Journal articles on the topic 'Internet fraud Prevention'

To see the other types of publications on this topic, follow the link: Internet fraud Prevention.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Internet fraud Prevention.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Samoilenko, Olena, and Kateryna Titunina. "Internet fraud: technologies of performance, ways of counteraction and prevention." ScienceRise: Juridical Science, no. 2(16) (June 30, 2021): 65–70. http://dx.doi.org/10.15587/2523-4153.2021.235769.

Full text
Abstract:
The article proves that the separation of technologies for committing fraud on the Internet allows you to determine the causal complexes. As a result, it is possible to effectively influence the prevention and counteraction of the corresponding type of crime. The author concludes that it is necessary to introduce into the practice of law enforcement and other government agencies effective tools for preventing and combating Internet fraud. He sees such a tool as outreach activities and modes of action that will block the determinants of criminal behavior in cyberspace. In order to concretize the specified means of prevention, it also deepens the theoretical basis regarding the system for preventing Internet fraud. So, the author comes to the conclusion that counteraction is a system of measures and methods of activity not only of law enforcement agencies, but also of other state and non-state bodies, while among these measures there are measures to prevent certain types of crimes. The article indicates that in the process of implementing a certain type of cybercrimes by criminals, they talk about the technologies of criminal activity as complexes of interrelated crimes, united by a single criminal purpose. For the commission of Internet fraud in the technology of criminal activity, there are typically ways of committing crimes in the use of computers, systems and computer networks and telecommunication networks (provided for in Section XVI of the Criminal Code of Ukraine) and Art. 200 of the Criminal Code of Ukraine. As a result of the analysis of the materials of the forensic practice of investigating fraud on the Internet, two main technologies have been identified: 1) the seizure of funds using phishing sites (the methods of reporting false information from the victim and its content have been updated) 2) the seizure of funds using a bank payment card and / or ATM (the variability of the method of manipulating information has been updated)
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Neha, Dhiraj Sharma, and Arun Aggarwal. "Internet of Things and Banking Frauds-Friends or Foes? A Study of Indian Public and Private Sector Banks." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2596–604. http://dx.doi.org/10.1166/jctn.2020.8935.

Full text
Abstract:
Ever since the introduction of banking business in this complex structure of human living, banks are believed to be one of the institutions which are recommended for trustworthiness and treasure repositories for the general public. These are the institutions which were and are still trusted for their veracity by the civilians of every nation. However, with the passage of time the increase in the technology results in the virtue of banking organization which seems to be under a big question mark and the main reason of this integrity loss of banking organizations in the present era is an epidemic known as fraud. Moreover, bank frauds are one of the crucial areas to be resolved from the angle of internet of things which includes many of the technological loopholes. Therefore, the present study aims to provide an appropriate solution to the problem of fraud in the present scenario of increasing trends of Internet of things in the banking industry especially in Indian context. The study discussed about the present fraud preventive measures used by the public and private sector banks in India and has also provided an elaborated model for fraud risk management which gives a comprehensive structure to be utilized in regard to the fraud prevention in banks.
APA, Harvard, Vancouver, ISO, and other styles
3

Godana, Hillary, Samson Wokabi Mwangi, and Panuel Mwaeke. "Security Managers’ Perspectives on Challenges Facing Commercial Banks in Preventing Frauds in Nairobi City County, Kenya." Advances in Social Sciences Research Journal 9, no. 12 (December 11, 2022): 1–12. http://dx.doi.org/10.14738/assrj.912.13539.

Full text
Abstract:
This paper uses data collected for an MA Thesis on Security Managers’ perspectives on challenges facing Commercial Banks in Preventing Frauds in Nairobi County, Kenya. The study was motivated by continued rise of frauds in commercial banks in the county, despite the extensive mitigation measures put in place to deter frauds. The study established the nature of frauds prevalent in Kenya commercial banks in Nairobi County, assessed the determinants of fraud in Kenya commercial banks, determined Bank Security Managers Capacity in fraud prevention, and finally examined Security Managers perceptions on the relationship between the existing preventive measures and emerging Bank fraud trends in Nairobi County, Kenya. The study was grounded by the Fraud Triangle concept and adopted a case study qualitative design. The main method of data collection was the interview. The study comprises of 50 respondents: 39 main respondents and 11 Key Informants. The census sampling Method was used to select respondents for the study. Data was transcribed and the transcriptions coded using NVIVO software. The study established three major types of frauds; Management frauds, Non-Management Frauds and Third Party Frauds, all said to be on an increase trend. According to this study fraud rates are higher at Nairobi County (90%), than at other counties (70%). Mobile and Internet banking frauds were found to be the new threats challenging commercial banks because by their very nature because of technological sophistication, were committed from geographical location including outside the country. The study established two major determinants of frauds; Fraudsters Perspectives and institutional related factors. Major fraudster’s perspectives include; condition under which people can rationalize their prospective crimes, opportunities to commit crimes, perceived suitability of targets for fraud, technical ability of the fraudster, the possibility and likelihood of the fraud being discovered and the nature of consequences. Institutional factors that influence fraud prevalence include; weak accounting and control systems, and ineffective internal audits. According to the study, technological sophistication has outsmarted many security managers in the banking sector, because of their technological skills gaps in Fraud forensics. Finally, the study established the relationship between existing preventive measures and emerging Bank fraud trends in Nairobi County. Major policy recommendations suggested to cut frauds at the nib include; benchmarking for best internationally recognized standards such as carrying out expected and unexpected audits, enforced internal controls, regular training of security managers, and review of commercial banks organogram that will place security managers at a position to police frauds perpetrated by management.
APA, Harvard, Vancouver, ISO, and other styles
4

Kuzmin, Yury A. "PREVENTION OF TELEPHONE FRAUD (CRIMINOLOGICAL ASPECT)." Oeconomia et Jus, no. 3 (September 30, 2022): 47–54. http://dx.doi.org/10.47026/2499-9636-2022-3-47-54.

Full text
Abstract:
The problems of committing fraud using telephone communication are updated. The relevance of issues related to the prevention of telephone fraud, first and foremost caller ID spoofing and phishing, is substantiated. The article analyzes the methods of preventing telephone fraud, such as the possibility of establishing the number of fraudsters through electronic search services, special free services, Viber and WhatsApp messengers, Sberbank Online, caller ID for incoming calls on "Avito" and "Yula", through applications for iPhone and Android, caller ID from "Kaspersky Lab" – Kaspersky Who Calls, through the Internet search engine "Yandex" and other applications. It is recommended to use the methods of victimologic counter-strategy in relation to telephone fakers, such as psychological self-defense, criticality (prudence) in their own actions (mainly those of a financial nature), safe behavior in a non-standard situation, a critical level of trust, awareness of possible risks. It is necessary to take precautions not to become a victim of telephone fraud, not to lose self-control and vigilance, to use all opportunities to check the source of telephone fraud, to report such cases to law enforcement agencies. Personal interest in maintaining personal security, the desire for self-defense and timely informing law enforcement agencies will become an obstacle to the spread of telephone fraud.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhou, Zejiong, and Li Han. "On Social Experience, Prevention Consciousness and Network Fraud of College Students in Finance and Economics Based on Survey Data." International Journal of Education and Humanities 2, no. 1 (February 26, 2022): 18–22. http://dx.doi.org/10.54097/ijeh.v2i1.239.

Full text
Abstract:
With the development of the Internet, college students suffer from network fraud in many layers, which has aroused widespread concern in the society. Based on the questionnaire survey data of the current situation of college students suffering from online fraud in financial and economic colleges, this paper uses structural equation model to analyze the relationship between social experience, prevention awareness and college students suffering from online fraud. The study found that: (1) social experience not only has a significant direct effect on college students suffering from online fraud, but also has an indirect impact on college students suffering from online fraud through the pursuit of economic independence. (2) Prevention awareness has no significant direct effect on college students suffering from online fraud. Personal information protection plays a complete intermediary role between prevention awareness and college students suffering from online fraud. Based on the research results, it is proposed to strengthen the ideological and political education of college students, improve the awareness of risk prevention, build a long-term mechanism and link the comprehensive management of departments to prevent college students from suffering from online fraud and promote the healthy growth of college students.
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Junbo, Run Su, Jinglan Xue, Mengmeng Jin, Pan Wang, Deyao Zheng, Li Chen, Xuefeng Xiang, and Jianfeng Li. "Research on the Prevention System of Telecommunication Network Fraud in Application-oriented Undergraduate Colleges." BCP Social Sciences & Humanities 20 (October 18, 2022): 76–90. http://dx.doi.org/10.54691/bcpssh.v20i.2159.

Full text
Abstract:
With the development of Internet technology, new methods of telecommunication network fraud continue to emerge. Through the questionnaire survey and data analysis of telecommunication network fraud among students in some application-oriented undergraduate colleges in Fujian, this study discusses the problems existing in the security preventing of telecommunications network fraud in application-oriented undergraduate colleges, and proposes effective ways to strengthen and improve it. It has certain reference significance for students in application-oriented undergraduate colleges to avoid telecommunication network fraud and jointly build a safe and harmonious campus environment.
APA, Harvard, Vancouver, ISO, and other styles
7

Khanineva, Olga V. "General Causes and Some Types of Fraud Committed With the Use of Information and Telecommunication Technologies in the Russian Federation." Ugolovnaya yustitsiya, no. 16 (2020): 28–31. http://dx.doi.org/10.17223/23088451/16/6.

