Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Describe the impact(s) of the act or acts of computer fraud on the client's organization. Include the following: Financial-related impact(s) Cybercrime-related impact(s) Explain the type

  1. Describe the impact(s) of the act or acts of computer fraud on the client's organization. Include the following:
    1. Financial-related impact(s)
    2. Cybercrime-related impact(s)
  2. Explain the type of intrusion(s) performed by the act or acts of computer fraud. Include the following:
    1. Reflect on whether the act or acts of fraud were performed with or against a computer system.
  3. Justify whether the act or acts of computer fraud meet the legal definition of computer fraud. Include the following:
    1. List areas of intent to defraud using a computer system.
    2. Determine how intent applies for each area in this act of computer fraud.
  4. Explain the types of potential damages of loss the client can incur through the act or acts of computer fraud. Include the following:
    1. Financial loss
    2. Loss of reputation
    3. Loss of customers
    4. Loss of property (computers)
    5. Loss of time
  5. Determine how to calculate damages to the client from the committed act or acts of computer fraud. Include the following:
    1. Method(s) used to calculate damages
    2. Organizational information specific to the methodology used

The Meier Corporation is growing fast. Many of the employees and managers have been with the company from the start. The company is adding and improving its IT systems on the fly. Jeff, the IT manager, has full, unrestricted access to the company's systems, including the company bank account details.

With the expansion of the company, a new chief operating officer has been hired from outside the company. Having worked demanding hours over the previous couple of years, Jeff had expected to be promoted to that position and is disappointed. Jeff decides to utilize his inside experience, knowledge of passwords, and involvement in procedures for his own benefit.

Jeff uses his access to the company's private systems to create a second bank account in his name and divert company funds to this bank account through online banking access. He covers up the transactions with general ledger entries. Twice during the year, when questions arise, he tells the accounts department that the issue is due to a "system imbalance" and promises to have it resolved as soon as possible.

During testing at year-end by the external auditors, one of the anomalous payments is examined along with the detail and explanation for the entries. Unbeknownst to the IT manager, the company's audit committee requests a full review of the company's systems to identify the cause of the "system imbalances." The extent of the IT manager's fraud takes several months to ascertain, such was the skill with which the account balances had been manipulated.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Law Express Criminal Law

Authors: Emily Finch, Stefan Fafinski

8th Edition

1292295414, 978-1292295411

More Books

Students also viewed these Law questions