183E2AF0-93B3-4610-8B0E-CF7401FD6D7D (1)
.docx
keyboard_arrow_up
School
Kurushetra University *
*We aren’t endorsed by this school
Course
605
Subject
Accounting
Date
Nov 24, 2024
Type
docx
Pages
6
Uploaded by BarristerProton6029
Running head: MITIGATE GROWING TREND OF ONLINE SCAMS AND FRAUDS
1
Mitigate the Growing Trend of Online Scams and Frauds
Student Name
Course Name
April 23, 2022
MITIGATE GROWING TREND OF ONLINE SCAMS AND FRAUDS
2
Mitigate the Growing Trend of Online Scams and Frauds
Introduction
In recent years, it has been noticed that the number of victims of fraud via the internet has
increased. One of the main reasons is the customers’ ignorance of the regulations and laws the bank
or tax authorities operate. Most thefts occur by deceiving the consumer that the caller is the bank or
the tax authority. Internet scams are various fraud approaches worked with by cybercriminals on the
internet. Scams can occur in a heap of ways-by means of phishing messages, online entertainment,
SMS messages on your cell phone, counterfeit technical support calls, scareware and then some.
More than one of every four individuals who detailed losing cash to fraud in 2021 said it began via
virtual entertainment with an advertisement, a post, or a message[ CITATION Emm221 \l 16393 ].
Over 95,000 individuals revealed that about $770 million in fraud to extortion started via online
entertainment in 2021. American buyers announced losing more than $5.8 billion to fraud last year,
up from $3.4 billion in 2020[ CITATION Gre22 \l 16393 ] So, this essay discusses the ways for the
government and private sector to reduce the numbers of victims and a growing number of online
frauds and scams. It will also explain the main reasons for online scams and frauds with examples.
Reasons for Growing Online Scams and Frauds
Online frauds and scams are increasing day by day due to several reasons. One of the main
reasons is a lack of awareness. Cyber specialists have credited the absence of awareness, abuse or
dependence via virtual entertainment and expanded utilization of online modes by many hoping to
bring in cash during the Covid-19 pandemic as a portion of the explanations behind the ascent in
cybercrimes. Cybercriminals are becoming more astute and use the moving as an opportunity to
blackmail individuals[ CITATION Gre22 \l 16393 ]. As of late, many individuals have succumbed
to the phoney calls regarding the sponsor portion of the vaccine. Residents wind up losing cash by
giving the OTP sent by the programmers. Many scams and frauds arise because of sharing PIN
information of credit cards in public places. For example, many individuals do this while feasting
out. They give their charge card and PIN to the server while making instalments. Giving out PIN
with such ease make them vulnerable to fraud. Their data is compromised if there is a secret
skimmer in the swipe machine[ CITATION Cro191 \l 16393 ].
Another important reason to grow such cases is increasingly digital banking services. The
present consumers demand additional online and mobile services from their financial institutions.
Subsequently, inheritance banks are going digital. They are doing more record onboarding and
exchange endorsements online and deemphasizing in-person exchanges, making it harder to check
personalities[ CITATION Gre22 \l 16393 ]. Additionally in light of purchaser requests, another type
MITIGATE GROWING TREND OF ONLINE SCAMS AND FRAUDS
3
of “challenger banks” - conceived and carrying on with work completed in the online world - have
arisen and are separating themselves by giving simple to-utilize and digital-local encounters. A
larger part of these organizations’ clients are those who have “dainty record” records as consumers
(i.e., don’t have a lot of credit information). Less information implies a greater risk of fraud. The
ascent of digital instalments in the last 18 years has also prompted an expansion in the number of
digital cheats. The essential justification for the progress of a portion of these is the absence of
awareness among buyers and organizations on the most proficient method to guard their
information and cash[ CITATION Mar145 \l 16393 ].
Because a rising number of information breaks over ongoing years, fraudsters can
effectively access PII (personally identifiable information) and use it against customers. For
example, fraudsters join genuine and counterfeit information (for example, a location from one
individual blended in with another’s federal retirement aide number) to make new, manufactured
personalities that are more enthusiastically to distinguish. Then, at that point, they layout open
financial balances and cards, behaving like real clients. When they’ve established strong credit
scores, the fraudsters request higher credit limits or bigger advances, and they pay[ CITATION
Jor20 \l 16393 ]
.
