^
+ Follow EQUITY FUNDING Tag
Array
(
    [results] => Array
        (
            [0] => Array
                (
                    [ArticleID] => 82778
                    [Title] => Be clever or be stupid
                    [Summary] => 

The opportunities for devil’s play increase as the computer wends its way into our daily lives. Ironically, it’s extremely difficult to detect computer theft except...

[DatePublished] => 2008-09-01 00:00:00 [ColumnID] => 134336 [Focus] => 0 [AuthorID] => 1420637 [AuthorName] => Josefina T. Lichauco [SectionName] => Lifestyle Business [SectionUrl] => business-life [URL] => ) [1] => Array ( [ArticleID] => 318060 [Title] => Cybernetic tomfoolery and crimes [Summary] => A"computer crime" normally requires breaking into a computer system, and includes those crimes where knowledge of a computer system is a necessary element for the commission of the crime. Internet fraud usually involves stealing e-data such as credit card numbers, or transmitting funds to a numbered account in another country. And the remaining consists of all other varieties, such as infringement, harassment, treason, industrial espionage, etc. [DatePublished] => 2006-01-23 00:00:00 [ColumnID] => 134336 [Focus] => 0 [AuthorID] => 1352904 [AuthorName] => HINDSIGHT By Josefina T. Lichauco [SectionName] => Lifestyle Business [SectionUrl] => business-life [URL] => ) ) )
EQUITY FUNDING
Array
(
    [results] => Array
        (
            [0] => Array
                (
                    [ArticleID] => 82778
                    [Title] => Be clever or be stupid
                    [Summary] => 

The opportunities for devil’s play increase as the computer wends its way into our daily lives. Ironically, it’s extremely difficult to detect computer theft except...

[DatePublished] => 2008-09-01 00:00:00 [ColumnID] => 134336 [Focus] => 0 [AuthorID] => 1420637 [AuthorName] => Josefina T. Lichauco [SectionName] => Lifestyle Business [SectionUrl] => business-life [URL] => ) [1] => Array ( [ArticleID] => 318060 [Title] => Cybernetic tomfoolery and crimes [Summary] => A"computer crime" normally requires breaking into a computer system, and includes those crimes where knowledge of a computer system is a necessary element for the commission of the crime. Internet fraud usually involves stealing e-data such as credit card numbers, or transmitting funds to a numbered account in another country. And the remaining consists of all other varieties, such as infringement, harassment, treason, industrial espionage, etc. [DatePublished] => 2006-01-23 00:00:00 [ColumnID] => 134336 [Focus] => 0 [AuthorID] => 1352904 [AuthorName] => HINDSIGHT By Josefina T. Lichauco [SectionName] => Lifestyle Business [SectionUrl] => business-life [URL] => ) ) )
abtest
Are you sure you want to log out?
X
Login

Philstar.com is one of the most vibrant, opinionated, discerning communities of readers on cyberspace. With your meaningful insights, help shape the stories that can shape the country. Sign up now!

Get Updated:

Signup for the News Round now

FORGOT PASSWORD?
SIGN IN
or sign in with