A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Internet banking fraud alertness in the banking sector: South Africa
2017
Banks and Bank Systems
themes or patterns to provide an in-depth understanding of internet banking fraud alertness in the banking sector. ...
and circumvent them, and for the banking institutions to invest more in the provision of internet banking fraud information to the general public. ...
the responsibility of criminal location in the occurrence of criminal events perpetrated online. ...
doi:10.21511/bbs.12(1-1).2017.07
fatcat:f35fpc7ya5asvct6zuaheyukdy
Identity Theft and E-Fraud as Critical CRM Concerns
2005
International Journal of Enterprise Information Systems
Fraud and identity theft have been increasing with the use of e-commerce. ...
In the U.S. alone, it has been estimated that victims may spend on average $1,500 in out-of-pocket expenses and an average of 175 hours in order to resolve the many problems caused by such identity thieves ...
For example, research by Visa USA, which helped to develop the CyberSource fraud prevention software, revealed that credit card fraud on the Web is three times as likely as it is for all other forms of ...
doi:10.4018/jeis.2005040102
fatcat:be672q42ffd2dfacyvsvnyytbm
Inside Abuse: A Threat to Banks' Stability
2021
The International Journal of Business & Management
Also, appropriate policies aimed at devising measures for curbing or checkmating associated fraud in the use of internet/Web, and ensuring banks' stability and performance must not be overlooked by the ...
In order to provide a dynamic perspective for the study, four insider abuse related factors such as internal fraud (INSAB), automated machine fraud (ATMf), internet/Web fraud (ITWEB) and cheque fraud ( ...
The study outcome revealed that high bank deposits was primarily responsible for the high rise of fraudulent occurrences in the Nigeria's banking sector particularly management fraud. ...
doi:10.24940/theijbm/2021/v9/i7/bm2107-034
fatcat:wdfnxa7ngjgvni2okai53h64ay
Cyber-banking fraud risk mitigation conceptual model
2015
Banks and Bank Systems
In the anonymous world of the internet, online transaction fraud has also been a greatest challenge for web merchants. ...
The occurrence of each fraud type perpetrated in the banking showed that, accounting fraud is at the top with highest frequency indicating that the traditional ways of committing fraud are still being ...
doaj:64e65d130fb247a295fa678d11ca7a02
fatcat:24c7upn6pbgizeggsy64u4tdwy
Book Review of Principles of Cyber Crime
2019
Zenodo
The author mentioned in details the overall structure of the book and the categorization of each cyber offences with respect to the respective jurisdiction law. ...
The author is of the opinion that much of the research on the area of cyber-crime has been more on the criminological side rather than the doctrinal analysis. ...
. 10) Scale of the problem -The author contends that identity crime is mostly financial, difficult to record and crime statistics record the occurrence of fraud but not the methods used to commit the fraud ...
doi:10.5281/zenodo.3551763
fatcat:fttnvij42ng4pmxzpmjjqxwr6q
Risks and fraud: A theoretical approach
2021
Revista Perspectiva Empresarial
To explain fraud occurrence —under three theoretical models— and apply it to the organization's hierarchy. Methodology. ...
Risks were considered under the umbrella of three fraud theories: Triangle of Cressey; Diamond of Wolfe and Hermanson; and Pentagon of Crowe. Results. ...
basic Internet connectivity the first level of the fraud. ...
doi:10.16967/23898186.712
fatcat:psgeoytuf5ebziadqqqxyuukyi
Research trends in cybercrime victimization during 2010–2020: a bibliometric analysis
2022
SN Social Sciences
The USA and its authors and institutions were likely to connect widely and took a crucial position in research of cybercrime victimization. ...
Future research is suggested to concern more about sample of the elder and collect data in different countries which are not only European countries or the USA. ...
RQ4 What are top keywords, co-occurrences and research gaps in the field of cybercrime victimization? ...
doi:10.1007/s43545-021-00305-4
pmid:35013728
pmcid:PMC8732210
fatcat:67u2n2h5czhl3gb6zwdscmg6bu
White Collar Crimes : A Study in the context of Classification, Causation and Preventive Measures
2018
Contemporary Social Sciences
With the development of society, the nature of the crime also changed in different dimensions from common crimes to special crimes which remained unattended. ...
The crime in its nature remains undetected from the general public and criminal justice administrators. ...
This type of fraud cases is also prevailing through the Internet and thus considered as one of the top cases of Internet fraud. ...
doi:10.29070/27/58311
fatcat:g6ibu5rb6bdlbn7okvuyupgntm
Learn to Detect Phishing Scams Using Learning and Ensemble ?Methods
2007
2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops
Experimental results show that the proposed method can detect 94.4% of scam emails correctly, while only 0.08% of legitimate emails are classified as scams. ...
In a phishing attack scenario, attacker deceives users by a fake email which is called scam. In this paper we employ three different learning methods to detect phishing scams. ...
Only in 2004, more than 57 million users in USA received scams of phishing and almost 2 million of them have become the victims of such attacks [2] . ...
doi:10.1109/wiiatw.2007.4427596
dblp:conf/iat/SaberiVM07
fatcat:2dunjbsz3ffqlazw7puzwzuhfa
Learn to Detect Phishing Scams Using Learning and Ensemble ?Methods
2007
2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops
Experimental results show that the proposed method can detect 94.4% of scam emails correctly, while only 0.08% of legitimate emails are classified as scams. ...
In a phishing attack scenario, attacker deceives users by a fake email which is called scam. In this paper we employ three different learning methods to detect phishing scams. ...
Only in 2004, more than 57 million users in USA received scams of phishing and almost 2 million of them have become the victims of such attacks [2] . ...
doi:10.1109/wi-iatw.2007.79
fatcat:pdqkhztfzzfglicv5jrzgjlelu
FEATURES AND CONSEQUENCES OF MANIFESTATION OF INFORMATION RISKS AT THE GLOBAL LEVEL IN MODERN CONDITIONS
2020
Proceedings of the O S Popov ОNAT
It is shown that this can be determined by: causes and peculiarities of their occurrence and emergence; specific activities in order to reduce the likelihood of their occurrence; exclusion, or mitigation ...
Recommendations have been offered in order to supplement the existing global risks with a separate group - global information risks and to the list of risks such as "massive fraud and data theft", "large-scale ...
The Internet Live Stats database [18] , which can be seen in a dynamic format at the appropriate time, indicates the continuous growth in the number of new Internet users, the number of sites, blogs, ...
doi:10.33243/2518-7139-2020-1-1-108-119
fatcat:62xtedet7ralzg5hl4nkmersgy
THE EFFECT OF ENVIRONMENT CONTROL, RISK ASSESSMENT AND MONITORING ON THE PREVENTION OF FRAUD (A SURVEY AT DINAS PENDIDIKAN ACEH PROVINCE)
2019
Jurnal Ilmiah Mahasiswa Ekonomi Akuntansi
The purpose of this research is to examine the effect of environment control, risk assessment, and monitoring on the prevention of fraud at Dinas Pendidikan Aceh Province. ...
The results of this research shown that simultaneously and partially, the environment control, risk assessment, and monitoring affected on the prevention of fraud at Dinas Pendidikan Aceh Province. ...
Kurniawati (2012) , (ACFE) Association of Certified Fraud Examinations is one of the associations in the USA which has major activities in the prevention and eradication of fraud. ...
doi:10.24815/jimeka.v4i4.15343
fatcat:5fuuntumgzby5jo55e4tymprci
Analyzing Cyber Trends in Online Financial Frauds using digital Forensics Techniques
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Online financial frauds are one of the leading issues in the fields of digital forensics and cyber-security today. ...
In this paper, we will try to implement an online financial fraud investigation using the digital forensics tool: Autopsy. ...
The terminologies are: • Online Frauds and Financial Frauds: Online frauds refer to the usage of Internet services or other open-source software requiring Internet access to frame users or to otherwise ...
doi:10.35940/ijitee.i7185.079920
fatcat:wdw2fbwhx5cm5p3gegiilq2w4m
Is digital crime victimization increasing in Iceland – may the Me-too movement influence how victimization is experienced
2020
Nordisk Tidsskrift for Kriminalvidenskab
Slander and consumer fraud were the most common types of victimization. Respondents between the ages of 30 to 44 were most likely to have been victimized. ...
The increase was most notable in regards to the sexual harassment of women. ...
This figure was the highest percentage of regular internet users in Europe in 2014. ...
doi:10.7146/ntfk.v107i1.124800
fatcat:3bubvgjozjfr7bo76n6ws52liq
RISKS OF FRAUD IN THE FIELD OF FINANCIAL SERVICES
[chapter]
2020
Economic development: global trends and national peculiarities
The article considers the risks of fraud that arise in the field of financial services in the context of technological and information changes occurring in modern society. ...
The risks of fraud in the field of nonbanking financial services have been studied. The sources of fraud in financial companies, credit unions and insurance companies have been identified. ...
The USA estimates its losses over the Internet at 400 billion USD, which is three times the annual cost of education. ...
doi:10.30525/978-9934-588-61-7-4
fatcat:y4gblrikqvdjhgf2o5hoxvynp4
« Previous
Showing results 1 — 15 out of 3,913 results