Fraudsters likewise influence PII for account takeover. By utilizing passwords and
accreditations acquired through information breaks or social designing, they can oversee records
and make fraudulent online buys. These exchanges can be as minor as purchasing food on a debit
card or as extreme as utilizing another person’s record to take out a home loan. Today, fraud has
likewise sped up and become significantly more modern because of the ascent of web-based
business, mobile payments, and figuring power[ CITATION Ale1911 \l 16393 ]. A significant
number of the advances organizations depend on to improve and quickly present new items and
administrations are also being embraced by fraudsters.
Effective Ways for Government and Private Sectors to Reduce Online Frauds
The government and private sectors should work together to reduce online frauds and scams.
They should focus on fighting the scammers more efficiently; by using cypher security and locating
the scammer’s place, the government can arrest and enforce strict laws on the scammers. But if
the consumers of the internet are educated. And have seen some examples and methods of
scammers’ ways to scam online users throughout the internet[ CITATION Mar2032 \l 16393 ]. That
number of victims will be limited to online consumers unaware of the method used to scam online
users. Online fraud victims have increased in the past few years, government and private sector
must cooperate in educating the community about online scams. Awareness is the strongest
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
MITIGATE GROWING TREND OF ONLINE SCAMS AND FRAUDS
4
weapon against online
scams. The
internet has changed how online clients can shop and profit
administrations like Online Banking from any place, whenever without the actual
presence[ CITATION Gre22 \l 16393 ]. From the second you sign in to the time you log out, all data
is safeguarded by a strong start to finish encryption, for example, from your PC program to the
bank’s system. It also offers fraudsters a chance to involve the web as a medium to commit fakes.
Online clients should know about such fakes and safeguard themselves against them.
If the
government and the private sector focus on educating people and making them aware of online
frauds, the number of victims will remarkably decrease. It will reduce the number of fraudsters due
to the awareness of the community of these ways of fraud. There is a need for cooperation between
the private sector and the government to fight against online fraud. Cooperation is required because
online fraud negatively affects commercial operations and governments transactions[ CITATION
Emm221 \l 16393 ]. It begins by educating the community about the fraud on the internet and how
they can avoid getting scammed. By presenting some examples of victims who have been scammed
by online scammers and some methods used to scam people throughout the internet.
Possible Solutions for Private Sectors to reduce fraud
The private sector can reduce these types of fraud by educating the consumer through
advertising. By advertising the methods used by the scammer to deceive the consumer, one of the
most famous of which is that a phone user gets a call from a person claiming to work with the bank
and requesting some banking information to update data. But the customer is shocked that a large
amount has been deducted from his bank account. After communicating with the bank, he discovers
that he was deceived by the person who requested his bank data[ CITATION Emm221 \l 16393 ].
By adverting and making aware customers of the ways that scammers attract them and working on
some banking rules, the increasing number of victims will be limited. And it will make the process
of scamming customers hard or nearly impossible for the scammers.
Possible Solutions for Government to reduce fraud
The government is not responsible for every person exposed to fraud via the internet. The
law does not protect fools, but that doesn’t mean that the governments will standstill. Government
can act and confront this fraud to limit the increasing number of online fraud victims. Governments
must establish laws and rules to prevent people from getting scammed, a law that restricts online
shopping and gives licenses to only trusted companies to sell online, especially after the significant
increase in the number of victims of fraud through the internet[ CITATION Gre22 \l 16393 ]. And
by enforcing strict and deterrent laws and applying them to violators. It will ensure that the number
of scammers will reduce due to the strictness of the government on this issue. For instance, the
MITIGATE GROWING TREND OF ONLINE SCAMS AND FRAUDS
5
Computer Fraud and Abuse Act of 1986 makes it a wrongdoing for anybody to access without
approval a computer or computer system utilized by a monetary foundation, US government office,
or any association or individual associated with highway or unfamiliar trade or communication.
Conclusion
It concludes that the rate of online scams and frauds is increasing mainly because of lack of
awareness of digital banking services and online shopping trends. These frauds can reduce by taking
some effective steps. The private sector and government should work together to overcome or
reduce these incidents. There are remarkable efforts from the private sector and the government to
fight the scammers. But at the end of all that effort, the number of victims is still high. Therefore
there is a need for more research to be done. The government and private sector act limited the
online fraud victims.
MITIGATE GROWING TREND OF ONLINE SCAMS AND FRAUDS
6
References
Brookes, A., & Dowell, D. (2019). The Psychology of Internet Fraud Victimisation: a Systematic
Review.
Journal of Police and Criminal Psychology
, 231–245.
Button, M., & Nicholls, C. C. (2014). Online frauds: Learning from victims why they fall for these
scams.
Australian and New Zealand Journal of Criminology
, 391-408.
Cross, C. (2019). Is online fraud just fraud? Examining the efficacy of the digital divide.
Journal of
Criminological Research Policy and Practice
.
Fletcher, E. (2022).
Social media a gold mine for scammers in 2021
. Retrieved from FTC:
https://www.ftc.gov/news-events/data-visualizations/data-spotlight/2022/01/social-media-
gold-mine-scammers-2021#footnote3
Iacurci, G. (2022).
Consumers lost $5.8 billion to fraud last year — up 70% over 2020
. Retrieved
from CNBC: https://www.cnbc.com/2022/02/22/consumers-lost-5point8-billion-to-fraud-
last-year-up-70percent-over-2020.html
Junger, M. (2020). Fraud against businesses both online and offline: crime scripts, business
characteristics, efforts, and benefits.
Crime Science
.
Reynolds, J. (2020).
9 reasons digital fraud is on the rise
. Retrieved from Securitymagazine:
https://www.securitymagazine.com/articles/93912-reasons-digital-fraud-is-on-the-rise
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Preventing Cybercrime and Identity Theft
Cybercrime and identity theft have become a growing problem in all aspects of society in recent years. Locate an article about cybercrime or identity theft in an organization from one of the types we have discussed in the course (government, not-for-profit organization, healthcare organization, or college or university). Summarize the case of cybercrime or identity theft in your article. What are the risks of these types of crimes to their organization? How can auditing and internal controls help prevent a company from falling prey to cybercrime?
Then, review the examples shared by your peers. What strategies related to auditing and internal controls could you suggest for the organizations they shared?
arrow_forward
1. FRAUD SCHEME HEALTH
INSPECTOR
A city health inspector threatens to close down a restau-
rant by issuing a fake health violation notice if the owner
does not make a financial payment to the inspector. If
the restaurant owner does not cooperate, he will not be
able to open for business and the publicity will drive
away his customers permanently. Faced with a threat
of economic loss, the owner makes the payment.
Required
What type of fraud is this, and what controls can be
implemented to prevent or detect the fraud?
arrow_forward
Internal Control-Fraud Triangle
Identify the fraud triangle risk factor (opportunity-O, pressure-P or
rationalization-R) in each situation.
1.
2.
3.
Employeees are told to report increased income or be fired.
Several sales clerks share the same cash drawer.
A worker did not receive a bonus this year and now feels it's okay
to use the company credit cared for personal expenses.
4.
Doors safeguarding valuable merchandise are not locked with a
passcode.
An employee feels underpaid and believes stealing inventory is
justified.
5.
arrow_forward
Case 1: Fraud examination
Karen, a friend of yours, recently started her own busi- ness, The Bike and Boulder Company (B&B). B&B specializes in the sales of mountain bikes and rock- climbing equipment. Karen is putting the finishing touches on her company policies and procedures. She knows you are taking a fraud class and asks you to review what she has completed thus far. You quickly notice that Karen has neglected to address fraud and fraud prevention in her policies and proce- dures. What policies and procedures would you suggest Karen implement to prevent and detect fraud at B&B?
arrow_forward
Discussion Questions on Fraud Prevention from Chapter 4 Fraud Examination 4th Edition
1. How do organizations create a culture of honesty, openness, and assistance?
2. What are different ways in which companies can eliminate opportunities for fraud?
3. What is the purpose of adopting a code of ethics throughout a company?
arrow_forward
Answer multi choice question in photo please
arrow_forward
Which of the following is NOT a behavioral red flag of the fraudster?
a) Addictions
b) Switches jobs every 2-3 years
c) Peer pressure
d) Living beyond means
arrow_forward
Types of Cyber Crimes. The following situations are similar, but each represents a variation of a particular crime. Identify the crime and point out the differences in the variations.
(a) Chen, posing fraudulently as Diamond Credit Card Co., sends an e-mail to Emily, stating that the company has observed suspicious activity in her account and has frozen the account. The e-mail asks her to reregister her credit-card number and password to reopen the account. Chen's action is cyber theft. In this situation, it would be phishing, which is a district form of identity theft. Chen is the perpetrator to find out about Emily’s financial data and passwords by posing as Diamond Credit Card Co. The suspicious activity in her account and the frozen of her account are part of the schemes for the perpetrator to seek information from Emily. He included this information to frighten Emily, so she will immediately respond with information and her account wouldn’t be frozen. When Chen has her…
arrow_forward
Provide an example of each of the following;
Conspicuous consumption
Information you will need to fill out an application to rent an apartment
A government agency you can contact to file a fraud complaint
A way to prevent fraud on your credit card
A way to protect yourself from identity theft
arrow_forward
Select the correct answer(s) for the following multiple choice questions. Note that there may be more than one correct answer.
Which of the following statements is (are) true about computer fraud perpetrators?
a. They are typically younger and are motivated by curiosity, the challenge of beating the system, and gaining stature in the hacking community.
b. They do not see themselves as criminals and rarely, if ever, seek to turn their actions into money.
c. They write and sell malicious software that infect computers with viruses or can be used to steal money or data that can be sold.
d. They are a top FBI priority because they organize fraud schemes targeted at specific individuals and businesses.
arrow_forward
What is a good response to...
For this week’s discussion I chose to research and answer question number two. Explain why denial of service attacks are such a danger to online retailers?
Denial of Service (DoS) attacks are particularly dangerous for online retailers due to their immediate and serious impact on business operations. In the case of Soap Shop, the three-day vendor website shutdown demonstrates how vulnerable e-tailers are to such disruptions. A DoS attack can incapacitate key operational components, like Soap Shop’s auction-based vendor system, which directly affects their ability to procure products. For a company utilizing a Just-In-Time (JIT) system, where inventory levels are kept minimal to reduce storage costs and increase efficiency, even a short disruption in supply chains can cause significant operational challenges (Jenkins, 2023). Soap Shop’s inability to fill customer orders due to the DoS attack highlights this vulnerability.
The financial repercussions of…
arrow_forward
Accounting
This is a business law principle for today's commercial environment by Twomey| Jennings |Greene 5th edition Question-what do you think of the increasing amount of reliance on electronic interactions? Some banks now charge to return the actual canceled check and some think that it is only a matter of time before there will be a charge for dealing with a "real" teller. What are the repercussions, good and bad, of this move toward electronic financial transactions?
arrow_forward
Please Solve In 20mins
arrow_forward
fast pls
A procurement agent for a large metropolitan building authority threatens to blacklist a building contractor if he does not make a financial payment to the agent. If the contractor does not cooperate, the contractor will be denied future work. Faced with a threat of economic loss, the contractor makes the payment.Required;Explain what type of fraud is this and what controls can be implemented to prevent or detect the fraud?
arrow_forward
Question 9
A warning for an individual that someone is trying to obtain and use their personal information.
Your answer:
fraud
fraud alert
retrovirus
spoofing
Clear anser
Back
Next
arrow_forward
The objectives of a fraud investigation may include which of the following?
Not getting the authorities involved
Avoiding large insurance claims
Posting embarrassing reports on social media
Punishing the guilty and obtaining restitution
arrow_forward
Ababout introduction or overview,tell me which is correct option and with reason why ? tell me which are incorrect option and with reason why ?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Century 21 Accounting Multicolumn Journal
Accounting
ISBN:9781337679503
Author:Gilbertson
Publisher:Cengage
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
PFIN (with PFIN Online, 1 term (6 months) Printed...
Finance
ISBN:9781337117005
Author:Randall Billingsley, Lawrence J. Gitman, Michael D. Joehnk
Publisher:Cengage Learning
Related Questions
- Preventing Cybercrime and Identity Theft Cybercrime and identity theft have become a growing problem in all aspects of society in recent years. Locate an article about cybercrime or identity theft in an organization from one of the types we have discussed in the course (government, not-for-profit organization, healthcare organization, or college or university). Summarize the case of cybercrime or identity theft in your article. What are the risks of these types of crimes to their organization? How can auditing and internal controls help prevent a company from falling prey to cybercrime? Then, review the examples shared by your peers. What strategies related to auditing and internal controls could you suggest for the organizations they shared?arrow_forward1. FRAUD SCHEME HEALTH INSPECTOR A city health inspector threatens to close down a restau- rant by issuing a fake health violation notice if the owner does not make a financial payment to the inspector. If the restaurant owner does not cooperate, he will not be able to open for business and the publicity will drive away his customers permanently. Faced with a threat of economic loss, the owner makes the payment. Required What type of fraud is this, and what controls can be implemented to prevent or detect the fraud?arrow_forwardInternal Control-Fraud Triangle Identify the fraud triangle risk factor (opportunity-O, pressure-P or rationalization-R) in each situation. 1. 2. 3. Employeees are told to report increased income or be fired. Several sales clerks share the same cash drawer. A worker did not receive a bonus this year and now feels it's okay to use the company credit cared for personal expenses. 4. Doors safeguarding valuable merchandise are not locked with a passcode. An employee feels underpaid and believes stealing inventory is justified. 5.arrow_forward
- Case 1: Fraud examination Karen, a friend of yours, recently started her own busi- ness, The Bike and Boulder Company (B&B). B&B specializes in the sales of mountain bikes and rock- climbing equipment. Karen is putting the finishing touches on her company policies and procedures. She knows you are taking a fraud class and asks you to review what she has completed thus far. You quickly notice that Karen has neglected to address fraud and fraud prevention in her policies and proce- dures. What policies and procedures would you suggest Karen implement to prevent and detect fraud at B&B?arrow_forwardDiscussion Questions on Fraud Prevention from Chapter 4 Fraud Examination 4th Edition 1. How do organizations create a culture of honesty, openness, and assistance? 2. What are different ways in which companies can eliminate opportunities for fraud? 3. What is the purpose of adopting a code of ethics throughout a company?arrow_forwardAnswer multi choice question in photo pleasearrow_forward
- Which of the following is NOT a behavioral red flag of the fraudster? a) Addictions b) Switches jobs every 2-3 years c) Peer pressure d) Living beyond meansarrow_forwardTypes of Cyber Crimes. The following situations are similar, but each represents a variation of a particular crime. Identify the crime and point out the differences in the variations. (a) Chen, posing fraudulently as Diamond Credit Card Co., sends an e-mail to Emily, stating that the company has observed suspicious activity in her account and has frozen the account. The e-mail asks her to reregister her credit-card number and password to reopen the account. Chen's action is cyber theft. In this situation, it would be phishing, which is a district form of identity theft. Chen is the perpetrator to find out about Emily’s financial data and passwords by posing as Diamond Credit Card Co. The suspicious activity in her account and the frozen of her account are part of the schemes for the perpetrator to seek information from Emily. He included this information to frighten Emily, so she will immediately respond with information and her account wouldn’t be frozen. When Chen has her…arrow_forwardProvide an example of each of the following; Conspicuous consumption Information you will need to fill out an application to rent an apartment A government agency you can contact to file a fraud complaint A way to prevent fraud on your credit card A way to protect yourself from identity theftarrow_forward
- Select the correct answer(s) for the following multiple choice questions. Note that there may be more than one correct answer. Which of the following statements is (are) true about computer fraud perpetrators? a. They are typically younger and are motivated by curiosity, the challenge of beating the system, and gaining stature in the hacking community. b. They do not see themselves as criminals and rarely, if ever, seek to turn their actions into money. c. They write and sell malicious software that infect computers with viruses or can be used to steal money or data that can be sold. d. They are a top FBI priority because they organize fraud schemes targeted at specific individuals and businesses.arrow_forwardWhat is a good response to... For this week’s discussion I chose to research and answer question number two. Explain why denial of service attacks are such a danger to online retailers? Denial of Service (DoS) attacks are particularly dangerous for online retailers due to their immediate and serious impact on business operations. In the case of Soap Shop, the three-day vendor website shutdown demonstrates how vulnerable e-tailers are to such disruptions. A DoS attack can incapacitate key operational components, like Soap Shop’s auction-based vendor system, which directly affects their ability to procure products. For a company utilizing a Just-In-Time (JIT) system, where inventory levels are kept minimal to reduce storage costs and increase efficiency, even a short disruption in supply chains can cause significant operational challenges (Jenkins, 2023). Soap Shop’s inability to fill customer orders due to the DoS attack highlights this vulnerability. The financial repercussions of…arrow_forwardAccounting This is a business law principle for today's commercial environment by Twomey| Jennings |Greene 5th edition Question-what do you think of the increasing amount of reliance on electronic interactions? Some banks now charge to return the actual canceled check and some think that it is only a matter of time before there will be a charge for dealing with a "real" teller. What are the repercussions, good and bad, of this move toward electronic financial transactions?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Century 21 Accounting Multicolumn JournalAccountingISBN:9781337679503Author:GilbertsonPublisher:CengageAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
- PFIN (with PFIN Online, 1 term (6 months) Printed...FinanceISBN:9781337117005Author:Randall Billingsley, Lawrence J. Gitman, Michael D. JoehnkPublisher:Cengage Learning
Century 21 Accounting Multicolumn Journal
Accounting
ISBN:9781337679503
Author:Gilbertson
Publisher:Cengage
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
PFIN (with PFIN Online, 1 term (6 months) Printed...
Finance
ISBN:9781337117005
Author:Randall Billingsley, Lawrence J. Gitman, Michael D. Joehnk
Publisher:Cengage Learning