Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Computer Fraud

Handbook of Research on Security Considerations in Cloud Computing
Any act using computer or network resources and services to defraud people, companies, or government agencies of money, revenue, or Internet access.
Published in Chapter:
Security Challenges for Cloud Computing Development Framework in Saudi Arabia
Lawan A. Mohammed (King Fahd University of Petroleum and Minerals, Saudi Arabia) and Kashif Munir (King Fahd University of Petroleum and Minerals, Saudi Arabia)
Copyright: © 2015 |Pages: 16
DOI: 10.4018/978-1-4666-8387-7.ch013
Abstract
In recent years, cloud computing or on-demand computing technologies and applications have become ubiquitous, permeating every aspect of our personal and professional lives. Governments and enterprises are now adopting cloud technologies for numerous applications to increase their operational efficiency, improve their responsiveness and competitiveness. For these reasons, the requirements for developing cloud applications have increased. Despite having many advantages for IT organizations, cloud has some issues that must be consider during its deployment. The main concerns are security, privacy and trust. These issues arise during the deployment of mostly public cloud infrastructure. In this chapter, security, privacy and trust issues of cloud computing deployment in Saudi Arabia were identified and the solutions to overcome these problems were discussed.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Combating Computer Fraud
An activity conducted for financial gain by an individual. Computer fraud can be a malicious attack to steal data, or a type of social engineering where the goal is to gain someone’s personal information. Computer fraud can be considered an inside or outside threat. Identify loss, data modifications, and data theft are all forms of computer fraud.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR