{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:04:21Z","timestamp":1754161461200,"version":"3.41.2"},"reference-count":4,"publisher":"Emerald","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998,10,1]]},"abstract":"<jats:p>Computer security is maintained in many ways. New systems are developed with an eye towards protecting against known techniques for bypassing system controls. New methods of fraud, especially in point of sale systems, appear in spite of these protections. Consequently, there is a continuing need to examine how systems are used in practice and to implement new controls to prevent the incidence and recurrence of fraud. This paper cites examples of new frauds, suggests general techniques for protecting against the original appearance and recurrence of such frauds, and proposes that the maintenance of computer systems include continuing attention to these controls.<\/jats:p>","DOI":"10.1108\/09685229810232418","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:09:54Z","timestamp":1027735794000},"page":"155-159","source":"Crossref","is-referenced-by-count":0,"title":["Watching systems in action: security at the periphery"],"prefix":"10.1108","volume":"6","author":[{"given":"Fritz H.","family":"Grupe","sequence":"first","affiliation":[{"name":"Department of Accounting and CIS\/026, University of Nevada, Reno, Nevada, USA"}]},{"given":"James M.","family":"Hensley","sequence":"additional","affiliation":[{"name":"Department of Accounting and CIS\/026, University of Nevada, Reno, Nevada, USA"}]},{"given":"Jeanne H.","family":"Yamamura","sequence":"additional","affiliation":[{"name":"Department of Accounting and CIS\/026, University of Nevada, Reno, Nevada, USA"}]}],"member":"140","reference":[{"key":"2025072819525027800_b1","unstructured":"Committee of Sponsoring Organizations of the Treadway Commission\n           (1994), Internal Control - Integrated Framework, Committee of Sponsoring Organizations of the Treadway Commission, New York, NY."},{"key":"2025072819525027800_b2","unstructured":"Foreign Corrupt Practices Act of 1977, Public Law 95-213\n          ."},{"key":"2025072819525027800_b3","unstructured":"Information Systems Audit and Control Foundation\n           (1995), COBIT: Control Objectives for Information and Related Technology."},{"key":"2025072819525027800_b4","unstructured":"Institute of Internal Auditors Research Foundation\n           (1994), Systems Auditability and Control."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685229810232418","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810232418\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/6\/4\/155\/1246820\/09685229810232418.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/6\/4\/155\/1246820\/09685229810232418.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T23:52:58Z","timestamp":1753746778000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ics\/article\/6\/4\/155\/182331\/Watching-systems-in-action-security-at-the"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,10,1]]},"references-count":4,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1998,10,1]]}},"URL":"https:\/\/doi.org\/10.1108\/09685229810232418","relation":{},"ISSN":["0968-5227","1758-5805"],"issn-type":[{"type":"print","value":"0968-5227"},{"type":"electronic","value":"1758-5805"}],"subject":[],"published":{"date-parts":[[1998,10,1]]}}}