Select All | Select None
Login failed. Please try again.
Forgot your password?
Log in with Facebook
Log in with Google
You can now keep track of new articles from ACM SIGSAC Review on your personalized homepage!
Every computer installation is vulnerable to criminal activity. In the computer environment today, the possibilities of fraud, abuse, and theft are limited only by the criminal's imagination.
The past decade has indeed witnessed the rapid development and proliferation of computers in organizations of all sizes and types. Increasingly, it has been recognized that computing systems can be compromised, resulting in various forms of damage and loss to organizations. The issue of data...
Two sets of data on computer-related crime provide an interesting view of this type of fraud. One set of data appears in a study prepared for Lawrence Livermore Laboratories (18) during 1979 and lists characteristics of 461 cases collected by Stanford Research Institute between 1958 and 1978....
The ideas have already been distilled to extreme purity and potency; further distillation could result in dangerous volatility.
results per page
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don't already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don't already have one.
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don't already have one.