Full text
Abstract:
The article describes the main reasons for the increase in the number of registered frauds committed in the Russian Federation over the past 4 years and provides examples of the most common types of fraud committed with the use of information and telecommunication devices. The author analyzes the reasons for committing frauds using communication facilities and information and communication technologies, with the focus on their types, ways of commission, categories of citizens most susceptible to these crimes. The author lists the most common types of fraud and their nature and proposes improvements for further activities of law enforcement officers to promote cooperation with other organizations involved in transferring and storing funds of citizens (banks) and providing communication services via the Internet (providers, companies of cellular operators) with the aim to curb the growth of crimes and achieve the highquality prevention and protection of information about citizens and their funds.
APA, Harvard, Vancouver, ISO, and other styles
8

Kiran Bala, Sakshi sharma, Meenakshi Garg, and Deeksha Verma. "Credit card fraud detection and classification by deep learning and machine learning." Global Journal of Engineering and Technology Advances 13, no. 3 (December 30, 2022): 022–27. http://dx.doi.org/10.30574/gjeta.2022.13.3.0202.

Full text
Abstract:
One of the most important contributors to the expansion and progression of a nation's economy is its banking and financial industry. In particular, over the recent past, there has been a significant increase in the utilization of credit and debit cards, whereby all customers trade transactions either digitally over the internet or physically at the stores. Here, the customers, banking institutions, and financial organizations are all being put in a difficult position by fraudulent actors. Because more recent technology is now readily available, internet banking has become an important avenue for commercial transactions. Fake banking activities and fraudulent transactions are serious problem that affects both the users' sense of safety and their trust in the system. In addition, fraudulent activities result in enormous losses because of the proliferation of sophisticated frauds such as virus infections, scams, and fake websites. These frauds are all examples of advanced fraud. This study makes three contributions toward the prevention of fraudulent activity involving credit card transactions.
APA, Harvard, Vancouver, ISO, and other styles
9

Pospíšil, Jiří, and Hana Vomáčková. "Education as a prevention of fraud." International Journal of Human Sciences 13, no. 1 (February 25, 2016): 1133. http://dx.doi.org/10.14687/ijhs.v13i1.3638.

Full text
Abstract:
A critical way of thinking developed by teachings of financial audit, accounting and taxation are necessary for any graduate in economics. Combined with ethics it is the essential prerequisite for increasing the resistance of the experts to embezzlement. The aim of this study is to ascertain whether the graduates of business schools in Czech Republic are ready to recognize and expose economic crime/fraud which they might encounter at their workplace. The readiness of the graduates is bilateral as it includes the ability "to recognize" which is discussed in terms of adequate knowledge - which should be obtained especially during the bachelor and master studies, and the willingness "to expose" which is discussed in terms of moral principles of the graduates - which should be augmented during their studies as well. The article summarizes the results of research conducted among Czech universities and their graduates. The research among the Czech universities was carried out as an analysis of the study programs provided by Czech universities and the corresponding syllabi. The research among the graduates was carried out via online questionnaire distributed to graduates through their alumni organizations. This questionnaire was accessible through the Internet from November 2014 to February 2015. During this period 264 respondents undertook the survey. We formulate two theses in this paper. First thesis states that Czech graduates are not equipped with knowledge necessary to recognize economic fraud at their workplace. Second thesis states that Czech graduates don't possess the moral incentives to expose the economic crime. While we were not able to confirm the first thesis unequivocally, we concluded that there is much to improve in the structure of the study programs of Czech universities providing business education. The second thesis was confirmed though. The suggestions we made in this paper based on the research were the following: firstly, to develop a syllabus of a new teaching subject which would incorporate the basic aspects of the advanced financial accounting, auditing, tax and business law and make such subject mandatory for all business graduates at Czech universities. Similar subject - even though less extensive/complex - shall be developed for the secondary business schools as well. Secondly, to eliminate the segmented ethics of secondary school graduates through education based on case-studies and demonstration and focus greatly on raising the ethics standards at both levels of business education.This paper is not a traditional field-based research study. Rather it is a summary/conclusive report on two interconnected research projects. The aim of this paper is to summarize the results from the former research projects and to compare andto confront the findings of these projects in the attempt to find a “common denominator” of both issues raised in the preceding research projects.
APA, Harvard, Vancouver, ISO, and other styles
10

Porechny, E. M., and V. D. Makromenko. "Some features of regional organized groups or the criminal community of mеgapolis: Socio-criminological aspect." Sociology and Law 14, no. 2 (June 28, 2022): 164–73. http://dx.doi.org/10.35854/2219-6242-2022-2-164-173.

Full text
Abstract:
The presented article is devoted to the study of the peculiarities of regional organized groups or the criminal community of megapolis (St. Petersburg and Leningrad region), the debatable nature of their socio-criminological characteristics. The article indicates possible ways to improve the effectiveness of countering and preventing crime in general, as well as crimes committed using information and telecommunication technologies, in particular. Attention is drawn to the problem of remote fraud, including Internet fraud, in terms of obtaining remote access to customers’ bank cards. It is emphasized that the effectiveness of law enforcement activities in preventing the activities of organized crime is associated with the vulnerability of existing formulations of organized groups or criminal community. The success and effectiveness of countering the activities of organized crime is largely determined at the level of early prevention.
APA, Harvard, Vancouver, ISO, and other styles
11

Pleshakova, Ekaterina Sergeevna, Sergei Timurovich Gataullin, Aleksei Viktorovich Osipov, and Pavel Gennadievich Bylevskii. "The factor of complex interaction in responding to telephone fraud." Вопросы безопасности, no. 1 (January 2023): 1–9. http://dx.doi.org/10.25136/2409-7543.2023.1.39274.

Full text
Abstract:
The subject of the study is to identify effective methods of legislative work to counteract the use by telephone fraudsters of such technical means as illegal substitution of SIM cards and Internet services for substitution of incoming call numbers. The general scientific methodology of dialectical (meaningful) logic and comparative analysis of practical problems and legislative activity of federal authorities are used. Fraud causes huge damage to society and incurs huge costs to the state. The global spread of the Internet has allowed scammers to export their activities to a fast-growing market and attract previously untapped consumers. The evolution of technologies and the spread of fraudulent approaches on the Internet have exacerbated the problems faced by victims. The results serve as evidence that when detecting and timely stopping attempts at telephone fraud (suspending suspicious transactions), legislative support and the formation of a subordinate regulatory framework are necessary for the interaction of financial organizations, telecommunications operators and law enforcement agencies. The development of smartphones and cellular networks increases the need for mobile advertising and targeted marketing. However, it also causes invisible security threats. We have found that phone fraud with fake phone numbers with a very short service life is becoming more and more popular and is being used to deceive users. The article is devoted to the consideration of the problem of legal regulation to ensure information security. As phone fraud becomes more common, it is extremely important to understand how to increase the effectiveness of prevention. Conclusions are drawn about the need to strengthen the centralization of countering intruders in order to increase the effectiveness of preventing telephone fraud, following the example of creating an interbank digital platform "Know your Customer".
APA, Harvard, Vancouver, ISO, and other styles
12

Mukhamedzhanova, A. D. "FEATURES OF THE DYNAMICS OF CYBERCRIME IN THE REPUBLIC OF KAZAKHSTAN AND ITS IMPACT ON PREVENTION ISSUES." Russian-Asian Legal Journal, no. 2 (June 30, 2022): 49–55. http://dx.doi.org/10.14258/ralj(2022)2.9.

Full text
Abstract:
The article analyzes statistical data revealing the state of crime in the field of informatization andcommunications in the Republic of Kazakhstan in the period from 2018 to 2021. Special attention is paidto offenses related to Internet fraud. The main indicators forming an idea of the state of cybercrime in thecountry are analyzed. Along with the number of registered offenses in the field of cybercrime, an analysiswas also carried out of the number of criminal cases under investigation; the number of criminal cases sentto court; the number of discontinued pre-trial investigations. Based on the analysis of the data obtained, aconclusion was made about the effectiveness of activities for the prevention of certain types of crimes in thisarea, but a negative trend in the prevention and suppression of Internet fraud was revealed. In this regard, it is proposed to strengthen measures to improve the activities of law enforcement agencies and the judicialsystem in combating crime in the field of informatization and communications.
APA, Harvard, Vancouver, ISO, and other styles
13

Kusumastuti, Dani. "FAKTOR-FAKTOR KECURANGAN AKUNTANSI DI PEMERINTAH DAERAH DAN PERAN ETIKA ISLAM DALAM PENCEGAHANNYA." el-Jizya : Jurnal Ekonomi Islam 7, no. 1 (December 26, 2019): 1–20. http://dx.doi.org/10.24090/ej.v7i1.3445.

