Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 6, 1978 - Issue 6
8
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Computer Abuse and its Control

Pages 3-12 | Published online: 04 Jan 2010

References

  • Allen , B. R. 1971 . “Computer Fraud” . Financial Executive , May : 38 – 44 .
  • Allen , B. R. 1977 . “The Biggest Computer Frauds: Lessons for CPA's” . The Journal of Accountancy , May : 52 – 62 .
  • Business Week . 1973 . “On the Coast to Coast Trail of Equity Funding” 68 – 72 . April 21
  • Cardwell , H. 1960 . The Principles of Audit Surveillance , Princeton, New Jersey : D. Van Nostrand Company .
  • Carmichael , D. R. 1969 . “Fraud in EDP Systems” . The Internal Auditor , Volume 26 ( 3 ) : 28 – 38 .
  • Chamber of Commerce of the United States . 1974 . Handbook on White Collar Crime
  • Chambers , A. D. 1975 . “Audit Test Packs and Computer Audit Programs” . The Computer Journal , Volume 18 ( 2 ) : 98 – 101 .
  • Chambers , A. D. and Hanson , O. J. 1975 . Keeping Computers Under Control , 202 London : Gee & Co. .
  • Chartered Institute of Public Finance and Accountancy . 1977 . Confidential report reviewed in Accountancy Age 7 July 29
  • Clark , D. 1972 . “Security of Computer Installations” . Security Gazette , January
  • Comer , M. J. 1977 . Corporate Fraud , 393 London : McGraw-Hill .
  • Coputerworld . 1972 . “Computer ‘Accomplice’ in Thefts” February 16
  • Coputerworld . 1972 . “File Juggling Defrauds State” 3 May 17
  • The Financial Times . 1975 . “Computer Man on Twenty-Seven Charges” February 19
  • Fire Protection Association . 1971 . Fire Protection of Computers and Ancillary Equipment, Fire Prevention Information and Publications Centre , Queen Street, London EC4N 1TJ : Aldermary House .
  • Gellman , H. S. 1974 . “Using the Computer to Steal” . The Internal Auditor , Volume 31 ( 2 ) (See also correspondence in Volume 31, No. 6)
  • Hamilton , P. 1972 . Computer Security , London : Cassell .
  • Linden , T. 1976 . U. S. National Bureau of Standards, referred to by Parker (1976, p. 30.)
  • Mair , W. C. , Wood , D. R. and Davis , K. W. 1976 . Computer Control and Audit, , 2nd Edition , 489 Florida : The Institute of Internal Auditors .
  • Martin , J. 1973 . Security, Accuracy and Privacy in Computer Systems , New Jersey : Prentice-Hall .
  • Melville , L. W. 1975 . “The Place of the Computer in Legal Systems” . In Keeping Computers Under Control , 202 London : Chambers and Hanson, Gee & Co. .
  • National Association of Bank Audit and Control. 1973 . Case Study No. 229. U. S. Newsweek, April 13
  • Parker , D. B. 1972 . Computer-Related Crime and Data Security , 29 Stanford Research Institute .
  • Parker , D. B. 1976 . Crime by Computer , 308 New York : Charles Scribner's Sons .
  • Russell , H. F. 1977 . Foozles and Frauds , 249 Florida : The Institute of Internal Auditors .
  • The Institute of Internal Auditors and Stanford Research Institute . 1977 . Systems Auditability and Control Study (SAC) 385
  • Time . 1972 . “Key-Punch Crooks” December 25
  • Weiss , H. . “EDP Auditing, Today and Tomorrow” . a speech before the 36th International Conference of The Institute of Internal Auditors, June 22

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.