TY - JOUR T1 - Computer Fraud AU - , Kevin Curran AU - , Laura Mc Elwee AU - , Shubhanker Upadhyaya JO - Asian Journal of Information Technology VL - 4 IS - 4 SP - 424 EP - 426 PY - 2005 DA - 2001/08/19 SN - 1682-3915 DO - ajit.2005.424.426 UR - https://makhillpublications.co/view-article.php?doi=ajit.2005.424.426 KW - AB - Examples of fraud include the unauthorized obtaining of information from a computer e.g. ‘hacking`, taking unauthorized copies of company records, trade secrets, etc. The ‘Salami` fraud this is when the perpetrator carefully ‘skims` small sums from the balances of a large number of accounts in order to bypass internal controls and escape detection. Software theft is also becoming more common with the comparative ease of making copies of computer software which has led to a huge illegal market, depriving authors of very significant revenues. This study provides an overview of some aspects of computer fraud. ER -