Full text
Abstract:
Purpose - Corruption in local government is becoming increasingly prevalent. This has become an irony amid the vigorous development in the era of regional autonomy. To deal with this problem, this study is aimed to identify the factors of fraud in the local governments of Indonesia and to investigate whether the application of Islamic ethic can prevent accounting fraud. Design/methodology/approach – To achieve this goal, this study collects and compares the results of various quantitative empirical studies in various local governments throughout Indonesia that have been carried out in the past three years (2015-2017). The data will be synthesized and conclusions drawn in this study to answer research questions. The data is obtained in journals traced in several electronic media such as digital libraries, internet or library journal collections. The keywords used for search are: factors, accounting fraud, fraud, prevention and local government. Findings – The results provide evidences that indicate that accounting fraud in local goverments of Indonesia is significantly influenced by factors explained in Fraud theory. It is also proved from empirical studies that the implementation of Islamic ethic is useful to prevent fraud within local goverments in Indonesia. Research limitations/implications –The result of the paper contribute to the literature in understanding of how to prevent accounting fraud especially within the local governments in Indonesia by developing approaches based on Islamic ethics. Originality/value – Findings are useful for policy makers and local goverments to handle accounting fraud cases and enhance their accounting fraud prevention system by applying Islamic ethics.
APA, Harvard, Vancouver, ISO, and other styles
14

Sunardi, Sunardi, Abdul Fadlil, and Nur Makkie Perdana Kusuma. "Implementasi Data Mining dengan Algoritma Naïve Bayes untuk Profiling Korban Penipuan Online di Indonesia." JURNAL MEDIA INFORMATIKA BUDIDARMA 6, no. 3 (July 25, 2022): 1562. http://dx.doi.org/10.30865/mib.v6i3.3999.

Full text
Abstract:
Profiling of victims of crime is intended to facilitate the targeting of information dissemination and carry out prevention efforts. Profiling is helpful to increase the awareness of internet users against cybercrime. This study aims to create a sociodemographic profile based on online fraud victims using Instant Messengers in Indonesia based on the sociodemography of online fraud victims, namely age, gender, education level, domicile, occupation, duration of using the internet in a day, and Instant Messenger media used. The method used in this research is the descriptive statistical method, namely Data Mining using the snowball sampling method by sharing a link via WhatsApp. Participants were given a link to fill out several survey questions about the sociodemographic of the victim, such as age, gender, occupation, domicile, and online fraud that had been experienced through the IM application. The survey was created using GoogleForms and sent online via WhatsApp to participants who had been victims of online fraud. The Data Mining technique was used to analyze the responses of 1910 participants and then classified using the Naïve Bayes Algorithm. The results showed that the Naïve Bayes Algorithm has an accuracy percentage of 75.28%. The prediction model for the vulnerability of online fraud victims is a female respondent, aged 27.3 years, using Instagram and WhatsApp, currently living in Central Java Province, education background is high school, and the duration of using the internet more than eight hours a day, and status as a Student/College Student.
APA, Harvard, Vancouver, ISO, and other styles
15

Danquah, Paul, John Amoako Kani, and Dzifa Bibi. "Internet fraud: The influence of Identity Flexibility and Dissociative Anonymity." East African Journal of Information Technology 5, no. 1 (May 19, 2022): 39–52. http://dx.doi.org/10.37284/eajit.5.1.673.

Full text
Abstract:
The purpose of this paper is to investigate the influence of identity flexibility and dissociative anonymity on internet fraud, focusing on the cyber deception and theft. Four victims, three culprits, and an experimental website were used to collect data for case study analysis. The researchers employed qualitative and quantitative data analysis for the study. Content analysis of interview transcriptions and results obtained from experimental website were used as the main data collection sources and tools. This study found that victims of internet fraud were defrauded by culprits who clearly practiced the application of identity flexibility and dissociative anonymity in their illegal endeavours. Despite the authenticity of registered crime related users on the experimented website, the true/actual identity of users could not be confirmed even though their credentials were technically validated before being saved. Findings shown in the study confirm the theoretical postulate that “identity flexibility, dissociative anonymity and lack of deterrence factor in the cyberspace provides the offenders the choice to commit cybercrime”. The findings are also consistent with extant studies on the isolated studies that indicate anonymity as the trump card of most cyber criminals. Findings from culprits suggests that they make a conscious effort to satisfy all requirements but without genuine identification and credentials. Practical implications study provides some recommendations for fraud prevention on the internet. The major one is the need for practitioners and future researchers to emphasize on development of solutions that serve as a reliable check on authenticity of users as well as deterrent to all fraudulent users. This study is original, as it focuses on internet fraud that is highly pervasive as per previous research findings
APA, Harvard, Vancouver, ISO, and other styles
16

Sadeghpour, Shadi, and Natalija Vlajic. "Ads and Fraud: A Comprehensive Survey of Fraud in Online Advertising." Journal of Cybersecurity and Privacy 1, no. 4 (December 16, 2021): 804–32. http://dx.doi.org/10.3390/jcp1040039.

Full text
Abstract:
Over the last two decades, we have witnessed a fundamental transformation of the advertising industry, which has been steadily moving away from the traditional advertising mediums, such as television or direct marketing, towards digital-centric and internet-based platforms. Unfortunately, due to its large-scale adoption and significant revenue potential, digital advertising has become a very attractive and frequent target for numerous cybercriminal groups. The goal of this study is to provide a consolidated view of different categories of threats in the online advertising ecosystems. We begin by introducing the main elements of an online ad platform and its different architecture and revenue models. We then review different categories of ad fraud and present a taxonomy of known attacks on an online advertising system. Finally, we provide a comprehensive overview of methods and techniques for the detection and prevention of fraudulent practices within those system—both from the scientific as well as the industry perspective. The main novelty of our work lies in the development of an innovative taxonomy of different types of digital advertising fraud based on their actual executors and victims. We have placed different advertising fraud scenarios into real-world context and provided illustrative examples thereby offering an important practical perspective that is very much missing in the current literature.
APA, Harvard, Vancouver, ISO, and other styles
17

Parti, Katalin. "Explaining Online Fraud Victimization of Older Adults via Cyber Routines and Lifestyles." Innovation in Aging 5, Supplement_1 (December 1, 2021): 765–66. http://dx.doi.org/10.1093/geroni/igab046.2835.

Full text
Abstract:
Abstract The paper compares victim group characteristics: the differences between individuals under 55 and 55 and older, victimized by online fraud committed by a stranger. We test Cyber-Routine Activities Theory (cyber-RAT; Choi, 2008). In addition to active online lifestyle and computer familiarity, we include in the analysis independent variables such as living arrangements, occupation, and the willingness to report and ask for help. A representative sample of US citizens 18 or older was collected using a Dynata research panel in October 2020. We utilized one-way ANOVA on ranks for testing whether older and younger victims’ characteristics can be derived from the same independent variables. We find that older victims differ in characteristics from younger victims. Those who live alone or in a marriage with no children, and retired are significantly less victimized by online fraud than those who live with a partner and children and having full-time jobs. Besides, they are less likely to report their victimization, and their online activities and computer familiarity make them more vulnerable to online fraud than younger adults. Our findings suggest that older victims need prevention and intervention solutions designed especially for them. In an aging society, individuals will be increasingly active online and in the job market. Employers must provide internet security training for employees on manipulative online scams. Crime prevention programs must include awareness-raising on the role of reporting and how to ask for help. Relatives, friends, and caretakers need to be trained in preventing and early recognizing online fraud impacting older adults.
APA, Harvard, Vancouver, ISO, and other styles
18

Lee, Dong Im. "A Study on the Prevention of Hard Fraud in Automobiles: Centered on an Intentional Collision." Forum of Public Safety and Culture 16 (May 31, 2022): 153–71. http://dx.doi.org/10.52902/kjsc.2022.16.153.

Full text
Abstract:
The main culprit of car hard fraud is using social media to recruit people through a legal method of recruiting part-time jobs and engaging them in crimes. Through this, criminals intentionally cause traffic accidents targeting vehicles that violate the law and acquire insurance and settlement money from the victim driver or insurance company. As a result, the purpose of the study is to present measures to prevent insurance leakage and increase insurance premiums for auto insurance subscribers. The method of research is to identify the status and trend of insurance fraud by the Financial Supervisory Service, identify cases of auto-hard fraud based on Internet and domestic and foreign research data, and identify what measures insurers are taking to prevent damage to insurance fraud. As a result of the study, car-hard fraud is causing an accident by intentionally colliding a vehicle that violates traffic laws. Through this, the high proportion of the victim drivers' negligence and the fact that the perpetrator claims to be a negligence accident are exploited by the insurance company. Insurance companies are responding by establishing a system that can detect habitual criminals, but it is less efficient in crime prediction and detection, and it seems that there is a limit for insurance companies to respond to and detect first-time criminals. Therefore, it was derived that it is possible to prevent insurance fraud only by preparing countermeasures through a more scientific and detailed approach. In conclusion, car-hard fraud are becoming increasingly intelligent, and as a result, it is difficult to arrest criminals, so crimes are on a continuous increase. In order to eradicate such crimes, a control tower should be created under the Financial Supervisory Service to predict and arrest insurance fraud crimes. The first offender of a fraudulent crime using a car has a limit that cannot be arrested. Therefore, a detective system should be established to approach from the recruitment stage through social media, participate in crime execution, secure evidence, and request an investigation to an investigative agency. Car fraud criminals target vehicles that violate traffic laws, so if an accident occurs in violation of traffic laws, the driver is obligated to receive compliance education from the Korea Transportation Safety Authority, and The punishment regulations should be revised so that criminals can be reasonably punished.
APA, Harvard, Vancouver, ISO, and other styles
19

McKeague, Jonathan, and Kevin Curran. "Detecting the Use of Anonymous Proxies." International Journal of Digital Crime and Forensics 10, no. 2 (April 2018): 74–94. http://dx.doi.org/10.4018/ijdcf.2018040105.

