.

Wednesday, September 25, 2019

Contract tender process in the work environment Essay

Contract tender process in the work environment - Essay Example It is interesting that computer crime is compared with the crime of serial killing, but computer criminals are more subtle, erratic and evasive. Therefore, it requires serious anti-computer crime control mechanisms to check this devastating crime that has defrauded corporations, societies and individuals to the tune of millions of dollars each year. One issue that has become a disturbing phenomenon to corporate stakeholders, as well as business management process decision-makers and leaders of communities is computer crime. But the impact of this modern-day problem is mainly felt in the corporate world, where organizations stand to potentially lose millions of dollars a year. For the fact that computers are becoming household commodities, and Internet access is ubiquitous and cheap, there is no end to the threats from what is termed the computer criminal. This report would investigate the sources of computer crime, its trend now, the losses it causes many corporate entities, and some of the criminal types behind the ever increasing range of scams. Relevant literature from peer-reviewed sources would be explored in order to elicit vital information about how computer crime has developed to ravage our societies. Findings from these scholastic sources are highlighted and discussed with the view of offering recommendations about the appropriate ways to tackle the endemic problem of computer crime. Experts dealing with this major problem have attempted to give specific definitions of what is a computer crime. This has been made more difficult by the crime type evolution, the fact that over the years, this kind of crime has developed into several interwoven forms comprising all crime types involving the use of computers. It has also been discovered that computer crime is a crime that could be categorized as white-collar: for a computer

No comments:

Post a Comment