Open Access. Powered by Scholars. Published by Universities.®

Accounting Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Accounting

Cryptocurrency Fraud: A Look Into The Frontier Of Fraud, Stafford C. Baum Nov 2018

Cryptocurrency Fraud: A Look Into The Frontier Of Fraud, Stafford C. Baum

Honors College Theses

This research project was conducted to look into what sort of frauds can be committed to steal unsuspecting investors’ cryptocurrencies. The inspiration for this research came in the form of the fact that millions of dollars are lost to cryptocurrency fraud each day, and many of these frauds are successful due to the public’s naivete towards the dangers of investing in cryptocurrencies. After researching many different cryptocurrency fraud cases, the frauds could be categorized into four major categories. These categories include Ponzi schemes, fake initial coin offering schemes, pump and dump schemes as well as cryptocurrency theft.


Unexpected Connections: Full Issue Of Volume 1, Issue 3, Marianna E. Richardson Dec 2017

Unexpected Connections: Full Issue Of Volume 1, Issue 3, Marianna E. Richardson

Marriott Student Review

Unexpected Connections is the Fall 2017 Issue of Marriott Student Review.


Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman Jan 2012

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman

Lawrence J. Trautman Sr.

In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …