Fraudulent Schemes and Theft Online

Fraudulent Schemes and Theft Online in United States

Fraudulent Schemes and Theft Online

Overview of Fraudulent Schemes and Theft Online in relation to cyber crime: [1] Today’s high tech fraud schemes and online theft generally employ the same principles that fraudsters and thieves have always used: motivation, imagination, criminal intent, knowledge, access to suitable targets, lulling them into a false sense of security, and technological skills. Thus, fraudulent schemes involve acquiring valued items by deceit. ”Fraud committed using stand alone or networked computers or other types of electronic devices can be accomplished in several different ways that are particularly deceptive because techniques involved often require technical understanding of how IT and computers can be abused” (McQuade, 2006, 68). Let us consider several ways in which online fraud and theft can occur.

Resources

Notes and References

  1. By Samuel C. McQuade, III

See Also

  • Types of Cybercrime
  • Cybercriminal

Further Reading

McQuade, S. (2006). Understanding and managing cybercrime, 67–74. Boston: Allyn and Bacon; The Silver Lake Editors. (2006). Scams & swindles: Phishing, spoofing, ID theft, Nigerian advance schemes investment frauds: How to Recognize and avoid rip-offs in the Internet age. Lansdowne, PA: Silver Lake Publishing; Thomes, J.T. (2000). Dotcons: Con games, fraud & deceit on the Internet. Bloomington, IN: Writers Club Press; Wall, D.S. (2007). Crime and the Internet. London, England: Taylor & Francis; Wells, J., & Association of Certified Fraud Examiners. (2004). The computer and Internet fraud manual. Austin, TX: Association of Certified Fraud Examiners, Inc.Willcox, B. (2005). Diary of an eBay fraud case. Pittsburgh, PA: Red Lead Press.


Posted

in

,

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *