Trust Account Fraud and Effective Information Security Management

被引:0
|
作者
Mubarak, Sameera [1 ]
机构
[1] Univ South Australia, Adelaide, SA, Australia
关键词
Information Security; Information Security Management; Computer crime; Trust account;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The integrity of lawyers' trust accounts has come under scrutiny in the last few years. There are strong possibilities of information technology security breaches happening within the firms, either accidental or deliberate. The damage caused by these security breaches could be extreme. For example, a trust account fund in an Australian law firm was misused in a security breach in which Telstra charged A$50,000 for phone usage, mainly for ISD calls to Hong Kong. Our study involved interviewing principals of ten law companies to find out solicitors' attitudes to computer security and the possibility of breaches of their trust accounts. We simultaneously carried out a survey to see if the trends identified in our case-studies could be backed up with broader quantitative data. We have also conducted in-depth interviews of five trust account regulators from the Law society of South Australia to know their view points on security threats on trust accounts. An overall finding highlights that law firms were not current with technology to combat computer crime, and inadequate access control was a major concern in safeguarding account data. Our conclusions revealed the urgent need for law firms to adopt security controls, implement information security policies and procedures and obtain cooperation from management to communicate these policies to staff..
引用
收藏
页码:57 / 71
页数:15
相关论文
共 50 条
  • [1] Exploring Trust and Information Monitoring for Information Security Management
    Chang, Shuchih Ernest
    Liu, Anne Yenching
    Jang, Yu-Teng Jacky
    [J]. 2017 10TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, BIOMEDICAL ENGINEERING AND INFORMATICS (CISP-BMEI), 2017,
  • [2] Towards Robust and Effective Trust Management for Security: A Survey
    Wang, Dongxia
    Muller, Tim
    Liu, Yang
    Zhang, Jie
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 511 - 518
  • [3] Smartphone security: understanding smartphone users' trust in information security management
    Jang, Yu-Teng
    Chang, Shuchih Ernest
    Tsai, Yi-Jey
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (09) : 1313 - 1321
  • [4] Management and electronic information security: requirements for effective document management in Brazil
    Zanon, Sandra Buth
    [J]. BIBLIOS-REVISTA DE BIBLIOTECOLOGIA Y CIENCIAS DE LA INFORMACION, 2014, (56): : 69 - 79
  • [5] Trust: An element of information security
    Flowerday, Stephen
    von Solms, Rossouw
    [J]. SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 87 - +
  • [6] Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment
    Toumi, Hicham
    Marzak, Bouchra
    Talea, Amal
    Eddaoui, Ahmed
    Talea, Mohamed
    [J]. INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2017, 4 (03): : 70 - 74
  • [7] Counterfeit goods fraud: an account of its financial management
    Georgios A. Antonopoulos
    Alexandra Hall
    Joanna Large
    Anqi Shen
    [J]. European Journal on Criminal Policy and Research, 2020, 26 : 357 - 378
  • [8] Security and Trust Management in MANET
    Singh, Akash
    Maheshwari, Manish
    Nikhil
    Kumar, Neeraj
    [J]. INFORMATION TECHNOLOGY AND MOBILE COMMUNICATION, 2011, 147 : 384 - 387
  • [9] Counterfeit goods fraud: an account of its financial management
    Antonopoulos, Georgios A.
    Hall, Alexandra
    Large, Joanna
    Shen, Anqi
    [J]. EUROPEAN JOURNAL ON CRIMINAL POLICY AND RESEARCH, 2020, 26 (03) : 357 - 378
  • [10] A Layered Trust Information Security Architecture
    Albuquerque, Robson De Oliveira
    Garcia Villalba, Luis Javier
    Sandoval Orozco, Ana Lucila
    Buiati, Fabio
    Kim, Tai-Hoon
    [J]. SENSORS, 2014, 14 (12): : 22754 - 22772