Tuesday, April 30, 2019

Contract tender process in the work environment Essay

Contract tender process in the work environment - Essay ExampleIt is fire that computer abuse is compared with the criminal offence of serial killing, but computer criminals are more subtle, erratic and evasive. Therefore, it requires sound anti-computer crime control mechanisms to check this devastating crime that has defrauded corporations, societies and individuals to the tune of millions of dollars each year.One issue that has live on a disturbing phenomenon to corporate stakeholders, as well as business management process decision-makers and leading of communities is computer crime. But the impact of this modern-day chore is mainly felt in the corporate world, where organizations hold water to potentially lose millions of dollars a year. For the fact that computers are becoming household commodities, and Internet access is omnipresent and cheap, there is no end to the threats from what is termed the computer criminal.This report would investigate the sources of compute r crime, its trend now, the losses it causes many corporate entities, and some of the criminal types behind the ever increasing range of scams. Relevant literature from peer-reviewed sources would be explored in order to elicit vital information about how computer crime has developed to beset our societies. Findings from these scholastic sources are highlighted and discussed with the view of offering recommendations about the appropriate ways to tackle the endemic problem of computer crime.Experts dealing with this major problem have attempted to give specific definitions of what is a computer crime. This has been made more difficult by the crime type evolution, the fact that over the years, this kind of crime has developed into several interwoven forms comprising all crime types involving the use of computers. It has also been discovered that computer crime is a crime that could be categorized as white-collar for a computer

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.