References
- American Bar Association, Criminal Justice Section . 1984 . Report on Computer Crime Washington, D.C.
- Audit Commission . 1987 . Survey of Computer Fraud and Abuse. , London : HMSO .
- BIS Applied Systems . 1984 . Computer‐Related Fraud. , London : Butterworths .
- Bologna , J. 1984 . Corporate Fraud‐ The Basics of Prevention and Detection. , London : Butterworths .
- Chisholm Institute of Technology . 1985 . Computer‐Related Crime in Australia in 1984. , Australia : Chisholm .
- Comer , M.J. 1985 . Corporate Fraud , 2nd edn , London : McGraw‐Hill .
- Commission of the European Communities . 1984 . “ Information Technology Task Force ” . In The Vulnerability of the Information Conscious Society. Brussels
- Collier , P. , Dixon , R. and Marston , C. 1990 . The Prevention and Detection of Computer Fraud. , London : CIMA .
- Institute of Chartered Accountants in England and Wales (ICAEW) . 1987 . Countering Computer Fraud. London
- Institute of Internal Auditors Inc (IIA, Inc.) . 1985 . Statement on Internal Auditing Standards No 3 (SIAS 3) , Deterrence, Detection, Investigation and Reporting of Fraud .
- Krauss , L. I. and MacGahan , A. 1979 . Computer Fraud and Countermeasures. , Hemel Hemp‐stead : Prentice‐Hall .
- LeGrand , C. H. 1986 . Discouraging fraud through systems design. . Internal Auditor (US) , 43 ( 2 ) April : 28 – 35 .