Computer Fraud And Abuse Analysis

137120 Words 549 Pages
Register to read the introduction… This computer fraud and abuse technique is called phishing. Its purpose is to get the information need to commit identity theft. The perpetrator probably also used brand spoofing of Big Bank’s web site.


Ch. 6: Computer Fraud and Abuse Techniques


A purchasing department received the following e-mail.
Dear Accounts Payable Clerk,
You can purchase everything you need online—including peace of mind—when you shop using Random Account Numbers (RAN). RAN is a free service for Big Credit Card customers that substitutes a random credit card number in place of your normal credit card number when you make online purchases and payments. This random number provides you with additional security. Before every online purchase, simply get a new number from RAN to use at each new vendor. Sign up for an account at Also, take advantage of the following features:

Automatic Form automatically completes a vendor’s order form with the RAN, its expiration date, and your shipping and billing addresses.


Set the spending limit and expiration date for each new RAN.


Use RAN once or use it for recurring payments for up to one
…show more content…
Is she worried that the computer will impose its own structure on the organization? The computer can considerably narrow that freedom causing people to view the computer as structure and constraint.
Did she have an adverse experience with previous changes to her work environment and as a result is suspicious of any new system?

What events may have contributed to the new system’s failure?


The company did not explain why the system was being implemented, what the company hoped to achieve with the system, and why it was so important to the company.


The changes to Mary's job and responsibilities were not explained.


Mary was not given any assurance that she would not be replaced by the system.


The company did not alleviate Mary's fear by reassuring her that training would be provided to help her adapt to the new system and her duties.


The company did not involve Mary in the systems change. They did not ask for her ideas, thoughts, or input. Evidently, she was not informed of the change until

Related Documents