Full text
Abstract:
The Internet is built atop the Internet Protocol (IP) which has at its heart a unique identifier known as an IP address. Knowing the location of an IP address can be very useful in many situations such as for banks to know if a connection is in progress from online fraud hotspots. IP addresses can be spoofed allowing hackers to bypass geographical IP restrictions and thus render some category of fraud prevention useless. Anonymous proxies (AP) which act as intermediate relays which disguise the source IP addresses can play a large role in cybercrime. There is a need to ascertain whether an incoming IP connection is an original source matched IP address, or one being routed through an anonymising proxy. This article concentrates on various methods used by anonymising proxies, the characteristics of the anonymous proxies and the potential mechanisms available to detect if a proxy is in use.
APA, Harvard, Vancouver, ISO, and other styles
20

Ivshin, V. G. "CRIME IN THE UDMURT REPUBLIC (2010-2020): TRENDS, PREVENTION MEASURES AND CRIMINOLOGICAL FORECAST." Bulletin of Udmurt University. Series Economics and Law 30, no. 6 (December 28, 2020): 864–68. http://dx.doi.org/10.35634/2412-9593-2020-30-6-864-868.

Full text
Abstract:
On the basis of a comprehensive analysis of the operational situation in Udmurtia Republic, held the interior Ministry and the Investigative Department of the Investigation Committee of Russia for the Udmurt Republic, there was a trend of reduction, as well as qualitative changes in the structure of crime. Attention is drawn to the large growth of new types of theft and fraud, in particular, to the fact that a significant proportion of serious and especially serious mercenary crimes are so-called remote theft and fraud committed using information and telecommunications networks, primarily the Internet. This indicates a qualitative change in the structure of property crimes. There is a stable causal relationship between the quantitative diversity of modern information technologies and qualitative changes in the structure of crime. It is concluded that it is necessary to train highly professional employees of the internal Affairs bodies, including through the specialization of knowledge, skills and professional experience.
APA, Harvard, Vancouver, ISO, and other styles
21

Mubtadi, Novendi Arkham, and Hendri Hermawan Adinugraha. "Personal Prophetic Leadership, Sharia Compliance, and Islamic Corporate Governance: Sharia Banking Fraud Prevention Efforts." El-Qish: Journal of Islamic Economics 2, no. 2 (December 16, 2022): 139–47. http://dx.doi.org/10.33830/elqish.v2i2.1797.2022.

Full text
Abstract:
This study aims to discuss the chances of developing the concept of prophetic leadership, sharia compliance, and Islamic corporate governance can be linked as very important elements in preventing fraud in Islamic commercial banks. This type of research conducted in this research is qualitative research. The data collection technique used is literature study by collecting information and data with the help of various materials in the library such as documents, books, journals, notes, or by internet searching. The data analysis method using inductive and deductive thinking frameworks. The result of this study is that personal prophetic leadership (Perpec-L), sharia compliance, and Islamic corporate governance are an effort of Islamic banking to prevent fraud (corruption). This can be done by adopting the values ​​contained in Perpec-L. Then by assessing the indicators contained in sharia compliance. Furthermore, by taking the existing principles of Good Corporate Governance (GCG) that are in accordance with Islamic norms and values.
APA, Harvard, Vancouver, ISO, and other styles
22

Babita Dubey. "Role of fintech in financial reporting and audit fraud prevention and safeguarding equity investment." International Journal of Science and Research Archive 7, no. 2 (December 30, 2022): 559–65. http://dx.doi.org/10.30574/ijsra.2022.7.2.0310.

Full text
Abstract:
The aim of this paper is to discover the audit-related causes of financial scandals and suggest how emerging technologies can offer solutions thereto. Specifically, this paper seeks to look at the facilitators of financial statements fraud and explain unique Fintech advancements that will make a contribution in financial information reliability in case of equity investments. The study makes use of the case studies of financial frauds to document the evidence of audit-associated issues in historical financial scandals. A complete and interdisciplinary literature evaluation at the intersection of business, accounting, and engineering, gives a basis to endorse technology advancements that can solve diagnosed issues in accounting and auditing. The findings of the study depicts that Blockchain, Internet of Things, Smart Contracts and Artificial Intelligence solutions have distinct functionality and can effectively clear up numerous financial reporting and audit-associated problems. Jointly, they have got a sturdy capability to enhance the reliability of the information in financial statements and commonly exchange how companies operate. This implied that the proposed and defined technology advancements must be of interest to all publicly listed companies and investors, as they can assist in safeguarding equity investments, as a result construct buyers’ will have trust towards the enterprise. Aside from implications for capital markets individuals, the findings of the study can materially benefit diverse stakeholder groups, the broader enterprise surroundings, and the financial system. Given the latest generation advancements in technology, the findings of the study provide insights into how the position of an external auditor would possibly evolve in the future.
APA, Harvard, Vancouver, ISO, and other styles
23

Medvedeva, Elena, and Sergey Kroshilin. "Financial fraud during the COVID-19 pandemic." Population 25, no. 1 (March 22, 2022): 29–42. http://dx.doi.org/10.19181/population.2022.25.1.3.

Full text
Abstract:
The purpose of this study was to study new ways of financial fraud faced by Russian society during the pandemic. The object of the study is the Russian society, the subject is financial fraud schemes that became possible due to restrictive measures and the rapid development of online commerce during the pandemic. Modern society is facing various challenges, which are caused not only by progressive development technologies, innovations, changing technological patterns, rapid development and widespread introduction of information (digital) technologies, but also by factor whose appearance was difficult to predict — the Coronavirus pandemic. It has only been two years since the whole world has been living in the pandemic, but during this time the behavioral attitudes of society have undergone significant changes: from the "self-isolation regime" and the mandatory "wearing" of masks — to working "remotedly" and the mandatory presentation of QR codes. Recent changes largely predetermined the rapid development of information and communication technologies, which affected real communication and the possibility of changing online behavior: shopping, getting certificates and documents, working remotely—50 to 80% of employees in various fields had to work at home. Going online entailed not only increased demand for communication services, development of Internet commerce, Internet banking (at the beginning of the pandemic, a mortgage purchase of housing was carried out completely online for the first time), but also contributed to creation of new types of financial fraud through communication technologies. The article uses the materials of the Federal Statistical Service, VTSIOM, the Bank of Russia, RBC, analytical materials of financial structures, analysts and the results of studies, including those by the author, conducted in the south-east of Moscow oblast.The results of the conducted research can be significant for prevention of fraudulent actions, as well as during classes on financial literacy of the population. The relevant authorities, committees and commissions can use these materials to conduct explanatory activities for the population.
APA, Harvard, Vancouver, ISO, and other styles
24

Kizyma, Tetiana, and Andrii Kizyma. "Identifying causes and potential consequences of financial fraud." Herald of Ternopil National Economic University, no. 2(92) (March 3, 2019): 47–56. http://dx.doi.org/10.35774/visnyk2019.02.047.

Full text
Abstract:
Introduction. The article claims that due to the rapid growth of financial relations, advancement of globalization processes, the impact of IT and the Internet on financial performance, the number of economic crimes in Ukraine has increased recently, especially financial fraud offences. The authors provide evidence that fraudulent schemes have targeted not only public and private finance, but all social relations. Purpose. Therefore, the aim of the paper is to address financial fraud as a global threat and identify its causes and potential consequences. Methods. For addressing the causes and effects of financial fraud, the following general research methods are used: analysis, synthesis, induction, deduction, abstraction and grouping. Results. It should be noted that the problem of financial fraud has not received sufficient attention in domestic research literature and practice. The paper presents the leading causes of financial fraud, which include economic, moral and psychological causes as well as regulatory, infrastructural and organizational ones. Financial fraud has a negative impact on the national economy and the welfare of citizens, and therefore leads to the multimillion losses. In order to identify consequences of financial fraud, a combination two types of evaluating such consequences is suggested: quantitative (involves the calculation of pecuniary damage, economic losses and lost economic profit due to fraud offences, and qualitative (logically explains circumstances of financial fraud, risks of losing corporate reputation, image and investment attractiveness). There are three major reasons why financial fraud occurs, which constitute the so-called fraud triangle: the opportunity to commit fraud; the pressure on the individual or the motivation behind the crime; the ability to rationalize the fraud. Therefore, the most important tasks for state bodies, economic entities and individuals include neutralizing the factors which lead to financial fraud and exercising effective control over the prevention of fraud offences in social and economic areas in general, and in financial area in particular. Discussion. Further studies should focus on a comprehensive analysis of the most common types of financial fraud, which take place in Ukraine. The authors argue that this will lead to establishing a set of policies aimed at reducing this negative phenomenon.
APA, Harvard, Vancouver, ISO, and other styles
25

Hanafiah, Dwi Putri Melati Januri. "IMPLEMENTASI UPAYA PENANGGULANGAN TINDAK PIDANA CYBER DI ERA TEKNOLOGI." Muhammadiyah Law Review 6, no. 2 (August 26, 2022): 32. http://dx.doi.org/10.24127/lr.v6i2.2213.

