Electronic Fraud
Electronic Fraud
1. Electronic fraud is an important issue in many organizations because of the adverse effect it has on productivity and operations. Organizations having integrated supply chain are prone to electronic fraud. The integration of supply chains provides various benefits to organizations, but it makes the organizations susceptible to electronic fraud. The advance in technology has made the perpetration of fraud boundaries activity. It has also improved how criminals commit fraud through internet.
The kinds of frauds perpetrated in organizations with integrated supply chain are limitless. Fraud can be done for the benefit of a company or to harm the company. In addition, fraud can be done to benefit internal employees and people outside the organization. Criminals use different techniques to commit fraud. The criminals hack computer systems and other electronic systems to get information, delete or alter information. Organizations have integrated different information technology systems in their supply chain activities to achieve their goals.
Though the information systems improve supply chain efficiency, they are prone to criminal activities. This happens when organizations do not protect the hard and software. Criminals can hack the organizations’ information systems and interfere with the supply chain activities. Electronic fraud can occur at any stage of the trading process. It can happen in the pre contractual stage, contractual and ordering stage. It can also happen in the logistic, settlement and post processing stage. For instance, they can interfere with invoicing and ordering of goods (Coderre, 2009).
Further, criminals use computer programs and viruses to commit fraud. The development in technology has led to development of different software and computer viruses. Criminals can have access to computer programs that can cause damage to the supply chain easily. The computer programs are used to damage the computer system and information system. The computer viruses spread from one network and system to another. Computer programs enable criminals to access information regarding the supply chain by hacking the supply chain. The programs help in deletion and alteration of information in the supply chain (Coderre, 2009).
There are various government agencies in the united states that provide awareness about electronic fraud. The federal bureau investigation helps in the investigation of electronic fraud crimes and other crimes. The agency provides awareness against electronic fraud. It educates the public and warns them about electronic fraud in organizations. In addition, the commodity future trading commission provides awareness about electronic fraud. The commodity future trading commission (CFTC) is a government agency that regulates the trading of good futures and options contract in the country. The agency takes action againstorganizations suspected to engage in fraudulent activities when selling goods. The agency educates the future marketers about fraud. It also reviews information and complaints presented by the marketers (Coderre, 2009).
2. Cyber terrorism entails the use of the internet to commit terrorist activities. The growth in internet technology has led to increase in terrorism activities. Terrorist groups use computers and internet to attain their goals. Many terrorist groups utilize computers and the internet to communicate. Internet and computer technologies have improved communication among terrorist groups. Terrorists use different types of communication methods including chats and emails to communicate. This has in turn, enabled them to reach many people around the world.
Terrorists use the internet and computers to recruit members to their organizations. They can recruit members from different regions as they are able to reach them. Additionally, terrorists use the internet to get funding from various nations and people linked with terrorism activities. Terrorists use the internet to source funds for financing terrorist activities because of its anonymity. In addition to that, the internet technology has proved effective in coordinating terrorist attacks and monitoring. Terrorist groups use the internet to plan, coordinate and monitor the progress of attacks as the internet offers real; time information.
Therefore, cyber terrorism has led to increase in crime in the society as terrorists use the internet and computers to commit traditional terrorist activities. Efforts to prevent crime globally have been frustrated by cyber terrorism as technology advances gives terrorist an upper hand in carrying out attacks. Terrorists have managed to use technology to create fear in the society and disrupted activities. Apart from increasing criminal activities in the society, cyber terrorism has affected economic growth by interrupting economic activities(Ayn, 2002).
3. Preserving evidence is important in ensuring the evidence presented in court is valid and reliable (Dutelle, 2011). The evidence collected should be well preserved from computer fraud offenders. Evidence against computer offenders should be protected to ensure they do not alter it and maintain its reliability. In order to preserve digital evidence, the computer should be unplugged without interfering with the files and devices. This prevents deletion of files, fabrication and ensures the evidence is reliable.
The computer system should be kept in a safe place or a locked room. In order to preserve the evidence, access to the secured place should be documented using a log. The evidence can be stored in electronic devices such as flask disks and hard disks. Forensic investigators should ensure the information in electronic devices is secure by having a back up copy (Gardner, Anderson & Anderson, 2009).
4. Crimes against computer fraud offenders can be resolved through a civil process or criminal process. The legal processes followed in civil law to resolve computer crimes. The first step in resolving a civil case is filing a complaint. Other stages include discover and pre trial, trial, judgment and appeal. The legal process is effective in preventing criminal activities in the society. In this case, the plaintiff presents evidence to show that the defendant committed the crime. The plaintiff and defendant meet before the trial and exchange information regarding the case. The information presented determines whether the case should move to the trial stage or not. The case moves to the trial stage if there is sufficient information.
The procedure followed in civil law ensures the computer crime cases are resolved well, and the party’s rights are respected. The defendant and plaintiff have sufficient knowledge of the evidence to be presented in court, and they can object it. Also, the defendant and plaintiff can object the witnesses to be presented in court. Therefore, the legal processes used in civil law encourage justice by punishing the offender. The offender is required to pay for the damages caused if found guilty. The defendant has an opportunity to appeal to change the court decision. The decision made by the court is implemented if the appeal is rejected. In this case, the defendant has to comply with the court decision to avoid prosecution and penalties (Cohere, 2009).
Reference
Gardner, T.J., Anderson, T.M., & Anderson, T.M. (2009). Criminal evidence. Cengage learning
Is this your assignment or some part of it?
We can do it for you! Click to Order!