Response to the following problem:
When an employee of an organization attempts to conduct fraud through the misuse of a computer-based system, it is called internal computer fraud. Internal computer fraud concerns each of the following activities:
1. Input manipulation
2. Program manipulation
3. Output manipulation.
Make sure you use enough details to support your answer.