Full text
Abstract:
Abuse of the internet is also proven by the frequent finding of crimes through the internet network. The existence of social media which also functions as an online buying and selling transaction, but is used by unscrupulous persons to commit crimes, one of the crimes is fraud. Crimes related to the confidentiality, integrity and existence of data and computer systems receive special attention, because these crimes have a different character from conventional crimes. The legal system in Indonesia does not specifically regulate computer crime through the internet. Obstacles found in investigating cybercrime include issues related to legal instruments, the ability of investigators, evidence, and inadequate computer facilities. Efforts that can be made to overcome obstacles found in investigating cybercrime include improving legal instruments, educating investigators, building adequate facilities, increasing investigative efforts and international cooperation, as well as making efforts to combat cybercrime prevention
APA, Harvard, Vancouver, ISO, and other styles
26

Srokosz, Michal, Andrzej Bobyk, Bogdan Ksiezopolski, and Michal Wydra. "Machine-Learning-Based Scoring System for Antifraud CISIRTs in Banking Environment." Electronics 12, no. 1 (January 3, 2023): 251. http://dx.doi.org/10.3390/electronics12010251.

Full text
Abstract:
The number of fraud occurrences in electronic banking is rising each year. Experts in the field of cybercrime are continuously monitoring and verifying network infrastructure and transaction systems. Dedicated threat response teams (CSIRTs) are used by organizations to ensure security and stop cyber attacks. Financial institutions are well aware of this and have increased funding for CSIRTs and antifraud software. If the company has a rule-based antifraud system, the CSIRT can examine fraud cases and create rules to counter the threat. If not, they can attempt to analyze Internet traffic down to the packet level and look for anomalies before adding network rules to proxy or firewall servers to mitigate the threat. However, this does not always solve the issues, because transactions occasionally receive a “gray” rating. Nevertheless, the bank is unable to approve every gray transaction because the number of call center employees is insufficient to make this possible. In this study, we designed a machine-learning-based rating system that provides early warnings against financial fraud. We present the system architecture together with the new ML-based scoring extension, which examines customer logins from the banking transaction system. The suggested method enhances the organization’s rule-based fraud prevention system. Because they occur immediately after the client identification and authorization process, the system can quickly identify gray operations. The suggested method reduces the amount of successful fraud and improves call center queue administration.
APA, Harvard, Vancouver, ISO, and other styles
27

Rizka Sofianti. "Upaya Kepolisian dalam Mencegah Penipuan Arisan Online." Bandung Conference Series: Law Studies 1, no. 1 (December 7, 2021): 12–16. http://dx.doi.org/10.29313/bcsls.v1i1.80.

Full text
Abstract:
Abstract. The development of technology such as the internet has a good impact and is very helpful for humans, but there are also those who misuse it, giving rise to new crimes such as data manipulation crimes, espionage, money laundering, hacking, software theft, online social gathering business fraud, and many others. One of the internet technology-based crime practices, namely online social gathering business fraud, is very common by using various modes to convince people to be interested in the benefits offered. Then there was a fraud by the perpetrator so that the victim reproduced the remittances to the perpetrator with the promise of giving interest at a high percentage. The research was conducted using the approach method used in this study, namely the normative juridical approach. Data collection techniques carried out by the author are interviews and literature study. The research specification used is descriptive analysis.The results of the study can be seen that, Law enforcement carried out by the police is taken through two stages, namely the prevention stage (preventive) and the action stage (repressive). Prevention (Preventive) carried out by the police are two stages starting from appealing to the public through social media and carrying out socialization to the community, then at the stage of law enforcement through repressive measures carried out by investigators and investigators through several stages, namely the investigation stage, the investigation stage, the examination stage and the completion stage as well as the submission of the case to the Public Prosecutor. Criminal liability according to Law Number 11 of 2008 concerning Information and Electronic Transactions against perpetrators of online social gathering fraud refers to individual and corporate legal subjects as regulated in Article 52 paragraph (4) in which there must be an element of error first. In Article 28 paragraph (1) the elements that must be fulfilled are that every person, intentionally and without rights, spreads false and misleading news, and causes consumer losses in Electronic Transactions. Meanwhile, criminal sanctions for perpetrators are regulated in Article 45 paragraph (2). Abstrak. Perkembangan teknologi seperti internet memberikan dampak yang baik dan sangat membantu bagi manusia namun ada juga yang menyalahgunakannya sehingga menimbulkan kejahatan baru seperti kejahatan manipulasi data, spionase, money laundering, hacking, pencurian software, penipuan bisnis arisan online, dan masih banyak lainnya. Salah satu praktek kejahatan berbasis teknologi internet yaitu penipuan bisnis arisan online sangat banyak terjadi dengan menggunakan berbagai modus untuk meyakinkan orang-orang supaya tertarik dengan keuntungan yang ditawarkan. Maka terjadilah penipuan oleh pelaku sehingga sikorban memperbanyak pengiriman uang kepada si pelaku dengan janji akan memberikan bunga dengan persenan yang tinggi. Penelitian yang dilakukan menggunakan metode pendekatan yang dilakukan dalam penelitian ini yaitu pendekatan Yuridis Normatif. Teknik pengumpulan data yang dilakukan oleh penulis adalah dengan wawancara dan studi kepustakaan. Spesifikasi penelitian yang digunakan adalah Deskriptif Analisis. Hasil penelitian dapat diketahui bahwa, Penegakan hukum yang dilakukan oleh pihak kepolisian yang ditempuh melalui dua tahapan, yaitu tahap pencegahan (preventif) dan tahap penindakan (refresif). Pencegahan (Preventif) yang dilakukan oleh pihak kepolisian yaitu dua tahapan mulai dari menghimbau masyarakat melalui media sosial dan melaksanakan sosialisasi kepada masyarakat, kemudian pada tahap penegakan hukum melalui penindakan (refresif) dilaksanakan oleh penyelidik dan penyidik melalui beberapa tahapan yaitu tahap penyelidikan, tahap penyidikan, tahap pemeriksaan dan tahap penyelesaian serta penyerahan perkara kepada Jaksa Penuntut Umum. Pertanggungjawaban pidana menurut Undang-Undang Nomor 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik terhadap pelaku penipuan arisan online mengacu pada subjek hukum perseorangan dan korporasi yang diatur pada Pasal 52 ayat (4) dimana di dalamnya harus ada unsur kesalahan terlebih dahulu. Dalam Pasal 28 ayat (1) unsur-unsur yang harus terpenuhi yaitu setiap orang, dengan sengaja dan tanpa hak, menyebarkan berita bohong dan menyesatkan, dan yang mengakibatkan kerugian konsumen dalam Transaksi Elektronik. Sementara itu sanksi pidana bagi pelaku diatur dalam Pasal 45 ayat (2).
APA, Harvard, Vancouver, ISO, and other styles
28

Wang, Chenyang. "Online Dating Scam Victims Psychological Impact Analysis." Journal of Education, Humanities and Social Sciences 4 (November 17, 2022): 149–54. http://dx.doi.org/10.54097/ehss.v4i.2740.

Full text
Abstract:
In an era of widespread mass marketing scams on the Internet, many victims have reported varying degrees of financial loss and psychological damage after encountering lottery scams and advance payment scams. Among them, the emotional damage to victims of online dating scams may be even more severe because the whole scam process involves mental attachment, sexual abuse, and relationship breakdown. There is little help and support for victims throughout the scam process and even after the scam is over, which not only makes it difficult for victims to get timely and professional assistance after experiencing online scams, but victims even run the risk of being scammed by criminals again afterward, so timely help and professional psychological treatment for victims is of positive significance. In previous studies, there are fewer reports summarizing and analyzing the psychological conditions of victims. In this paper, we will summarize the psychological problems of victims of online dating scams and compare the psychological treatment needed by victims of online dating scams who experience online aggression with the psychological treatment needed by victims who are actually violated in reality. For example, professional treatment for real victims of sexual assault has methodological merit for victims of online fraud, methods of privacy and psychological protection for victims of online romance fraud, criteria for measuring psychological status, and more. These are all measures to promote enhanced victim care and the prevention of online dating fraud throughout the industry.
APA, Harvard, Vancouver, ISO, and other styles
29

Koong, Kai S., Lai C. Liu, Hong Qin, and Tingting Ying. "Occurrences of online fraud complaints: 2002 through 2015." International Journal of Accounting & Information Management 25, no. 4 (October 2, 2017): 484–504. http://dx.doi.org/10.1108/ijaim-12-2016-0113.

