Fraud - Computer Fraud Professor Holt Computer Crime 1...

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Computer Fraud Professor Holt Computer Crime
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Fraud Computer fraud is an issue that is gaining much more significance in the public eye Computer-assisted or computer-focused crimes? Fraud is the willful misrepresentation of material fact with the intent to deceive Criminal Civil Contractual
Background image of page 2
3 Technology and Fraud Fraud and technology go hand in hand Some types of fraud are now easily facilitated through the Internet Why?
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Types of Computer-Based Fraud Auction and retail schemes Work-at-home schemes Investment schemes Pump and dump schemes
Background image of page 4
5 Types of Computer-Based Fraud Illicit use of credit card info Fraudulent academic schemes Theft of telecommunications services 5% of profits are lost to fraud Electronic funds transfer crimes
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Nigerian E-mail Scams These are spam e-mails that you probably delete regularly There are several different scripts Attorney that has a deceased client that has a huge sum of money and wants you to act as next of kin Individual who needs your help to get funds out of the country Government agent who wants your help to smuggle out funds that were overpaid
Background image of page 6
7 Nigerian E-mail Scams They want you to give them information Full Name Phone Address Bank Accounts This information is then used to steal your identity, take money, or can lead to death Three to five percent of all recipients respond
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 Phishing Spam e-mails claiming to be from your bank, credit agency, or loan company There is an error or someone trying to access your account Enter in your information to verify your identity and protect your account Spammers will create false webpages to capture this information before sending you on to the appropriate site
Background image of page 8
9 Embezzlement Embezzlers often come from within companies Unlawful misappropriation for your personal use of money, property or some other thing of value that has been entrusted to your care, custody, or control Internal penetrator Embezzlers share some commonalities Tend to misuse legitimate access to systems to steal Could be administrators or operators Have no position of trust An unsharable financial burden Rationalize their behavior as borrowing Poor work environment
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10 Money Laundering Concealing illegally obtained funds from law enforcement and other agencies Our current financial system allows for easy money laundering Electronic funds transfer Various digital banking or payment systems Individuals can now convert money into electronic funds that can be difficult to trace Key for all sorts of illegal behaviors financed on-line
Background image of page 10
Identity Theft Identity theft is a growing problem the act of obtaining and using someone else’s personal data in ways that involve fraud or deception typically for economic gain Varies based on duration, level of immersion, and motivation Duration: time as individual
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 42

Fraud - Computer Fraud Professor Holt Computer Crime 1...

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online