2015
DOI: 10.1016/j.chb.2015.04.058
|View full text |Cite
|
Sign up to set email alerts
|

Factors affecting internet frauds in private sector: A case study in Cyberspace Surveillance and Scam Monitoring Agency of Iran

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
20
0
2

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(22 citation statements)
references
References 5 publications
0
20
0
2
Order By: Relevance
“…Information technology has advanced rapidly in recent decades, along with the rapid growth in the number of Internet users. Although the Internet provides numerous benefits and has changed society positively, it has also created a space in which criminals can operate, created new avenues for criminal pursuits, and facilitated new forms of victimization (Vahdati and Yasini, 2015;Arora, 2016). Furthermore, although fraudulent commercial transactions have long been a problem, advances in the Internet have transformed their dynamics and provided numerous alternative methods for conducting criminal activity online (Aleem and Antwi-Boasiako, 2011).…”
Section: Internet Fraudmentioning
confidence: 99%
See 1 more Smart Citation
“…Information technology has advanced rapidly in recent decades, along with the rapid growth in the number of Internet users. Although the Internet provides numerous benefits and has changed society positively, it has also created a space in which criminals can operate, created new avenues for criminal pursuits, and facilitated new forms of victimization (Vahdati and Yasini, 2015;Arora, 2016). Furthermore, although fraudulent commercial transactions have long been a problem, advances in the Internet have transformed their dynamics and provided numerous alternative methods for conducting criminal activity online (Aleem and Antwi-Boasiako, 2011).…”
Section: Internet Fraudmentioning
confidence: 99%
“…Internet fraud is one of the forms of computer crime that is increasing in prevalence most rapidly. Internet fraud refers to fraud schemes that take advantage of one or more feature of the Internet to commit a crime (Vahdati and Yasini, 2015). These features can be websites, email, message boards, or chat rooms.…”
Section: Internet Fraudmentioning
confidence: 99%
“…(Cheng et al, 2015;Tan et al, 2016) Fraud detection systems rely on knowledge, skills and expertise of fraud managers or domain experts. (Vahdati and Yasini, 2015) Detection cues require regular upgrading, maintenance and require accuracy in threshold and parameter definition according to identity fraud trends. (Allan and Zhan, 2010) The organisations should monitor individual identities and ask for identity document as a proof of identity for early identity fraud detection.…”
Section: Findings Referencesmentioning
confidence: 99%
“…The fraud analysis initiated with potential risk assessment, which includes identifying fraud trends, schemes, incentives (fraud losses), opportunities for fraud occurrence and loopholes in technological systems. (Brody et al, 2007;Rose et al, 2015;Weisman and Brodsky, 2011) Effective identity fraud management depends upon the performance of tools, techniques, strategies, processes and employees' who works at different stages of fraud management (Dorminey et al, 2012;Phan and Vogel, 2010;Vahdati and Yasini, 2015) The evaluation activity helps to analyse employees' strengths, weaknesses, behaviour, quality of work and their issues. (Vahdati and Yasini, 2015) The evaluation is a process that helps the organisation to identify and understand the weakness and loopholes in tools and practices of identity fraud management.…”
Section: Findings Referencesmentioning
confidence: 99%
See 1 more Smart Citation