SlideShare una empresa de Scribd logo
1 de 25
Descargar para leer sin conexión
Internet Fraud
Dr. Elijah Ezendu
FIMC, FCCM, FIIAN, FBDI, FAAFM, FSSM, MIMIS, MIAP, MITD, ACIArb, ACIPM,
PhD, DocM, MBA, CWM, CBDA, CMA, MPM, PME, CSOL, CCIP, CMC, CMgr
Learning Objectives
At the end of this course, participants should be
able to do the following:
• Identify the nature of internet fraud
• List the tools used for internet fraud
• Categorise internet fraudulent practices
“Internet fraud is a form of fraud which
uses any component of the Internet to
accomplish the intended fraudulent
activity.”
- National White Collar Crime Center, USA
“The term ‘Internet fraud’ refers generally to any
type of fraud scheme that uses one or more
components of the Internet - such as chat
rooms, e-mail, message boards, or Web sites -
to present fraudulent solicitations to
prospective victims, to conduct fraudulent
transactions, or to transmit the proceeds of
fraud to financial institutions or to other
connected with the scheme.”
Source: US Department of Justice
“Internet auction fraud was by far the most
reported offense, comprising 44.9% of referred
complaints. Non-delivered merchandise
and/or payment accounted for 19.0% of
complaints. Check fraud made up 4.9% of
complaints. Credit/debit card fraud, computer
fraud, confidence fraud, and financial
institutions fraud round out the top seven
categories of complaints referred to law
enforcement during the year.”
Source: Internet Crime Complaints Center
Tools Used for Internet Fraud
• Email
• Chat rooms
• Websites
• Message Boards
• Portals
• Web Application
Types of Internet Fraud 1
• Credit/Debit Card Fraud
• Business Deceit
• Recruitment Deceit
• Freight Forwarding Scam
• Counterfeit Cheque Scam
• Advance Fee Fraud
• Non-Delivery of Goods/Service Fraud
Types of Internet Fraud 2
• Fake Escrow Scam
• Spoofing/Phishing Scam
• Investment Rip-Off
• Identity Theft
• Ponzi/Pyramid Fraud
• Auction Fraud
Credit/Debit Card Fraud
This involves the use of credit/debit card to
obtain money or acquire properties without
appropriate authorization.
Fraudsters obtain credit/debit card numbers of
victims from unsecured web media.
Business Deceit
In this case, fraudsters masquerade themselves
as genuine business people and attempt to
collect personal information such as social
security number and date of birth from
respondents, in order to use the data for
purchasing goods which would most likely be
transferred or shipped out of the country.
Recruitment Deceit
Generic public or private portals can be used for
advertising spurious job openings with the
intention to collect vital information from
applicants, and deploy them for purchasing
goods.
Freight Forwarding Scam
This is an internet fraud that entails the
movement of merchandise from one party to
another until it gets to the major perpetrator,
who must have enlisted the other participants
without informing them that the goods were
bought with fake credit cards.
Counterfeit Cheque Scam
This entails the use of counterfeit cheque to pay
for goods, such that the face value of the
cheque would be far higher than the
requirement; thus the seller would be
instructed to return the overage amount to a
foreign account because it’s needed for an
ancillary purpose.
Advance Fee Fraud
This is popularly known as 4-1-9. It refers to the
type of fraud in which a substantial amount
would be demanded for payment of
processing fees that stand as requirement for
release of non-existing merchandise or large
amount of money.
Non-Delivery of Goods/Service Fraud
This refers to scam in which people are
encouraged to pay for goods and or service
via a web portal, and thereafter nothing
would be delivered to the buyers.
Fake Escrow Scam
This involves presentation of a spoofed website
of a third party as a medium for payment ,
claiming that when the merchandise is
successfully shipped to a buyer only then
would the money be transferred to the seller;
even when the supposed escrow service is a
falsification and simply an account of the
same seller.
Spoofing/Phishing Scam
Spoofing is a type of fraud in which a fraudster
masquerades as another person by using
another person’s email identity or header to
transact business and obtain vital information
such as bank account numbers, credit card
numbers and associated passwords. While
Phishing is a form of spoofing in which the
webpage of a particular entity can be
duplicated and positioned with url for the
purpose of luring people to divulge vital
financial information.
Typical Webpage Used for Phishing
Investment Rip-Off
This refers to a system of trading on
counterfeit securities or using fraudulent
claims to solicit for loan or investment.
Identity Theft
This entails the use of another’s personal
information without appropriate consent, for
the purpose of fraudulent practices.
Ponzi/Pyramid Fraud
This is a system of luring investors to invest in a
scheme in which the investment firm
promises abnormally high returns, meanwhile
the early investors shall be paid with
investment capital obtained from successive
investors. The payment chain would continue
till the point of collapse.
Auction Fraud
In this case, people are encouraged to
participate in online auction and when money
must have been paid for specific items, the
fraudster would send either a lower standard
item or counterfeit.
Exercise
1. Identify the key relationship between
business deceit and phishing.
2. List two examples of Ponzi Pyramid Fraud
Dr Elijah Ezendu is Award-Winning Business Expert & Certified Management Consultant with expertise
in Interim Management, Strategy, Competitive Intelligence, Transformation, Restructuring, Turnaround
Management, Business Development, Marketing, Project & Cost Management, Leadership, HR, CSR, e-
Business & Software Architecture. He had functioned as Founder, Initiative for Sustainable Business
Equity; Chairman of Board, Charisma Broadcast Film Academy; Group Chief Operating Officer, Idova
Group; CEO, Rubiini (UAE); Special Advisor, RTEAN; Director, MMNA Investments; Chair, Int’l Board of
GCC Business Council (UAE); Senior Partner, Shevach Consulting; Chairman (Certification & Training),
Coordinator (Board of Fellows), Lead Assessor & Governing Council Member, Institute of Management
Consultants, Nigeria; Lead Resource, Centre for Competitive Intelligence Development; Lead
Consultant/ Partner, JK Michaels; Turnaround Project Director, Consolidated Business Holdings Limited;
Technical Director, Gestalt; Chief Operating Officer, Rohan Group; Executive Director (Various Roles),
Fortuna, Gambia & Malta; Chief Advisor/ Partner, D & E; Vice Chairman of Board, Refined Shipping;
Director of Programmes & Governing Council Member, Institute of Business Development, Nigeria;
Member of TDD Committee, International Association of Software Architects, USA; Member of Strategic
Planning and Implementation Committee, Chartered Institute of Personnel Management of Nigeria;
Country Manager (Nigeria) & Adjunct Faculty (MBA Programme), Regent Business School, South Africa;
Adjunct Faculty (MBA Programme), Ladoke Akintola University of Technology; Editor-in-Chief, Cost
Management Journal; Council Member, Institute of Internal Auditors of Nigeria; Member, Board of
Directors (Several Organizations). He holds Doctoral Degree in Management, Master of Business
Administration and Fellow of Professional Institutes in North America, UK & Nigeria. He is Innovator of
Corporate Investment Structure Based on Financials and Intangibles, for valuation highlighting
intangible contributions of host communities and ecological environment: A model celebrated globally
as remedy for unmitigated depreciation of ecological capital and developmental deprivation of host
communities. He had served as Examiner to Professional Institutes and Universities. He had been a
member of Guild of Soundtrack Producers of Nigeria. He's an author and extensively featured speaker.
Thank You

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber law
Cyber lawCyber law
Cyber law
 
Spamming
SpammingSpamming
Spamming
 
cyber crime
cyber crimecyber crime
cyber crime
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

Similar a Internet Fraud

Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud Dixita S
 
Digital World Unraveling Scam Verification and Protective Measures.docx
Digital World Unraveling Scam Verification and Protective Measures.docxDigital World Unraveling Scam Verification and Protective Measures.docx
Digital World Unraveling Scam Verification and Protective Measures.docxMusharrafKhan32
 
Unveiling the Threat How to Recognize and Report Crypto Scams
Unveiling the Threat  How to Recognize and Report Crypto ScamsUnveiling the Threat  How to Recognize and Report Crypto Scams
Unveiling the Threat How to Recognize and Report Crypto ScamsMike Bike
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdfMerchantech - Payment Processing Services
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptxdarrengracia
 
Fraud management - eCommerce fraud explained
Fraud management - eCommerce fraud explainedFraud management - eCommerce fraud explained
Fraud management - eCommerce fraud explainedAaronSmith41007
 
Faisal Abidi’s Outlook On How To Avoid Mass Marketing Fraud | Mass Marketing ...
Faisal Abidi’s Outlook On How To Avoid Mass Marketing Fraud | Mass Marketing ...Faisal Abidi’s Outlook On How To Avoid Mass Marketing Fraud | Mass Marketing ...
Faisal Abidi’s Outlook On How To Avoid Mass Marketing Fraud | Mass Marketing ...Faisal Abidi
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A ReviewIRJET Journal
 
CYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptxCYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptxSunnyRajak12
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfGiuliaAiolo
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfSimnMarnMartn
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfAndreaCalza2
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfHctorAlfaroMadrid
 

Similar a Internet Fraud (20)

Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
Digital World Unraveling Scam Verification and Protective Measures.docx
Digital World Unraveling Scam Verification and Protective Measures.docxDigital World Unraveling Scam Verification and Protective Measures.docx
Digital World Unraveling Scam Verification and Protective Measures.docx
 
Unveiling the Threat How to Recognize and Report Crypto Scams
Unveiling the Threat  How to Recognize and Report Crypto ScamsUnveiling the Threat  How to Recognize and Report Crypto Scams
Unveiling the Threat How to Recognize and Report Crypto Scams
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
 
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
Credit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptxCredit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptx
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Fraud management - eCommerce fraud explained
Fraud management - eCommerce fraud explainedFraud management - eCommerce fraud explained
Fraud management - eCommerce fraud explained
 
Faisal Abidi’s Outlook On How To Avoid Mass Marketing Fraud | Mass Marketing ...
Faisal Abidi’s Outlook On How To Avoid Mass Marketing Fraud | Mass Marketing ...Faisal Abidi’s Outlook On How To Avoid Mass Marketing Fraud | Mass Marketing ...
Faisal Abidi’s Outlook On How To Avoid Mass Marketing Fraud | Mass Marketing ...
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
 
CYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptxCYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptx
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdf
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdf
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdf
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdf
 

Más de Elijah Ezendu

Execution intelligence
Execution intelligenceExecution intelligence
Execution intelligenceElijah Ezendu
 
Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...
Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...
Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...Elijah Ezendu
 
Future of Work by Dr Elijah Ezendu, FRSA.
Future of Work by Dr Elijah Ezendu, FRSA.Future of Work by Dr Elijah Ezendu, FRSA.
Future of Work by Dr Elijah Ezendu, FRSA.Elijah Ezendu
 
Employer and Employee Relationship Versus Future of Work
Employer and Employee Relationship Versus Future of Work Employer and Employee Relationship Versus Future of Work
Employer and Employee Relationship Versus Future of Work Elijah Ezendu
 
Speaking to Influence Executives
Speaking to Influence ExecutivesSpeaking to Influence Executives
Speaking to Influence ExecutivesElijah Ezendu
 
Performance Wingspan Optimization Approach by Elijah Ezendu
Performance Wingspan Optimization Approach by Elijah EzenduPerformance Wingspan Optimization Approach by Elijah Ezendu
Performance Wingspan Optimization Approach by Elijah EzenduElijah Ezendu
 
Creative Selling Model for Boosting Sales Performance During Recession and Tu...
Creative Selling Model for Boosting Sales Performance During Recession and Tu...Creative Selling Model for Boosting Sales Performance During Recession and Tu...
Creative Selling Model for Boosting Sales Performance During Recession and Tu...Elijah Ezendu
 
Four Categorical Action Streams of Strategy as Yield Determinant
Four Categorical Action Streams of Strategy as Yield DeterminantFour Categorical Action Streams of Strategy as Yield Determinant
Four Categorical Action Streams of Strategy as Yield DeterminantElijah Ezendu
 
Strategic Framework for Implementation of ‘Living Our Brand’ by Elijah Ezendu
Strategic Framework for Implementation of ‘Living Our Brand’ by Elijah EzenduStrategic Framework for Implementation of ‘Living Our Brand’ by Elijah Ezendu
Strategic Framework for Implementation of ‘Living Our Brand’ by Elijah EzenduElijah Ezendu
 
