L e a r n I n g o b j e c t I v e s


Computer forensics specialists



Download 1.2 Mb.
View original pdf
Page38/46
Date20.09.2021
Size1.2 Mb.
#57360
1   ...   34   35   36   37   38   39   40   41   ...   46
Accounting Information Systems 13th Chapter 7
Computer forensics specialists discover, extract, safeguard, and document computer evidence such that its authenticity, accuracy, and integrity will not succumb to legal challenges. Computer forensics can be compared to performing an autopsy on a computer system to determine whether a crime was committed as well as who committed it, and then marshalling the evidence lawyers need to prove the charges in court. Some of the more common matters investigated are improper Internet usage fraud sabotage the loss, theft, or corruption of data retrieving erased information from emails and databases and figuring out who performed certain computer activities. A Deloitte & Touche forensics team uncovered evidence that helped convict a Giant Supermarket purchasing manager who had accepted over $600,000 in supplier kickbacks.
INSTALL FRAUD DETECTION SOFTWARE
Fraudsters follow distinct patterns and leave clues behind that can be discovered by fraud detection software. ReliaStar Financial used software from IBM to detect the following A Los Angeles chiropractor submitted hundreds of thousands of dollars in fraudulent claims. The software identified an unusual number of patients who lived more than
50 miles away from the doctor’s office and flagged these bills for investigation A Long Island doctor submitted weekly bills fora rare and expensive procedure normally done only once or twice in a lifetime A podiatrist saw four patients and billed for 500 separate procedures.

Download 1.2 Mb.

Share with your friends:
1   ...   34   35   36   37   38   39   40   41   ...   46




The database is protected by copyright ©ininet.org 2024
send message

    Main page