docx
Write a Computer Use policy.Be sure to answer all the requ.docx
1. List four primary ways identity theft can be accomplished.2. .docx
A Detailed Guide On How To Write The Best Essay Urg
Fish Lined Paper For Letter Writing Printable Stationar
Week 10 Discussion Information Security and Digital Crime and .docx

Similar to Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docx (19)

DOCX
Bba401 e-commerce
PPTX
E commerce
PPT
Information Technology Act
PPTX
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
PPTX
Presentation on cyber crime and prevention
PDF
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
PPTX
Computer Crimes
DOCX
Delivering an Oral StatementYou will need to deliver an oral sta.docx
PDF
How To Write A Thematic Essay - Structure And Examples - Peac
PPSX
Multimedia12 by aparajeeta
DOCX
DRAFT 2 RP.docx
PPTX
Cyber security and cyber laws
PDF
Cyber law & information technology
DOC
Cyber crime
DOCX
UNIT 5.docx
PPSX
Towards an understanding of cyber crime final
PDF
What are cybercrimes? How cybercrime works?
DOCX
CYBERCRIME AND THE JUDICIAL SERVICE .docx
Bba401 e-commerce
E commerce
Information Technology Act
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Presentation on cyber crime and prevention
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
Computer Crimes
Delivering an Oral StatementYou will need to deliver an oral sta.docx
How To Write A Thematic Essay - Structure And Examples - Peac
Multimedia12 by aparajeeta
DRAFT 2 RP.docx
Cyber security and cyber laws
Cyber law & information technology
Cyber crime
UNIT 5.docx
Towards an understanding of cyber crime final
What are cybercrimes? How cybercrime works?
CYBERCRIME AND THE JUDICIAL SERVICE .docx
Ad

More from felipaser7p (20)

DOCX
Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
DOCX
Discussion topicFor this weeks discussion, review the normal prof.docx
DOCX
Discussion-Based AssessmentOnce you have completed all of the le.docx
DOCX
Discussion  Answer the following discussion questions  with below.docx
DOCX
Discussion TopicExplain how you would integrate the current extern.docx
DOCX
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
DOCX
Discussion topic Complex FraudsAuditors often fail to detect fina.docx
DOCX
Discussion Topic The Importance of Strategic ControlsRetail com.docx
DOCX
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docx
DOCX
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docx
DOCX
Discussion Thread 2—Integration of TechnologyTechnology has chan.docx
DOCX
Discussion Statistical Hypothesis Testing and ErrorProvide .docx
DOCX
Discussion Questions for Theories of Personality.Discussion 1 – Di.docx
DOCX
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
DOCX
Discussion Question Short 150 wordsFinding Terrorists within th.docx
DOCX
discussion questions 70 words min on the three question below no pla.docx
DOCX
Discussion Question 5ObjectiveCharacterize the Moon..docx
DOCX
Discussion Question 1Engaging in a political process enabl.docx
DOCX
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
DOCX
Discussion Question 3In the HBS case titled Organizational Transf.docx
Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
Discussion topicFor this weeks discussion, review the normal prof.docx
Discussion-Based AssessmentOnce you have completed all of the le.docx
Discussion  Answer the following discussion questions  with below.docx
Discussion TopicExplain how you would integrate the current extern.docx
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
Discussion topic Complex FraudsAuditors often fail to detect fina.docx
Discussion Topic The Importance of Strategic ControlsRetail com.docx
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docx
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docx
Discussion Thread 2—Integration of TechnologyTechnology has chan.docx
Discussion Statistical Hypothesis Testing and ErrorProvide .docx
Discussion Questions for Theories of Personality.Discussion 1 – Di.docx
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
Discussion Question Short 150 wordsFinding Terrorists within th.docx
discussion questions 70 words min on the three question below no pla.docx
Discussion Question 5ObjectiveCharacterize the Moon..docx
Discussion Question 1Engaging in a political process enabl.docx
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
Discussion Question 3In the HBS case titled Organizational Transf.docx
Ad

Recently uploaded (20)

PDF
Computing-Curriculum for Schools in Ghana
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Classroom Observation Tools for Teachers
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
01-Introduction-to-Information-Management.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
Supply Chain Operations Speaking Notes -ICLT Program
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Computing-Curriculum for Schools in Ghana
Anesthesia in Laparoscopic Surgery in India
Classroom Observation Tools for Teachers
Pharmacology of Heart Failure /Pharmacotherapy of CHF
01-Introduction-to-Information-Management.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
GDM (1) (1).pptx small presentation for students
Abdominal Access Techniques with Prof. Dr. R K Mishra
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Supply Chain Operations Speaking Notes -ICLT Program
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
O7-L3 Supply Chain Operations - ICLT Program
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE

Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docx

  • 1. Discussion topic 1: Computer Crime Versus Computer Fraud Your friend has just come on board at the public accounting firm where you work and needs some background in computer crime and computer fraud, as they did not get a course in this at their university. How would you explain this? You write an outline containing the following and then attempt to explain these items to her: Define computer crime and computer fraud. In what ways are they different? Give an example of a computer crime and a computer fraud. Discuss the four ways in which computers are used in cybercrime. What are some of the skills needed to investigate cybercrime? How have provisions of the Patriot Act made it easier to apprehend cybercriminals? The internet has enabled concealment in many money laundering fraud schemes. Define and explain the three stages of money laundering. What are some of the methods money launderers use in cyberspace to conceal illegitimate transactions? Explain how alternate forms of currency are used in internet transactions.