10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...
10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...
10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...Elijah Ezendu
 
Spectrum of Collective Leadership by Elijah Ezendu
Spectrum of Collective Leadership by Elijah EzenduSpectrum of Collective Leadership by Elijah Ezendu
Spectrum of Collective Leadership by Elijah EzenduElijah Ezendu
 
Leadership Development Strategy and Strategic Planning: The Chicken and Egg ...
Leadership Development Strategy and Strategic Planning:  The Chicken and Egg ...Leadership Development Strategy and Strategic Planning:  The Chicken and Egg ...
Leadership Development Strategy and Strategic Planning: The Chicken and Egg ...Elijah Ezendu
 
Performance of Knowledge Management
Performance of Knowledge ManagementPerformance of Knowledge Management
Performance of Knowledge ManagementElijah Ezendu
 
6 P's of Knowledge Management Performance
6 P's of Knowledge Management Performance6 P's of Knowledge Management Performance
6 P's of Knowledge Management PerformanceElijah Ezendu
 
Knowledge Management System & Technology
Knowledge Management System & TechnologyKnowledge Management System & Technology
Knowledge Management System & TechnologyElijah Ezendu
 
7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...
7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...
7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...Elijah Ezendu
 
Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...
Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...
Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...Elijah Ezendu
 
13 Pillars of Corporate Harmony by Elijah Ezendu
13 Pillars of Corporate Harmony by Elijah Ezendu13 Pillars of Corporate Harmony by Elijah Ezendu
13 Pillars of Corporate Harmony by Elijah EzenduElijah Ezendu
 
Ratiocinative Analysis of Budd's Model for Effective Partnership
Ratiocinative Analysis of Budd's Model for Effective PartnershipRatiocinative Analysis of Budd's Model for Effective Partnership
Ratiocinative Analysis of Budd's Model for Effective PartnershipElijah Ezendu
 
Three Models of Corporate Investment Structure Based on Financials and Intang...
Three Models of Corporate Investment Structure Based on Financials and Intang...Three Models of Corporate Investment Structure Based on Financials and Intang...
Three Models of Corporate Investment Structure Based on Financials and Intang...Elijah Ezendu
 

Más de Elijah Ezendu (20)

Execution intelligence
Execution intelligenceExecution intelligence
Execution intelligence
 
Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...
Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...
Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...
 
Future of Work by Dr Elijah Ezendu, FRSA.
Future of Work by Dr Elijah Ezendu, FRSA.Future of Work by Dr Elijah Ezendu, FRSA.
Future of Work by Dr Elijah Ezendu, FRSA.
 
Employer and Employee Relationship Versus Future of Work
Employer and Employee Relationship Versus Future of Work Employer and Employee Relationship Versus Future of Work
Employer and Employee Relationship Versus Future of Work
 
Speaking to Influence Executives
Speaking to Influence ExecutivesSpeaking to Influence Executives
Speaking to Influence Executives
 
Performance Wingspan Optimization Approach by Elijah Ezendu
Performance Wingspan Optimization Approach by Elijah EzenduPerformance Wingspan Optimization Approach by Elijah Ezendu
Performance Wingspan Optimization Approach by Elijah Ezendu
 
Creative Selling Model for Boosting Sales Performance During Recession and Tu...
Creative Selling Model for Boosting Sales Performance During Recession and Tu...Creative Selling Model for Boosting Sales Performance During Recession and Tu...
Creative Selling Model for Boosting Sales Performance During Recession and Tu...
 
Four Categorical Action Streams of Strategy as Yield Determinant
Four Categorical Action Streams of Strategy as Yield DeterminantFour Categorical Action Streams of Strategy as Yield Determinant
Four Categorical Action Streams of Strategy as Yield Determinant
 
Strategic Framework for Implementation of ‘Living Our Brand’ by Elijah Ezendu
Strategic Framework for Implementation of ‘Living Our Brand’ by Elijah EzenduStrategic Framework for Implementation of ‘Living Our Brand’ by Elijah Ezendu
Strategic Framework for Implementation of ‘Living Our Brand’ by Elijah Ezendu
 
10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...
10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...
10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...
 
