NCJ Number
41264
Journal
Assets Protection Volume: 2 Issue: 2 Dated: (SPRING 1977) Pages: 11-16
Date Published
1977
Length
6 pages
Annotation
FOCUSING ON THE FORENSIC INVESTIGATIVE APPROACH TO SOLVING COMPUTER-RELATED CRIMES, THE AUTHOR DISCUSSES TECHNIQUES FOR EVALUATING COMPUTER INPUT AND OUTPUT DOCUMENTARY EVIDENCE.
Abstract
AFTER DEFINING COMPUTER CRIME AS THE MOST LUCRATIVE OF ALL CRIMES, THE AUTHOR ILLUSTRATES HIS QUALIFICATION WITH EXAMPLES OF COMPUTER FRAUD THAT WERE PERPETRATED BY MODIFICATION OF COMPUTER INPUT SOURCE DOCUMENTS SUCH AS VOUCHERS, CLAIM TRANSACTIONS, AND KEYPUNCH CARDS. ALSO COVERED ARE DOCUMENT AGE INDICATORS, TEXTUAL CONTENT, PHOTOCOPYING, AND WRITING MEDIA. A COMPUTER FLOW CHART ILLUSTRATES VARIOUS POINTS IN A COMPUTER ORIENTED PROCESS WHERE FALSIFICATIONS CAN BE INTRODUCED.