Fraudulent Schemes and Theft Online in United States
Fraudulent Schemes and Theft Online
Overview of Fraudulent Schemes and Theft Online in relation to cyber crime: [1] Today’s high tech fraud schemes and online theft generally employ the same principles that fraudsters and thieves have always used: motivation, imagination, criminal intent, knowledge, access to suitable targets, lulling them into a false sense of security, and technological skills. Thus, fraudulent schemes involve acquiring valued items by deceit. ”Fraud committed using stand alone or networked computers or other types of electronic devices can be accomplished in several different ways that are particularly deceptive because techniques involved often require technical understanding of how IT and computers can be abused” (McQuade, 2006, 68). Let us consider several ways in which online fraud and theft can occur.
Resources
Notes and References
- By Samuel C. McQuade, III
See Also
- Types of Cybercrime
- Cybercriminal
Further Reading
McQuade, S. (2006). Understanding and managing cybercrime, 67–74. Boston: Allyn and Bacon; The Silver Lake Editors. (2006). Scams & swindles: Phishing, spoofing, ID theft, Nigerian advance schemes investment frauds: How to Recognize and avoid rip-offs in the Internet age. Lansdowne, PA: Silver Lake Publishing; Thomes, J.T. (2000). Dotcons: Con games, fraud & deceit on the Internet. Bloomington, IN: Writers Club Press; Wall, D.S. (2007). Crime and the Internet. London, England: Taylor & Francis; Wells, J., & Association of Certified Fraud Examiners. (2004). The computer and Internet fraud manual. Austin, TX: Association of Certified Fraud Examiners, Inc.Willcox, B. (2005). Diary of an eBay fraud case. Pittsburgh, PA: Red Lead Press.
Leave a Reply