Full text
Abstract:
Purpose The purpose of this paper is to report on the findings and lessons that were learned from the many cases of internet fraud complaints that are gathered by the Federal Trade Commission in the USA. The implications that are contained in the behavior of the complaints and trends identified are critical for addressing all types of online criminal activities in the increasing world of cybercrimes. Design/methodology/approach Data for this paper are extracted from the Consumer Sentinel Network Data Handbook covering a period of 13 years. Using the raw data, the occurrences were plotted and trends (number of cycles, time between cycles, and leading state and lagging states) were identified. Descriptive statistics covering the 13 years were examined and discussed. Using 20002 as the base year, the rate of growth of each of the states were ranked annually and were tested for stability and predictability using non-parametric approaches. Findings The key findings are indigenous to the occurrences of online fraud complaints in the USA. However, as the leading nation with the best database on fraud complaints, the findings are mission critical to fraud prevention across the globe. Specifically, this study found that since 2002, there have been four distinct cycles. Each cycle is clearly noticeable because there is a rapid growth in the number of crime complaints in the beginning half of the period followed by a slowing down period. However, the speed of change from one cycle to the next is steeper and the time gap is faster. While it is true that from the perspective of all the 50 states, the ranks appear to change every year and thus are not stable. However, the majority of the changes are relatively small so their relative positions by rank are still predictable. Originality/value The paper extends existing understanding of online fraud occurrences in the USA. The findings are timely and based on longitudinal data that span over a decade. The four new cycles identified are critical to the body of knowledge. The observed change in time from one cycle to another and its changes from a mathematic to a geometric one are also new. The findings are invaluable to persons working in law enforcement related occupations (auditors, lawyers, forensic experts, among others) and who must deal with the increasing problem of online fraud and cybercrimes.
APA, Harvard, Vancouver, ISO, and other styles
30

Suprapti, Duhita Driyah, Nurul Fibrianti, and Anggun Meinanda Maharani. "Increasing Public Understanding of the Prevention and Complaints of Fraudulent Investments." Indonesian Journal of Advocacy and Legal Services 4, no. 2 (September 30, 2022): 295–314. http://dx.doi.org/10.15294/ijals.v4i1.53281.

Full text
Abstract:
The many offers of high income make many people interested in investing. People's carelessness backfires on those who are victims of fraudulent investments. Illegal investment or more commonly known as a fraudulent investment is indeed carrying out investment activities that are not following existing regulations. The ease of access to information and the affordability of technology today has become the ground for illegal investment actors to look for victims. Investments that initially aim to obtain maximum income from existing capital in the future harm investors. In illegal assets, it is not only the activities that are not appropriate, but the completeness of the licensing documents for investment companies is also incomplete. Many types of activities resemble investments but are fake or illegal. The victims of this activity are not only a few. Even from all walks of life are victims of this irresponsible activity. This service is carried out by educating the public regarding complaints and assisting with illegal investments. This service will be carried out by providing investment training for the community in Kalipancur Village, especially for mothers and teenagers who are often the target of investment fraud. Such an approach is expected to provide validity of the results as a good outcome. This training is considered efficient and effective because the public understands and understands commercial transactions through the internet to increase their knowledge to increase their income and standard of living.
APA, Harvard, Vancouver, ISO, and other styles
31

Mironova, Svetlana, and Svetlana Simonova. "Protection of the Rights and Freedoms of Minors in the Digital Space." Russian Journal of Criminology 14, no. 2 (March 30, 2020): 234–41. http://dx.doi.org/10.17150/2500-4255.2020.14(2).234-241.

Full text
Abstract:
The problem of ensuring information security is currently urgent for the Russian Federation as well as for the whole world. The number of cyber-threats is increasing at a great speed, and they concern not only private citizens, but also organizations, the community and the state. Special attention should be paid to the information security of children and teenagers. Minors are most susceptible to negative influences on the Internet, they risk becoming victims of cyberbullying, fraud and illegal access to personal data. Common threats to the information security of minors include a constant increase in the number of sites with aggressive or illegal content, including those inciting to suicide or abuse of drugs and psychoactive substances, as well as cyber-stalking or virtual sexual harassment. The information security of minors in the digital space is a complex issue, whose successful solution requires a consolidation of legal and information resources. The article analyzes Russian and foreign experience of ensuring the information security of minors. The authors summarize research approaches to solving the problem of protecting minors on the Internet. They present a classification of the most urgent cyber-threats: software-technical (intentional dissemination of viruses and Trojan software), economic (theft and sale of credit card details, phishing-attacks, hacking of payment accounts), and content (public dissemination of any materials, including illegal ones, on the Internet). The authors also examine legal, social and technical measures of ensuring the information security of minors and suggest changes to the current legislation which regulates the information security of minors. The authors also study specific methods of solving this task and outline a number of measures aimed at protecting the rights and freedoms of minors in the digital space (thematic prevention classes for minors, development of special information protection software).
APA, Harvard, Vancouver, ISO, and other styles
32

Mphatheni, Mandlenkosi Richard, and Witness Maluleke. "Cybersecurity as a response to combating cybercrime." International Journal of Research in Business and Social Science (2147- 4478) 11, no. 4 (June 5, 2022): 384–96. http://dx.doi.org/10.20525/ijrbs.v11i4.1714.

Full text
Abstract:
Cybercrime is touted as any harmful behaviour that is in some way related to a computer but does not have a specific legal reference. Therefore, the objective of this study was to explore cybersecurity as a response to combating cybercrime, focusing on demystifying the prevailing threats, while offering recommendations to the African regions. Moreover, this qualitative study employed a non-empirical research design: Systematic review methodology to analyse grey literature and primary research studies peer-reviewed and published, restricted from 2010-2022, not following yearly sequential consideration. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) and Critical Appraisal Skill Programme (CASP) were employed to ensure the trustworthiness of the findings of this study based on reviewed conventional and seminal literature studies on this subject. The main findings of this study rest on a lack of a common universal definition of cybercrime, this has an impact on its prevention and ignores enormous economic value associated with the commission of this crime across the world, African regions included. It was also observed that this criminal act is presently committed with internet usage, consisting of copyright infringements, computer-related fraud, child or adult pornography, and network security violations, amongst others. Equally, addressing this scourge in African regions requires advanced skills and knowledge; exceeding the average computer and internet user. It is also critical to recognise the importance of implementing efficient cybersecurity methods, as policing this crime remains an important component of the Law Enforcement Agencies (LEA), and more innovative strategies are required and a globally coordinated response to this problem is urgently sought.
APA, Harvard, Vancouver, ISO, and other styles
33

KHISAMOVA, ZARINA, and ELENA KOMOVA. "Manipulating the digital asset market: challenges in establishing a criminal legal defense regime." Public Administration 23, no. 2 (2021): 68–73. http://dx.doi.org/10.22394/2070-8378-2021-23-2-68-73.

Full text
Abstract:
The growth of the digital asset ecosystem has led to the emergence of hundreds of crypto exchanges that facilitate the trade of digital assets. This phenomenon did not remain without the attention of malefactors. Today, we can talk about an independent type of “cryptocurrency exchange crime”. The article analyzes the key criminal trends and formulates the main recommendations for the prevention of criminal encroachments in the cryptocurrency market. At the moment, one of the most common manipulative schemes is “pump and dump”, which became notorious at the turn of the 90s and 2000s. To date, no jurisdiction has created an effective protection regime against such fraud. The authors highlight the main reasons for the low efficiency of the measures taken: the presence of digital assets on the Internet led to the online nature of all stages of manipulations coordinated by anonymous groups in social networks; wide availability and lack of restrictions on the placement of tokens predetermined their regular and widespread placement (as opposed to an IPO); selfish interest of crypto-exchange sites that receive a commission from a transaction. It is emphasized that regulators’ search for a balance between innovation and investor protection is driving the reluctance of many jurisdictions to introduce proper criminal law protection regimes.
APA, Harvard, Vancouver, ISO, and other styles
34

Varakina, Margarita Igorevna, Elizaveta Sergeevna Trofimova, and Yaroslava Aleksandrovna Levchenko. "Cybercrime and legal support of information security of China in the XX century." Вопросы безопасности, no. 1 (January 2022): 9–20. http://dx.doi.org/10.25136/2409-7543.2022.1.37333.

Full text
Abstract:
The legal protection of computer and information systems, prevention and counteraction to cybercrimes becomes a relevant problem for society and the state. In one or another way, the computer-related crimes, infringement of the interests of users, and intentional distribution of false or harmful information, pose a serious threat to the information system security, as well as interests of the state, rights and freedoms of citizens. The dependence of people and society as a whole on computer and information systems is higher with each year. Generation Y cannot imagine their life without digital technologies. Cybercrime (intellectual crime) implies the unauthorized access to computer systems and databases, infliction of damage, and commission of criminal offense via computer. Such crimes are characterized by being difficult to detect, intellectualism, wide variety, duration and serious threat to the society. The scholars distinguish two types of cybercrimes: in the first instance, computer is viewed as the object of crime, while in the second — the instrument of crime. The first case suggest theft of the computer and its parts, hacker attacks and various types of sabotage, spread of computer viruses, etc.; the second case suggests the distribution of pornography and pirated software, Internet fraud for the purpose of embezzlement, as well as money laundering.
APA, Harvard, Vancouver, ISO, and other styles
35

Ismail, Bassem, and Hamidah Hamidah. "HOW CAN PSYCHOLOGY AND RELIGIOUS BELIEFS AFFECT ON FRAUD TRIANGLE?" Media Riset Akuntansi, Auditing & Informasi 19, no. 1 (April 29, 2019): 53. http://dx.doi.org/10.25105/mraai.v19i1.4093.

Full text
Abstract:
<p><em>In this paper, I explore the emphasis of the fraud triangle as a salutary model for practitioner to extract fraud. This paper is anchored through psychology and religious theories, and is propped with prove from holy books. The findings point out that the Own lust “Hawa Nafsu” (HN) supporter and basic stone to control devil desire (DD) that control by humans lust that’s present new model in preventing fraud. Fraud is a manifold phenomenon, whose religious theories may not fit all the cases into fixed model. Thus, fraud tringle not adequately credible model, so antifraud practitioner should consider fraud from religious perspective. The study uses secondary sources of information get it from magazine articles, textbooks and the Internet. The discussion of the two theories contributes to understand frauds especially by legitimate accountants, auditors, fraudsters and other fraudulent entities. The study also serves as a guide to further research on fraud.</em></p>
APA, Harvard, Vancouver, ISO, and other styles
36

Усачев, С. И. "ON THE ROLE OF CONSULTATION AND REFERENCE ACTIVITIES OF INTELLIGENT PERSONS IN THE INVESTIGATION OF FRAUD IN THE FIELD OF AUTO INSURANCE." VESTNIK OF THE EAST SIBERIAN INSTITUTE OF THE MINISTRY OF INTERNAL AFFAIRS OF THE RUSSIAN FEDERATION, no. 3(102) (October 17, 2022): 230–40. http://dx.doi.org/10.55001/2312-3184.2022.49.47.020.

Full text
Abstract:
Введение: статья посвящена исследованию вопросов, касающихся возможностей использования консультативной помощи сведущих лиц на разных этапах расследования уголовных дел, возбужденных по факту совершения мошеннических действий в сфере автострахования. Материалы и методы: методологическую основу исследования составили всеобщий диалектический метод научного познания, общенаучные методы познания, а также некоторые частнонаучные методы, среди которых: обобщение следственной и судебной практики, литературных и Интернет-источников, освещающих различные вопросы использования специальных знаний при расследовании мошенничества в сфере автострахования, а также в целом касающихся вопросов раскрытия, расследования и предупреждения рассматриваемой категории преступлений. Результаты исследования: позволили определить, что консультативная (справочная) деятельность сведущих лиц нередко позволяет обеспечивать колоссальную помощь при раскрытии, расследовании и предупреждении мошенничества в сфере автострахования. Необходимость такой помощи обусловлена разнообразием способов подготовки, совершения и сокрытия преступлений. Так, в рамках расследования мошенничества в сфере автострахования прибегать к консультативной помощи уместно для подготовки ко многим следственным действиям и, безусловно, для подготовки и проведения целого ряда оперативно-разыскных мероприятий. Выводы и заключения: проведенное исследование показало, что использование консультативной помощи необходимо при подготовке и назначении различных судебных экспертиз и исследований по делам, касающимся расследования мошеннических действий в сфере автострахования, а также для качественной и всесторонней подготовки к производству следственных действий и оперативно-разыскных мероприятий. В этой связи необходимо пользоваться такими возможностями при расследовании каждого уголовного дела, возбужденного по факту мошеннических действий в сфере автострахования. Introduction: the article is devoted to the study of issues related to the possibility of using the advice of knowledgeable persons at different stages of the investigation of criminal cases initiated on the fact of committing fraudulent actions in the field of auto insurance. Materials and methods: the methodological basis of the study was the general dialectical method of scientific knowledge, general scientific methods of cognition, as well as some particular scientific methods, including: generalization of investigative and judicial practice, literary and Internet sources covering various issues of using special knowledge in the investigation of fraud in the field of auto insurance, as well as in general concerning the issues of disclosure, investigation and prevention of the category of crimes under consideration. The results of the study: made it possible to determine that the advisory (reference) activities of knowledgeable individuals can often provide tremendous assistance in detecting, investigating and preventing fraud in the auto insurance industry. The need for such assistance is due to the variety of ways of preparing, committing and concealing crimes. So, as part of the investigation of fraud in the field of auto insurance, it is appropriate to resort to advisory assistance for preparing for many investigative actions and, of course, for preparing and conducting a number of operational-search activities. Findings and conclusions: the study showed that the use of advisory assistance is essential in the preparation and appointment of various forensic examinations and research on cases related to the investigation of fraudulent activities in the field of auto insurance, as well as for high-quality and comprehensive preparation for the production of investigative actions and operational search activities. In this regard, it is necessary to use such opportunities in the investigation of each criminal case initiated on the fact of fraudulent activities in the field of auto insurance.
APA, Harvard, Vancouver, ISO, and other styles
37

Videnović, Snežana, and Aida Hanić. "Internal fraud committed by employees in insurance sector." Tokovi osiguranja 37, no. 4 (2021): 81–110. http://dx.doi.org/10.5937/tokosig2102081v.

Full text
Abstract:
The aim of this paper is to show the factors influencing fraud committed by insurance employees, especially those identified as leaders, because a good knowledge of the personality traits of potential perpetrators and their motives can help identify fraud and be put to good use by everyone working on fraud detection. The subject of this paper is a specific type of crime known in professional literature as white-collar crime. An employee who commits such a crime alone or in collusion with others may cause enormous damage to a company, ruin its reputation, and cause the loss of millions through embezzlement, provided that the fraud is detected, which rarely happens in practice. Furthermore, this paper will show basic theoretical assumptions which enable better knowledge and understanding of certain types of fraud perpetrated by employees in insurance companies. The overview of white-collar crime faced by most insurance companies provides a particular insight into scientific researches that have dealt with this issue to date and creates conditions for the prevention of this type of fraud in the insurance industry.
APA, Harvard, Vancouver, ISO, and other styles
38

Knežević, Snežana, Aleksandar Živković, and Stefan Milojević. "The role and importance of internal control and internal audit in the prevention and identification of fraudulent actions in banks." Bankarstvo 50, no. 1 (2021): 66–89. http://dx.doi.org/10.5937/bankarstvo2101066k.

Full text
Abstract:
Modern banks have a specific role and a whole range of functions of paramount importance, as financial institutions for granting loans, creating loans, mobilizing savings and economic development. In the financial sector, there is a growing number of people who are using increasingly innovative and creative ways of targeting all perceived weaknesses in banks and credit approval systems. The persons committing fraud have become increasingly sophisticated, which means that measures to prevent fraud must be constantly developed to ensure that they are able to deal with the threat. The fight against fraud is crucial for financial services institutions. This article aims not only to briefly describe the role of internal control and internal audit in detecting possible fraud in banks, as profit-oriented organizations in today's complex and highly changing business environment, but also to point out the advantages they have in the more efficient management of bank activities.
APA, Harvard, Vancouver, ISO, and other styles
39

Petechel, O. Yu. "Some Issues Of The Criminological Characterization Of Female Aggressive Crime." Actual problems of improving of current legislation of Ukraine, no. 51 (August 6, 2019): 177–85. http://dx.doi.org/10.15330/apiclu.51.177-185.

Full text
Abstract:
The article is devoted to the study of one type of bulling - cyberbullying. The author analyzes the concepts and features of cyberbullying. The author individually distinguishes the features contributing to cyberbullying, in particular, the distance (there is no direct contact with the victim); anonymity (ability of the bully (aggressor) to protect himself from identification); prevalence (the ability to reach a large audience in the hiring process); support (the ability to involve an unlimited range of bullies in the hatching process); persistence (cyberbullying does not depend on the time and location of the bully (the aggressor) and his victim, no need for eye-to-eye contact); equality (absence of a bully (aggressor) need to take precedence in strength, social status, financial status, etc.). Features of cyberbullying include changes in behavioral and emotional state during or after use of mobile phone or other Internet-access devices; hiding certain facts of one’s online communication; avoiding school or friendly meetings; occurrence of unmotivated anger at home, destructive relationships with parents or teachers; change in mood, behavior, sleep or appetite; desire to stop using one’s PC or mobile phone; avoid talking about one’s PC or mobile phone activity; impaired learning; suicide attempts. The article deals with the classification of types of cyberbullying, where the following are separately distinguished: trolling, happy-sloping, flamingos, attacks, slander, defamation, impersonalization, fraud, alienation, cyber-harassment, sexual assault. The author identifies the reasons that contribute to the spread of this negative phenomenon. In addition, special attention is paid to the prevention of cyberbullying, where among the main are the education of cyber literacy, direct communication and interest in the life of the child, spending more time with the child, demonstrating the benefits of real communication over virtual.
APA, Harvard, Vancouver, ISO, and other styles
40

Omoniyi, Kehinde Samuel. "Evaluation of Transborder Crimes in Nigeria." American Journal of Society and Law 2, no. 1 (January 20, 2023): 13–20. http://dx.doi.org/10.54536/ajsl.v2i1.1137.

Full text
Abstract:
Transborder crimes are criminal activities that transverse borders of two or more countries. Notable crimes that flourish across Nigerian’s borders are illicit drug trafficking, Terrorism, proliferation of small arms and light weapons ( SALWs), Human trafficking, internet fraud, oil theft, smuggling of goods among others. All these activities have precipitated security and economic complications across West Africa sub region. The 2022 Global peace Index ranked Nigeria 143 among 163 independent Nations and Territories according to the level of peacefulness while Cato Institute a Washington DC based public policy research organization rated Nigeria as the most unsafe place on earth after Iraq. This phenomenal rise of criminal ratings of Nigeria had attracted local and international attentions of scholars, policy makers and governments. Thus, this study investigates Transborders crimes in Nigeria using qualitative research methodology by reviewing the existing literature and conducting in-depth interviews of 85 informants selected randomly from government establishments and among stakeholders in Nigeria. The study relied on rational choice theory and behavioural theory as theoretical frameworks. The study revealed that Transborder crimes thrive across the West African nations because of many factors which include but not limited to the implementation of ECOWAS protocol on free movement of persons and goods, porous borders, youth unemployment, poverty, poorly trained and ill-equipped security personnel, corruption, poor inter-agency coordination and collaboration. The study concluded that despite various measures by the Nigerian government and International organizations like ECOWAS, UNO, AU to checkmate the scourge, the desired results have not been achieved. The study therefore recommended effective border monitoring and management, job creation, community policing initiative, increased military actions and surveillance, among others as panacea to Transborder crimes detection, reduction and prevention.
APA, Harvard, Vancouver, ISO, and other styles
41

Noble, David W. "Preventing Scientific Fraud." Annals of Internal Medicine 145, no. 6 (September 19, 2006): 472. http://dx.doi.org/10.7326/0003-4819-145-6-200609190-00017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Garfield, Eugene, Marie McVeigh, and Marion Muff. "Preventing Scientific Fraud." Annals of Internal Medicine 145, no. 6 (September 19, 2006): 472. http://dx.doi.org/10.7326/0003-4819-145-6-200609190-00018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Garrel, Dominique R., Rémi Rabasa-Lhoret, and Pierre Boyle. "Preventing Scientific Fraud." Annals of Internal Medicine 145, no. 6 (September 19, 2006): 473. http://dx.doi.org/10.7326/0003-4819-145-6-200609190-00019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Sox, Harold C., and Drummond Rennie. "Preventing Scientific Fraud." Annals of Internal Medicine 145, no. 6 (September 19, 2006): 473. http://dx.doi.org/10.7326/0003-4819-145-6-200609190-00020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Coluccia, Anna, Andrea Pozza, Fabio Ferretti, Fulvio Carabellese, Alessandra Masti, and Giacomo Gualtieri. "Online Romance Scams: Relational Dynamics and Psychological Characteristics of the Victims and Scammers. A Scoping Review." Clinical Practice & Epidemiology in Mental Health 16, no. 1 (April 20, 2020): 24–35. http://dx.doi.org/10.2174/1745017902016010024.

Full text
Abstract:
Background: Digital communication technologies can overcome physical, social and psychological barriers in building romantic relationships. Online romance scams are a modern form of fraud that has spread in Western societies along with the development of social media and dating apps. Through a fictitious Internet profile, the scammer develops a romantic relationship with the victim for 6-8 months, building a deep emotional bond to extort economic resources in a manipulative dynamic. There are two notable features: on the one hand, the double trauma of losing money and a relationship, on the other, the victim's shame upon discovery of the scam, an aspect that might lead to underestimation of the number of cases. Objectives: This paper presents a scoping review of the quantitative and qualitative evidence on this issue, focusing on epidemiological aspects, relational dynamics, and the psychological characteristics of victims and scammers. Methods: A literature scoping review was conducted using electronic databases and descriptors. Studies were included if they had analyzed the phenomenon in any population or the relationship dynamics characterizing it through whatsoever typology of design. Scoping reviews are a form of knowledge synthesis, which incorporates a range of study designs and wide eligibility criteria to comprehensively summarize evidence with the aim of informing practice, programs, and policy and providing direction to future research priorities. Results: Twelve studies were included. Sixty-three percent of social media users and 3% of the general population report having been a victim at least once. Some psychological variables appear to be associated with the risk of being scammed, such as female gender, middle-age, higher levels of neuroticism, tendencies to the romantic idealization of affective relations, sensation seeking, impulsiveness and susceptibility to addiction. We analyse literature limitations and future directions. Conclusion: Since this emerging phenomenon is still largely unrecognized, understanding the psychological characteristics of victims and scammers will allow at-risk personality profiles to be identified and prevention/intervention strategies to be developed.
APA, Harvard, Vancouver, ISO, and other styles
46

Riis, P. "Prevention and management of fraud-in theory." Journal of Internal Medicine 235, no. 2 (February 1994): 107–13. http://dx.doi.org/10.1111/j.1365-2796.1994.tb01043.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Tretyakov, Vladimir, and Svetlana Golyatina. "Applying Big Data technologies to counter cyber fraud." Revista Amazonia Investiga 11, no. 49 (February 11, 2022): 9–16. http://dx.doi.org/10.34069/ai/2022.49.01.1.

Full text
Abstract:
By January 2021, the number of Internet users amounted to 4.7 billion, while the social media audience hit the 4.2 billion mark. Two-thirds of the world’s population use mobile phones daily. The average Internet user spends 42% of his time in the global network. These figures prove convincingly that the Internet has become an integral part of human life. However, man’s using the Internet involves increasingly the risk of cybercrime perpetrated against the user. The purpose of the research is to assess the potential of Big Data technologies to combat cyber fraud as a form of cybercrime. The study used the statistical data provided by the Prosecutor General’s Office of the Russian Federation and the publications in scientific journals. The methodological basis of the research is represented by a combination of general scientific and special scientific methods, with analysis, statistical method and systemic approach being the major tools. It was found in the course of the research that fraud constitutes the majority of crimes on the Internet. To counteract it, mobile operators and banks use anti-fraud techniques based on Big Data analysis. The paper provides an overview of services and programmes based on artificial intelligence and Big Data technologies, aimed at detecting and preventing telephone and internet fraud, used by law enforcement agencies in various countries. The paper concludes that Big Data has changed the vector of law enforcement activity from reactive to proactive.
APA, Harvard, Vancouver, ISO, and other styles
48

Asieieva, Yuliia, Irina Orlenko, Evgenij Borinshteyn, Zoia Atamaniuk, and Yuliya Dobrolyubska. "Intuition as a philosophical reflection at the time of COVID-19 pandemic." Revista Amazonia Investiga 11, no. 49 (February 11, 2022): 108–16. http://dx.doi.org/10.34069/ai/2022.49.01.12.

Full text
Abstract:
By January 2021, the number of Internet users amounted to 4.7 billion, while the social media audience hit the 4.2 billion mark. Two-thirds of the world’s population use mobile phones daily. The average Internet user spends 42% of his time in the global network. These figures prove convincingly that the Internet has become an integral part of human life. However, man’s using the Internet involves increasingly the risk of cybercrime perpetrated against the user. The purpose of the research is to assess the potential of Big Data technologies to combat cyber fraud as a form of cybercrime. The study used the statistical data provided by the Prosecutor General’s Office of the Russian Federation and the publications in scientific journals. The methodological basis of the research is represented by a combination of general scientific and special scientific methods, with analysis, statistical method and systemic approach being the major tools. It was found in the course of the research that fraud constitutes the majority of crimes on the Internet. To counteract it, mobile operators and banks use anti-fraud techniques based on Big Data analysis. The paper provides an overview of services and programmes based on artificial intelligence and Big Data technologies, aimed at detecting and preventing telephone and internet fraud, used by law enforcement agencies in various countries. The paper concludes that Big Data has changed the vector of law enforcement activity from reactive to proactive.
APA, Harvard, Vancouver, ISO, and other styles
49

Wahanisa, Rofi, Rahmawati Prihastuty, and Muhammad Dzikirullah H. Noho. "Preventive Measures of Cyberbullying on Adolescents in Indonesia: A Legal Analysis." Lentera Hukum 8, no. 2 (July 28, 2021): 267. http://dx.doi.org/10.19184/ejlh.v8i2.23503.

Full text
Abstract:
The increasing internet penetration in Indonesia has provided adolescents to expose pornographic content advertently. It inevitably includes other adverse impacts like fraud and violence, which begin with cyberspace. Also, cyberbullies on the internet have become a serious concern on how the government has anticipated it to prevent more practices in this cross-border experience. This study aimed to address the causes and impacts of online-based media on adolescents with the following preventive measures to reduce increasing cases of cyberbullying in Indonesia. This study used legal research in assessing the issue by sourcing primary data from statutory regulations and secondary data from academic resources. This study showed that cyberbullying continues to become an annoying issue among children, adolescents, and adults. The existing regulations provide insufficient protection preventing these practices because it does not specifically regulate its types and forms at defining cyberbullying. It suggested introducing a more specific regulation that outlines cyberbullying in ensuring the protection amidst the more borderless communication to prevent more adverse impacts on victims. KEYWORDS: Cyberbullying, Information and Technology Law, Child Protection.
APA, Harvard, Vancouver, ISO, and other styles
50

Teitcher, Jennifer E. F., Walter O. Bockting, José A. Bauermeister, Chris J. Hoefer, Michael H. Miner, and Robert L. Klitzman. "Detecting, Preventing, and Responding to “Fraudsters” in Internet Research: Ethics and Tradeoffs." Journal of Law, Medicine & Ethics 43, no. 1 (2015): 116–33. http://dx.doi.org/10.1111/jlme.12200.

Full text
Abstract:
Research that recruits and surveys participants online is increasing, but is subject to fraud whereby study respondents — whether eligible or ineligible — participate multiple times. Online Internet research can provide investigators with large sample sizes and is cost efficient. Internet-based research also provides distance between the researchers and participants, allowing the participant to remain confidential and/or anonymous, and thus to respond to questions freely and honestly without worrying about the stigma associated with their answers. However, increasing and recurring instances of fraudulent activity among subjects raise challenges for researchers and Institutional Review Boards (IRBs). The distance from participants, and the potential anonymity and convenience of online research allow for individuals to participate easily more than once, skewing results and the overall quality of the data.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography