{"id":144,"date":"2015-01-06T12:11:34","date_gmt":"2015-01-06T17:11:34","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5208sp2015\/?page_id=144"},"modified":"2020-01-16T10:59:30","modified_gmt":"2020-01-16T15:59:30","slug":"class-materials","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/class-materials\/","title":{"rendered":"Class Materials"},"content":{"rendered":"<h2>Required Texts (All texts are available through various resellers including Temple University&#8217;s Bookstore.)<\/h2>\n<table style=\"width: 136%;height: 1567px\" border=\"1\" cellspacing=\"1\" cellpadding=\"1\">\n<tbody>\n<tr style=\"height: 77px\">\n<td style=\"width: 1000px;height: 77px\" colspan=\"2\">\n<div class=\"a-section a-spacing-none\">\n<h2 class=\"a-spacing-none\"><span class=\"a-size-extra-large\">Textbooks and ACL Labs<\/span><\/h2>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 188px\">\n<td style=\"width: 146.3px;height: 188px\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-4398\" src=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/12\/Fraud-Examination-6th-Edition-240x300.jpg\" alt=\"\" width=\"240\" height=\"300\" srcset=\"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/12\/Fraud-Examination-6th-Edition-240x300.jpg 240w, https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/12\/Fraud-Examination-6th-Edition.jpg 400w\" sizes=\"auto, (max-width: 240px) 100vw, 240px\" \/><\/td>\n<td style=\"width: 848.7px;height: 188px\">\n<div class=\"a-section a-spacing-none\">\n<h2 id=\"title\" class=\"a-spacing-none\"><span id=\"productTitle\" class=\"a-size-extra-large\">Fraud Examination 6th Edition<\/span><\/h2>\n<p>by W. Steve Albrecht (Author), Chad O. Albrecht (Author), Conan C. Albrecht (Author), Mark F. Zimbelman (Author)<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 213px\">\n<td style=\"width: 146.3px;height: 213px\"><a href=\"http:\/\/community.mis.temple.edu\/mis5208sp2016\/files\/2015\/01\/coderre1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1586 aligncenter\" src=\"http:\/\/community.mis.temple.edu\/mis5208sp2016\/files\/2015\/01\/coderre1-208x300.jpg\" alt=\"coderre\" width=\"225\" height=\"325\" \/><\/a><\/td>\n<td style=\"width: 848.7px;height: 213px\">\n<h2 id=\"title\" class=\"a-size-large a-spacing-none\"><span id=\"ebooksProductTitle\" class=\"a-size-extra-large a-text-bold\">Computer Aided Fraud Prevention and Detection: A Step by Step Guide<\/span> <span id=\"bookEdition\" class=\"a-size-large a-color-secondary a-text-normal\">1st Edition<\/span><\/h2>\n<p><a href=\"http:\/\/www.amazon.com\/Computer-Aided-Fraud-Prevention-Detection-ebook\/dp\/B0062O7ISA\/ref=sr_1_7?ie=UTF8&amp;qid=1451234381&amp;sr=8-7&amp;keywords=coderre\" target=\"_blank\" rel=\"noopener noreferrer\">by David Coderre (Author)<\/a><\/td>\n<\/tr>\n<tr style=\"height: 77px\">\n<td style=\"width: 1000px;height: 77px\" colspan=\"2\">\n<h2>ACL Videos<\/h2>\n<\/td>\n<\/tr>\n<tr style=\"height: 380px\">\n<td style=\"width: 1000px;height: 380px\" colspan=\"2\">\n<table style=\"width: 1000px\" border=\"1\" cellspacing=\"5\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td style=\"width: 200px\"><div style=\"width: 320px;\" class=\"wp-video\"><!--[if lt IE 9]><script>document.createElement('video');<\/script><![endif]-->\n<video class=\"wp-video-shortcode\" id=\"video-144-1\" width=\"320\" height=\"180\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-1-What-is-ACL.mp4?_=1\" \/><a href=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-1-What-is-ACL.mp4\">http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-1-What-is-ACL.mp4<\/a><\/video><\/div><\/td>\n<td style=\"width: 200px\"><div style=\"width: 320px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-144-2\" width=\"320\" height=\"180\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-2-Importing-Data.mp4?_=2\" \/><a href=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-2-Importing-Data.mp4\">http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-2-Importing-Data.mp4<\/a><\/video><\/div><\/td>\n<td style=\"width: 200px\"><div style=\"width: 320px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-144-3\" width=\"320\" height=\"180\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-3-Defining-Fields.mp4?