Accounting Information System Report
COMPUTER FRAUD
Name: ZHAOJUN HU
Student NO: 20137098
Class: TACC403 Accounting information system
Submission date: September 20, 2013
TABLE OF CONTENTS
EXECUTIVE SUMMARY i
INTRODUCTION 1
IS SOFTWARE LICENSING ANTISOCIAL?..................................................................2
COMPUTER SECURITY MEASURES 3
WOULD THE REMOVAL OF COMPUTER SECURITY MASURES REDUCE THE INCIDENCE OF COMPUTER FRAUD? 5
CONCLUSION AND RECOMMENDATIO 6
REFERENCES 8
EXECUTIVE SUMMARY
The aim of this report is to discuss the various methods of reducing computer fraud and to find out whether the computer security measures is necessary. In the main body of this report discuss about whether the …show more content…
However, everything has its two sides. The "software as property" believing the licensor should be permitted to reap the benefits of its investment in researching and developing the software by using whatever protective measures it deems necessary, including licenses that curtail otherwise permissible uses under the Copyright Act. Economic efficiency and business innovation—used to justify special treatment for software producers also militate against such treatment, as software license agreements often discourage both. Software licensing encourages the development of new ideas by protecting the efforts of businesses seeking to develop new software products that will provide them with a profit and/or a competitive advantage in the marketplace. New technologies requires numerous time and money to development if businesses were unable to protect their investment by licensing the software to others, it would be much more difficult for them to receive a reward for their efforts in the research and development of computer software. Economic systems without such incentives are much more likely to fail in developing new products to meet consumer needs. Therefore, software licensing is necessary for the future development.
COMPUTER SECURITY MEASURES
Given the widespread adoption of computer technology for business operations, the problem of information protection has become more urgent than ever.