Computer fraud

Results: 842



#Item
421Confidence tricks / Crime / Computer crimes / Deception / Phishing / Internet privacy / Fraud / Mystery shopping / Social engineering / Spamming / Ethics

Microsoft PowerPoint - D Stark - ESOMAR Congress 2009.ppt

Add to Reading List

Source URL: mria-arim.ca

Language: English - Date: 2013-06-28 14:59:27
422Healthcare reform in the United States / Presidency of Lyndon B. Johnson / Medicine / Privacy law / Medicare / End Stage Renal Disease / Health Insurance Portability and Accountability Act / Medicaid / United States Department of Health and Human Services / Government / Health / Federal assistance in the United States

[removed]Federal Register / Vol. 72, No[removed]Tuesday, May 8, [removed]Notices Computer Fraud and Abuse Act of 1986; the Health Insurance Portability and

Add to Reading List

Source URL: cms.gov

Language: English - Date: 2013-03-01 20:09:48
423Guidance Software / EnCase / Certified Computer Examiner / Certified Fraud Examiner / Forensic science / Michael G. Kessler / Computer forensics / Computer security / Law enforcement

490 CENTER ROAD WEST SENECA, NY[removed]T: [removed]F: [removed]www.digitsllc.com Press Release – For immediate release

Add to Reading List

Source URL: www.digitsllc.com

Language: English - Date: 2012-03-30 11:09:05
424Software / Social engineering / Computer worms / Conficker / AutoRun / ESET / Advance-fee fraud / Computer virus / Internet privacy / Malware / System software / Antivirus software

April 2012 Feature Article: Now Google Privacy Policy Reaches the Cloud Table of Contents Now Google Privacy Policy Reaches the Cloud .....................................................................................

Add to Reading List

Source URL: www.eset.com

Language: English - Date: 2012-05-03 10:25:17
425Information technology audit / Computer-aided audit tools / Professional accountancy bodies / ACL / Accounting software / Audit / Internal audit / Institute of Internal Auditors / Accountancy / Auditing / Business

Proactively Detecting Occupational Fraud Using Computer Audit Reports © 2004 The Institute of Internal Auditors Research Foundation _________________________________________________________ About the Author v

Add to Reading List

Source URL: www.theiia.org

Language: English - Date: 2008-04-21 10:52:06
426Information technology audit / Business / Computer-aided audit tools / Crimes / Deception / Institute of Internal Auditors / Fraud / Internal audit / David Coderre / Accountancy / Auditing / Risk

Best Practices in Lean Six Sigma Process Improvement

Add to Reading List

Source URL: www.theiia.org

Language: English - Date: 2009-12-29 15:02:18
427Computing / Computer crimes / Social engineering / Phishing / Malware / Internet fraud / Email spam / Internet security / Spam / Internet / Spamming / Cybercrime

Cyber Intel Advisory: Boston Marathon Bombing Is Being Used to Disseminate Malware and Conduct Financial Fraud 16 April 2013 Insert your logo here[removed]Integrated Intelligence Center

Add to Reading List

Source URL: www.cisecurity.org

Language: English - Date: 2013-04-17 12:30:02
428Computer crimes / Security / Information technology audit / Computer law / Secure communication / Identity theft / Computer Fraud and Abuse Act / Computer Crime and Intellectual Property Section / Data breach / Cybercrime / Computer network security / Crime

Privacy in the Digital Age: Preventing Data Breaches and Combating Cybercrime

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2014-02-07 13:16:28
429Law / Ethics / Fraud / Identity theft / Theft / Organized crime / Malware / Identity fraud / National Fraud Authority / Computer crimes / Identity / Crimes

Presentation to the National Security Senior Executive Development course at the National Security College, ANU , 23 February 2011

Add to Reading List

Source URL: www.aic.gov.au

Language: English - Date: 2011-03-21 06:58:27
430Email / Computer-mediated communication / Internet ethics / Electronic commerce / Social engineering / Australian Communications and Media Authority / Spam / Email spam / Internet fraud / Internet / Spamming / Computing

DOC Document

Add to Reading List

Source URL: www.cybersmart.gov.au

Language: English - Date: 2013-10-17 19:38:19
UPDATE