Spectrum of Collective Leadership by Elijah Ezendu
Spectrum of Collective Leadership by Elijah EzenduSpectrum of Collective Leadership by Elijah Ezendu
Spectrum of Collective Leadership by Elijah Ezendu
 
Leadership Development Strategy and Strategic Planning: The Chicken and Egg ...
Leadership Development Strategy and Strategic Planning:  The Chicken and Egg ...Leadership Development Strategy and Strategic Planning:  The Chicken and Egg ...
Leadership Development Strategy and Strategic Planning: The Chicken and Egg ...
 
Performance of Knowledge Management
Performance of Knowledge ManagementPerformance of Knowledge Management
Performance of Knowledge Management
 
6 P's of Knowledge Management Performance
6 P's of Knowledge Management Performance6 P's of Knowledge Management Performance
6 P's of Knowledge Management Performance
 
Knowledge Management System & Technology
Knowledge Management System & TechnologyKnowledge Management System & Technology
Knowledge Management System & Technology
 
7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...
7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...
7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...
 
Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...
Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...
Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...
 
13 Pillars of Corporate Harmony by Elijah Ezendu
13 Pillars of Corporate Harmony by Elijah Ezendu13 Pillars of Corporate Harmony by Elijah Ezendu
13 Pillars of Corporate Harmony by Elijah Ezendu
 
Ratiocinative Analysis of Budd's Model for Effective Partnership
Ratiocinative Analysis of Budd's Model for Effective PartnershipRatiocinative Analysis of Budd's Model for Effective Partnership
Ratiocinative Analysis of Budd's Model for Effective Partnership
 
Three Models of Corporate Investment Structure Based on Financials and Intang...
Three Models of Corporate Investment Structure Based on Financials and Intang...Three Models of Corporate Investment Structure Based on Financials and Intang...
Three Models of Corporate Investment Structure Based on Financials and Intang...
 

Último

Thoma Bravo Equity - Presentation Pension Fund
Thoma Bravo Equity - Presentation Pension FundThoma Bravo Equity - Presentation Pension Fund
Thoma Bravo Equity - Presentation Pension FundAshwinJey
 
Global Economic Outlook, 2024 - Scholaride Consulting
Global Economic Outlook, 2024 - Scholaride ConsultingGlobal Economic Outlook, 2024 - Scholaride Consulting
Global Economic Outlook, 2024 - Scholaride Consultingswastiknandyofficial
 
ΤτΕ: Ανάπτυξη 2,3% και πληθωρισμός 2,8% φέτος
ΤτΕ: Ανάπτυξη 2,3% και πληθωρισμός 2,8% φέτοςΤτΕ: Ανάπτυξη 2,3% και πληθωρισμός 2,8% φέτος
ΤτΕ: Ανάπτυξη 2,3% και πληθωρισμός 2,8% φέτοςNewsroom8
 
ekthesi-trapeza-tis-ellados-gia-2023.pdf
ekthesi-trapeza-tis-ellados-gia-2023.pdfekthesi-trapeza-tis-ellados-gia-2023.pdf
ekthesi-trapeza-tis-ellados-gia-2023.pdfSteliosTheodorou4
 
Hello this ppt is about seminar final project
Hello this ppt is about seminar final projectHello this ppt is about seminar final project
Hello this ppt is about seminar final projectninnasirsi
 
What is sip and What are its Benefits in 2024
What is sip and What are its Benefits in 2024What is sip and What are its Benefits in 2024
What is sip and What are its Benefits in 2024prajwalgopocket
 
OAT_RI_Ep18 WeighingTheRisks_Mar24_GlobalCredit.pptx
OAT_RI_Ep18 WeighingTheRisks_Mar24_GlobalCredit.pptxOAT_RI_Ep18 WeighingTheRisks_Mar24_GlobalCredit.pptx
OAT_RI_Ep18 WeighingTheRisks_Mar24_GlobalCredit.pptxhiddenlevers
 
10 QuickBooks Tips 2024 - Globus Finanza.pdf
10 QuickBooks Tips 2024 - Globus Finanza.pdf10 QuickBooks Tips 2024 - Globus Finanza.pdf
10 QuickBooks Tips 2024 - Globus Finanza.pdfglobusfinanza
 
Gender and caste discrimination in india
Gender and caste discrimination in indiaGender and caste discrimination in india
Gender and caste discrimination in indiavandanasingh01072003
 
