Making choices and exercising judgment.
a. What would motivate someone to engage in computer crime?
b. Do a Google search for the most recent list of AICPA Top Ten Technologies. Choose one and explain how it might be used to engage in computer crime.
c. Suggest at least three specific internal controls you’d employ to prevent, detect, or correct the computer crime you identified above.
d. Brad Willman contributed to the arrest of several pedophiles in Canada and the United States. But he collected evidence for his investigation by hacking into others’ computers. Read about this case in Cori Howard, “Internet Vigilante,” Maclean’s (June 6, 2005). What model of ethics, discussed in Chapter 3, best describes Willman’s actions? Were Willman’s actions ethical? What legal action, if any, should be taken against Willman?
We need at least 10 more requests to produce the solution.
0 / 10 have requested this problem solution
The more requests, the faster the answer.