Library Header Image
LSE Research Online LSE Library Services

Getting the adjustment right: controls and computer security

Backhouse, James (1995) Getting the adjustment right: controls and computer security. Journal of Financial Crime, 3 (1). pp. 56-59. ISSN 1359-0790

Full text not available from this repository.

Identification Number: 10.1108/eb025670


As computers and information technology gradually insinuate themselves into every nook and cranny of business operations, management have begun to appreciate some of the risks as well as the benefits. But why are computer systems so vulnerable? There are many reasons why computer systems need to be protected. Computers are so much smaller and more powerful than they were just a few years ago and so much more extensively used as a consequence that the combination of their ubiquity and the importance of the information that they hold is a magnet for accident and malice alike. When we consider that the data that they process often relates directly to money, and in effect is money in many applications, then the attraction is heightened. Converging computing technology with telecommunications has produced real time systems so that there is no longer any delay between the giving of an instruction and its commission. Bank accounts are updated instantly, whether the instructions were bona fide or fraudulent. Even more mouth watering is the opportunity to initiate the process in one country, debit the account in a second country and post the proceeds to an account in yet a third country. Systems are no longer secreted in a whitecoat computer room environment — the terminal on the teller's desk might, with a little tweaking and know-how, lead into the sanctus sanctorum of the corporate information heartlands, with devastating effects.

Item Type: Article
Official URL:
Additional Information: © 1995 Emerald Group Publishing Limited
Divisions: Management
Subjects: K Law > KD England and Wales
Date Deposited: 08 Feb 2010 16:54
Last Modified: 15 May 2024 23:36

Actions (login required)

View Item View Item