The Inspirational Story of Julio Herrera Velutini - Global Finance Leader
The Inspirational Story of Julio Herrera Velutini - Global Finance LeaderThe Inspirational Story of Julio Herrera Velutini - Global Finance Leader
The Inspirational Story of Julio Herrera Velutini - Global Finance LeaderArianna Varetto
 
Building pressure? Rising rents, and what to expect in the future
Building pressure? Rising rents, and what to expect in the futureBuilding pressure? Rising rents, and what to expect in the future
Building pressure? Rising rents, and what to expect in the futureResolutionFoundation
 
2024-04-09 - Pension Playpen roundtable - slides.pptx
2024-04-09 - Pension Playpen roundtable - slides.pptx2024-04-09 - Pension Playpen roundtable - slides.pptx
2024-04-09 - Pension Playpen roundtable - slides.pptxHenry Tapper
 
Kempen ' UK DB Endgame Paper Apr 24 final3.pdf
Kempen ' UK DB Endgame Paper Apr 24 final3.pdfKempen ' UK DB Endgame Paper Apr 24 final3.pdf
Kempen ' UK DB Endgame Paper Apr 24 final3.pdfHenry Tapper
 
Crypto Confidence Unlocked: AnyKYCaccount's Shortcut to Binance Verification
Crypto Confidence Unlocked: AnyKYCaccount's Shortcut to Binance VerificationCrypto Confidence Unlocked: AnyKYCaccount's Shortcut to Binance Verification
Crypto Confidence Unlocked: AnyKYCaccount's Shortcut to Binance VerificationAny kyc Account
 
Liquidity Decisions in Financial management
Liquidity Decisions in Financial managementLiquidity Decisions in Financial management
Liquidity Decisions in Financial managementshrutisingh143670
 
Money Forward Integrated Report “Forward Map” 2024
Money Forward Integrated Report “Forward Map” 2024Money Forward Integrated Report “Forward Map” 2024
Money Forward Integrated Report “Forward Map” 2024Money Forward
 
2B Nation-State.pptx contemporary world nation
2B  Nation-State.pptx contemporary world nation2B  Nation-State.pptx contemporary world nation
2B Nation-State.pptx contemporary world nationko9240888
 
Banking: Commercial and Central Banking.pptx
Banking: Commercial and Central Banking.pptxBanking: Commercial and Central Banking.pptx
Banking: Commercial and Central Banking.pptxANTHONYAKINYOSOYE1
 
Aon-UK-DC-Pension-Tracker-Q1-2024. slideshare
Aon-UK-DC-Pension-Tracker-Q1-2024. slideshareAon-UK-DC-Pension-Tracker-Q1-2024. slideshare
Aon-UK-DC-Pension-Tracker-Q1-2024. slideshareHenry Tapper
 
Introduction to Health Economics Dr. R. Kurinji Malar.pptx
Introduction to Health Economics Dr. R. Kurinji Malar.pptxIntroduction to Health Economics Dr. R. Kurinji Malar.pptx
Introduction to Health Economics Dr. R. Kurinji Malar.pptxDrRkurinjiMalarkurin
 

Último (20)

Thoma Bravo Equity - Presentation Pension Fund
Thoma Bravo Equity - Presentation Pension FundThoma Bravo Equity - Presentation Pension Fund
Thoma Bravo Equity - Presentation Pension Fund
 
Global Economic Outlook, 2024 - Scholaride Consulting
Global Economic Outlook, 2024 - Scholaride ConsultingGlobal Economic Outlook, 2024 - Scholaride Consulting
Global Economic Outlook, 2024 - Scholaride Consulting
 
ΤτΕ: Ανάπτυξη 2,3% και πληθωρισμός 2,8% φέτος
ΤτΕ: Ανάπτυξη 2,3% και πληθωρισμός 2,8% φέτοςΤτΕ: Ανάπτυξη 2,3% και πληθωρισμός 2,8% φέτος
ΤτΕ: Ανάπτυξη 2,3% και πληθωρισμός 2,8% φέτος
 
ekthesi-trapeza-tis-ellados-gia-2023.pdf
ekthesi-trapeza-tis-ellados-gia-2023.pdfekthesi-trapeza-tis-ellados-gia-2023.pdf
ekthesi-trapeza-tis-ellados-gia-2023.pdf
 