_=3\" \/><a href=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-3-Defining-Fields.mp4\">http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-3-Defining-Fields.mp4<\/a><\/video><\/div><\/td>\n<td style=\"width: 200px\"><div style=\"width: 320px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-144-4\" width=\"320\" height=\"180\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-4-Classifying-and-Summarizing-Data.mp4?_=4\" \/><a href=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-4-Classifying-and-Summarizing-Data.mp4\">http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-4-Classifying-and-Summarizing-Data.mp4<\/a><\/video><\/div><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 200px\"><div style=\"width: 320px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-144-5\" width=\"320\" height=\"180\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-5-Sorting-Extracting-and-Exporting-Data.mp4?_=5\" \/><a href=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-5-Sorting-Extracting-and-Exporting-Data.mp4\">http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-5-Sorting-Extracting-and-Exporting-Data.mp4<\/a><\/video><\/div><\/td>\n<td style=\"width: 200px\"><div style=\"width: 320px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-144-6\" width=\"320\" height=\"180\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-6-Joining-Data.mp4?_=6\" \/><a href=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-6-Joining-Data.mp4\">http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-6-Joining-Data.mp4<\/a><\/video><\/div><\/td>\n<td style=\"width: 200px\"><div style=\"width: 320px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-144-7\" width=\"320\" height=\"180\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-7-Age-and-Stratify-Data.mp4?_=7\" \/><a href=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-7-Age-and-Stratify-Data.mp4\">http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-7-Age-and-Stratify-Data.mp4<\/a><\/video><\/div><\/td>\n<td style=\"width: 200px\"><div style=\"width: 320px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-144-8\" width=\"320\" height=\"180\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-8-Sample.mp4?_=8\" \/><a href=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-8-Sample.mp4\">http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2018\/01\/Introduction-to-ACL-Analytics-Module-8-Sample.mp4<\/a><\/video><\/div><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 200px\" colspan=\"4\">Iv, K. (2015). Introduction to Audit Command Language. YouTube.Com: YoutTube.Com.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr style=\"height: 77px\">\n<td style=\"width: 1000px;height: 77px\" colspan=\"2\">\n<h2>\u00a0Credit Card Fraud Videos (Source: Youtube.com)<\/h2>\n<\/td>\n<\/tr>\n<tr style=\"height: 200px\">\n<td style=\"width: 1000px;height: 200px\" colspan=\"2\">\n<table>\n<tbody>\n<tr>\n<td><div style=\"width: 320px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-144-9\" width=\"320\" height=\"180\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2015\/01\/How-credit-card-skimmers-work.mp4?_=9\" \/><a href=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2015\/01\/How-credit-card-skimmers-work.mp4\">http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2015\/01\/How-credit-card-skimmers-work.mp4<\/a><\/video><\/div><\/td>\n<td><div style=\"width: 320px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-144-10\" width=\"320\" height=\"180\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2015\/01\/Chip-PIN-Fraud-Explained-Computerphile.mp4?_=10\" \/><a href=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2015\/01\/Chip-PIN-Fraud-Explained-Computerphile.mp4\">http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2015\/01\/Chip-PIN-Fraud-Explained-Computerphile.mp4<\/a><\/video><\/div><\/td>\n<td><div style=\"width: 320px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-144-11\" width=\"320\" height=\"180\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2015\/01\/BASH-USB-Credit-Card-Swiper-Script-Code-for-Magnetic-Stripe-HID-Linux-Shell.mp4?