TY - JOUR AB - Computer security is maintained in many ways. New systems are developed with an eye towards protecting against known techniques for bypassing system controls. New methods of fraud, especially in point of sale systems, appear in spite of these protections. Consequently, there is a continuing need to examine how systems are used in practice and to implement new controls to prevent the incidence and recurrence of fraud. This paper cites examples of new frauds, suggests general techniques for protecting against the original appearance and recurrence of such frauds, and proposes that the maintenance of computer systems include continuing attention to these controls. VL - 6 IS - 4 SN - 0968-5227 DO - 10.1108/09685229810232418 UR - https://doi.org/10.1108/09685229810232418 AU - Grupe Fritz H. AU - Hensley James M. AU - Yamamura Jeanne H. PY - 1998 Y1 - 1998/01/01 TI - Watching systems in action: security at the periphery T2 - Information Management & Computer Security PB - MCB UP Ltd SP - 155 EP - 159 Y2 - 2024/04/23 ER -