Hello this ppt is about seminar final project
Hello this ppt is about seminar final projectHello this ppt is about seminar final project
Hello this ppt is about seminar final project
 
What is sip and What are its Benefits in 2024
What is sip and What are its Benefits in 2024What is sip and What are its Benefits in 2024
What is sip and What are its Benefits in 2024
 
OAT_RI_Ep18 WeighingTheRisks_Mar24_GlobalCredit.pptx
OAT_RI_Ep18 WeighingTheRisks_Mar24_GlobalCredit.pptxOAT_RI_Ep18 WeighingTheRisks_Mar24_GlobalCredit.pptx
OAT_RI_Ep18 WeighingTheRisks_Mar24_GlobalCredit.pptx
 
10 QuickBooks Tips 2024 - Globus Finanza.pdf
10 QuickBooks Tips 2024 - Globus Finanza.pdf10 QuickBooks Tips 2024 - Globus Finanza.pdf
10 QuickBooks Tips 2024 - Globus Finanza.pdf
 
Gender and caste discrimination in india
Gender and caste discrimination in indiaGender and caste discrimination in india
Gender and caste discrimination in india
 
The Inspirational Story of Julio Herrera Velutini - Global Finance Leader
The Inspirational Story of Julio Herrera Velutini - Global Finance LeaderThe Inspirational Story of Julio Herrera Velutini - Global Finance Leader
The Inspirational Story of Julio Herrera Velutini - Global Finance Leader
 
Building pressure? Rising rents, and what to expect in the future
Building pressure? Rising rents, and what to expect in the futureBuilding pressure? Rising rents, and what to expect in the future
Building pressure? Rising rents, and what to expect in the future
 
2024-04-09 - Pension Playpen roundtable - slides.pptx
2024-04-09 - Pension Playpen roundtable - slides.pptx2024-04-09 - Pension Playpen roundtable - slides.pptx
2024-04-09 - Pension Playpen roundtable - slides.pptx
 
Kempen ' UK DB Endgame Paper Apr 24 final3.pdf
Kempen ' UK DB Endgame Paper Apr 24 final3.pdfKempen ' UK DB Endgame Paper Apr 24 final3.pdf
Kempen ' UK DB Endgame Paper Apr 24 final3.pdf
 
Crypto Confidence Unlocked: AnyKYCaccount's Shortcut to Binance Verification
Crypto Confidence Unlocked: AnyKYCaccount's Shortcut to Binance VerificationCrypto Confidence Unlocked: AnyKYCaccount's Shortcut to Binance Verification
Crypto Confidence Unlocked: AnyKYCaccount's Shortcut to Binance Verification
 
Liquidity Decisions in Financial management
Liquidity Decisions in Financial managementLiquidity Decisions in Financial management
Liquidity Decisions in Financial management
 
Money Forward Integrated Report “Forward Map” 2024
Money Forward Integrated Report “Forward Map” 2024Money Forward Integrated Report “Forward Map” 2024
Money Forward Integrated Report “Forward Map” 2024
 
2B Nation-State.pptx contemporary world nation
2B  Nation-State.pptx contemporary world nation2B  Nation-State.pptx contemporary world nation
2B Nation-State.pptx contemporary world nation
 
Banking: Commercial and Central Banking.pptx
Banking: Commercial and Central Banking.pptxBanking: Commercial and Central Banking.pptx
Banking: Commercial and Central Banking.pptx
 
Aon-UK-DC-Pension-Tracker-Q1-2024. slideshare
Aon-UK-DC-Pension-Tracker-Q1-2024. slideshareAon-UK-DC-Pension-Tracker-Q1-2024. slideshare
Aon-UK-DC-Pension-Tracker-Q1-2024. slideshare
 
Introduction to Health Economics Dr. R. Kurinji Malar.pptx
Introduction to Health Economics Dr. R. Kurinji Malar.pptxIntroduction to Health Economics Dr. R. Kurinji Malar.pptx
Introduction to Health Economics Dr. R. Kurinji Malar.pptx
 

