Skip to main content

Table 1 Computer input-fraud script (Willison, 2006 )

From: Quality assurance in crime scripting

A1 Deliberately gaining access to the organization
A2 Already authorized as employee
A3 Wait for employees’ absence from offices.
A4 Access colleagues’ computers
A5 Access programmes
A6 False customer account construction
A7 Authorization of fictitious invoices
A8 Exit programmes
A9 Exit the system
A10 Spend the transferred Money