Table of contents
Using Experts for Detecting and Litigating Computer Crime
Avi Rushinek, Sara F. RushinekWhilst the development of a crime‐proof computer operating systemseems very unlikely, more could be done to deter, discover, litigate andpunish computer criminals. Because of the…
Thoughts on Whistle‐blowing
James M. HarbordExamines the circumstances in which a need for whistle‐blowingarises and how it arises, particularly in small concerns. Looks at howfraud may be promoted by top managers; the…
The Financial World at Risk: The Dangers of Organized Crime, Money Laundering and Corruption
B.A.K. RiderUntil recently, the involvement of syndicated and organizedcriminals in economic crime, and the idea of its exitence outside (andto some extent even within) the United States has…
The Trust Factor
George A. CassolaIs an employee an insider or an outsider in relation to thebusiness he/she works in? If a director leaves the running of an entirejob in the hands of one trusted employee, should…
The Maxwell Interview
Gerald VintenAn account of some of Robert Maxwell′s criminal businessactivities, first brought to light in the 1970s when the Department ofTrade investigated Pergamon, and their repercussions…
Avoiding Fraud and Irregularities in Financial Institutions: A Control‐oriented Approach
Stanley Y. Chang, Roselyn E. MorrisWhile internal auditors in financial institutions have only nominaldirect legal responsibility, there is implied indirect responsibility.As a defence to such potential, an audit…
ISSN:
0268-6902e-ISSN:
1758-7735ISSN-L:
0268-6902Online date, start – end:
1986Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Professor Jie Zhou