_=11\" \/><a href=\"http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2015\/01\/BASH-USB-Credit-Card-Swiper-Script-Code-for-Magnetic-Stripe-HID-Linux-Shell.mp4\">http:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2015\/01\/BASH-USB-Credit-Card-Swiper-Script-Code-for-Magnetic-Stripe-HID-Linux-Shell.mp4<\/a><\/video><\/div><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Websites<\/h2>\n<table style=\"width: 1000px\" border=\"1\" cellspacing=\"1\" cellpadding=\"1\">\n<tbody>\n<tr>\n<td style=\"width: 15%\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-3865 size-medium\" src=\"http:\/\/community.mis.temple.edu\/mis5208sp18\/files\/2015\/01\/ACFE-300x144.png\" alt=\"\" width=\"300\" height=\"144\" srcset=\"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2015\/01\/ACFE-300x144.png 300w, https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2015\/01\/ACFE.png 478w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/td>\n<td style=\"width: 85%\">\n<h2>Association of Certified Fraud Examiners<\/h2>\n<p>We are the world&#8217;s largest anti-fraud organization and premier provider of anti-fraud training and education.<\/p>\n<ul>\n<li><a href=\"http:\/\/www.acfe.com\/cfe-membership.aspx?utm_source=acfehomepage&amp;utm_campaign=whatsacfe&amp;utm_medium=link\">What&#8217;s a CFE?<\/a><\/li>\n<li><a href=\"http:\/\/www.acfe.com\/getting-started.aspx?utm_source=acfehomepage&amp;utm_campaign=learnaboutmembership&amp;utm_medium=link\">Learn About Membership<\/a><\/li>\n<li><a href=\"http:\/\/www.acfe.com\/become-cfe-qualifications.aspx?utm_source=acfehomepage&amp;utm_campaign=4keysteps&amp;utm_medium=link\">4 Key Steps to Certification<\/a><\/li>\n<\/ul>\n<p><a class=\"btn btn-success\" href=\"http:\/\/www.acfe.com\/joinnow.aspx?utm_source=acfehomepage&amp;utm_campaign=jointheacfe&amp;utm_medium=button\">Join the ACFE<\/a><\/p>\n<div class=\"mission\"><a class=\"btn btn-success\" href=\"http:\/\/www.acfe.com\/renew\/?utm_source=acfehomepage&amp;utm_campaign=renewmembership&amp;utm_medium=button\">Renew Membership<\/a><\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Audit\u00a0Tools<\/h2>\n<table style=\"width: 1000px\" border=\"1\" cellspacing=\"1\" cellpadding=\"1\">\n<tbody>\n<tr>\n<td style=\"width: 15%\"><a href=\"http:\/\/community.mis.temple.edu\/mis5208sp2016\/files\/2015\/01\/ACL-Logo.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1589 aligncenter\" src=\"http:\/\/community.mis.temple.edu\/mis5208sp2016\/files\/2015\/01\/ACL-Logo.png\" alt=\"ACL-Logo\" width=\"225\" height=\"135\" \/><\/a><\/td>\n<td style=\"width: 85%\"><a href=\"https:\/\/www.wegalvanize.com\/highbond\/\">Highbond &#8211; Audit Control Language &#8211; \u00a0(Windows Only)<\/a><br \/>\n<strong>Note:<\/strong> MAC users first install <a href=\"https:\/\/e5.onthehub.com\/WebStore\/OfferingDetails.aspx?o=bbc27225-0657-e511-9410-b8ca3a5db7a1&amp;ws=933e35a0-db9b-e011-969d-0030487d8897&amp;vsro=8\" target=\"_blank\" rel=\"noopener noreferrer\">VMWare Fusion<\/a>, Windows 7 or 10,\u00a0and then ACL.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Cybersecurity Forensic Tools<\/h2>\n<table style=\"width: 1000px\" border=\"1\" cellspacing=\"1\" cellpadding=\"1\">\n<tbody>\n<tr>\n<td style=\"width: 15%\">\u00a0<img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-4200\" src=\"http:\/\/community.mis.temple.edu\/mis5208sp18\/files\/2015\/01\/sift-290x300.png\" alt=\"\" width=\"290\" height=\"300\" srcset=\"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2015\/01\/sift-290x300.png 290w, https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/files\/2015\/01\/sift.png 302w\" sizes=\"auto, (max-width: 290px) 100vw, 290px\" \/><\/td>\n<td style=\"width: 85%\">\n<h3>SIFT Workstation<\/h3>\n<p>The SIFT Workstation is a group of free open-source incident response and forensic tools designed to perform detailed digital forensic examinations in a variety of settings. It can match any current incident response and forensic tool suite. SIFT demonstrates that advanced incident response capabilities and deep dive digital forensic techniques to intrusions can be accomplished using cutting-edge open-source tools that are freely available and frequently updated.<\/p>\n<p>https:\/\/digital-forensics.sans.org\/community\/downloads#overview<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>General Purpose Tools<\/h2>\n<table style=\"width: 1000px\" border=\"1\" cellspacing=\"1\" cellpadding=\"1\">\n<tbody>\n<tr>\n<td style=\"width: 15%\"><a href=\"http:\/\/community.mis.temple.edu\/mis5208sp2016\/files\/2015\/01\/VMware_logo_gry_RGB_300dpi.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1592 aligncenter\" src=\"http:\/\/community.mis.temple.edu\/mis5208sp2016\/files\/2015\/01\/VMware_logo_gry_RGB_300dpi-300x105.jpg\" alt=\"LOGO1\" width=\"225\" height=\"80\" \/><\/a><\/td>\n<td style=\"width: 85%\">\u00a0<a href=\"https:\/\/my.vmware.com\/web\/vmware\/free#desktop_end_user_computing\/vmware_workstation_player\/12_0\" target=\"_blank\" rel=\"noopener noreferrer\">Download VMware Workstation Player<\/a>\u00a0&#8211; used for Linux systems that need to run Windows.<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 15%\"><a href=\"http:\/\/community.mis.temple.edu\/mis5208sp2016\/files\/2015\/01\/windows-logo.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1582 aligncenter\" src=\"http:\/\/community.mis.temple.edu\/mis5208sp2016\/files\/2015\/01\/windows-logo-300x269.png\" alt=\"windows-logo\" width=\"199\" height=\"178\" \/><\/a><\/td>\n<td style=\"width: 85%\">If you have a Mac or Linux machine you will need to run Windows in a VM to use this software. Temple students are entitled to one copy each of the following software:<\/p>\n<ul>\n<li>Windows 7 or 10<\/li>\n<li>Microsoft Office<\/li>\n<\/ul>\n<p>See the following Temple Website: <a href=\"https:\/\/computerservices.temple.edu\/microsoft-work-home-program\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Work At Home<\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 15%\">\n<h3 style=\"text-align: center\">\u00a0TEMPLE SOFTWARE DOWNLOAD PAGE<\/h3>\n<\/td>\n<td style=\"width: 85%\">\n<p style=\"font-weight: 400\">Explanation page:\u00a0\u00a0<a href=\"http:\/\/community.mis.temple.edu\/technology\/get-microsoft-software\/\">http:\/\/community.mis.temple.edu\/technology\/get-microsoft-software\/<\/a><\/p>\n<p style=\"font-weight: 400\">Download Login page:\u00a0\u00a0<a href=\"http:\/\/e5.onthehub.com\/WebStore\/ProductsByMajorVersionList.aspx?ws=933e35a0-db9b-e011-969d-0030487d8897&amp;vsro=8\">http:\/\/e5.onthehub.com\/WebStore\/ProductsByMajorVersionList.aspx?ws=933e35a0-db9b-e011-969d-0030487d8897&amp;vsro=8<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Security Concerns<\/h2>\n<h3>Tech Bits: Remove Hidden Information in Office Files<\/h3>\n<p>You&#8217;ve worked hard and got feedback on an important document for your class or job and are now ready to submit it.<\/p>\n<p>Be aware that unless you take precautions, you can easily include information that you do not want to make public. This can include revisions and review comments incorporated using the Track Changes feature, as well as personal metadata that Microsoft automatically appends to documents. Depending on the content, this information could place you in a compromising or embarrassing position.<\/p>\n<p>Before distributing final electronic copies of your documents, get into the habit of making sure that review comments and hidden information are removed. To learn how, see <a href=\"https:\/\/listserv.temple.edu:8443\/trk\/click?ref=zw8jagmw2_0-699x3f2dx01158&amp;\">Removing hidden information from Microsoft Office files<\/a>.<\/p>\n<p>Have suggestions or feedback? Reply to this message or to <a href=\"mailto:templetech@temple.edu\">templetech@temple.edu<\/a>.<\/p>\n<p><a href=\"https:\/\/listserv.temple.edu:8443\/trk\/click?ref=zw8jagmw2_0-699x3656x01158&amp;\" target=\"_blank\" rel=\"noopener noreferrer\">Tech Bits Archives<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Required Texts (All texts are available through various resellers including Temple University&#8217;s Bookstore.) Textbooks and ACL Labs Fraud Examination 6th Edition by W. Steve Albrecht (Author), Chad O. Albrecht (Author), Conan C. Albrecht (Author), Mark F. Zimbelman (Author) &nbsp; Computer Aided Fraud Prevention and Detection: A Step by Step Guide 1st Edition by David Coderre [&hellip;]<\/p>\n","protected":false},"author":21825,"featured_media":0,"parent":0,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"full-width-content","footnotes":""},"class_list":{"0":"post-144","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/pages\/144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/users\/21825"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/comments?post=144"}],"version-history":[{"count":8,"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/pages\/144\/revisions"}],"predecessor-version":[{"id":4502,"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/pages\/144\/revisions\/4502"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5208sec001spring2020\/wp-json\/wp\/v2\/media?parent=144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}