Internet Fraud

  • 1. Internet Fraud Dr. Elijah Ezendu FIMC, FCCM, FIIAN, FBDI, FAAFM, FSSM, MIMIS, MIAP, MITD, ACIArb, ACIPM, PhD, DocM, MBA, CWM, CBDA, CMA, MPM, PME, CSOL, CCIP, CMC, CMgr
  • 2. Learning Objectives At the end of this course, participants should be able to do the following: • Identify the nature of internet fraud • List the tools used for internet fraud • Categorise internet fraudulent practices
  • 3. “Internet fraud is a form of fraud which uses any component of the Internet to accomplish the intended fraudulent activity.” - National White Collar Crime Center, USA
  • 4. “The term ‘Internet fraud’ refers generally to any type of fraud scheme that uses one or more components of the Internet - such as chat rooms, e-mail, message boards, or Web sites - to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to other connected with the scheme.” Source: US Department of Justice
  • 5. “Internet auction fraud was by far the most reported offense, comprising 44.9% of referred complaints. Non-delivered merchandise and/or payment accounted for 19.0% of complaints. Check fraud made up 4.9% of complaints. Credit/debit card fraud, computer fraud, confidence fraud, and financial institutions fraud round out the top seven categories of complaints referred to law enforcement during the year.” Source: Internet Crime Complaints Center
  • 6. Tools Used for Internet Fraud • Email • Chat rooms • Websites • Message Boards • Portals • Web Application
  • 7. Types of Internet Fraud 1 • Credit/Debit Card Fraud • Business Deceit • Recruitment Deceit • Freight Forwarding Scam • Counterfeit Cheque Scam • Advance Fee Fraud • Non-Delivery of Goods/Service Fraud
  • 8. Types of Internet Fraud 2 • Fake Escrow Scam • Spoofing/Phishing Scam • Investment Rip-Off • Identity Theft • Ponzi/Pyramid Fraud • Auction Fraud
  • 9. Credit/Debit Card Fraud This involves the use of credit/debit card to obtain money or acquire properties without appropriate authorization. Fraudsters obtain credit/debit card numbers of victims from unsecured web media.
  • 10. Business Deceit In this case, fraudsters masquerade themselves as genuine business people and attempt to collect personal information such as social security number and date of birth from respondents, in order to use the data for purchasing goods which would most likely be transferred or shipped out of the country.
  • 11. Recruitment Deceit Generic public or private portals can be used for advertising spurious job openings with the intention to collect vital information from applicants, and deploy them for purchasing goods.
  • 12. Freight Forwarding Scam This is an internet fraud that entails the movement of merchandise from one party to another until it gets to the major perpetrator, who must have enlisted the other participants without informing them that the goods were bought with fake credit cards.
  • 13. Counterfeit Cheque Scam This entails the use of counterfeit cheque to pay for goods, such that the face value of the cheque would be far higher than the requirement; thus the seller would be instructed to return the overage amount to a foreign account because it’s needed for an ancillary purpose.
  • 14. Advance Fee Fraud This is popularly known as 4-1-9. It refers to the type of fraud in which a substantial amount would be demanded for payment of processing fees that stand as requirement for release of non-existing merchandise or large amount of money.
  • 15. Non-Delivery of Goods/Service Fraud This refers to scam in which people are encouraged to pay for goods and or service via a web portal, and thereafter nothing would be delivered to the buyers.
  • 16. Fake Escrow Scam This involves presentation of a spoofed website of a third party as a medium for payment , claiming that when the merchandise is successfully shipped to a buyer only then would the money be transferred to the seller; even when the supposed escrow service is a falsification and simply an account of the same seller.
  • 17. Spoofing/Phishing Scam Spoofing is a type of fraud in which a fraudster masquerades as another person by using another person’s email identity or header to transact business and obtain vital information such as bank account numbers, credit card numbers and associated passwords. While Phishing is a form of spoofing in which the webpage of a particular entity can be duplicated and positioned with url for the purpose of luring people to divulge vital financial information.
  • 18. Typical Webpage Used for Phishing
  • 19. Investment Rip-Off This refers to a system of trading on counterfeit securities or using fraudulent claims to solicit for loan or investment.
  • 20. Identity Theft This entails the use of another’s personal information without appropriate consent, for the purpose of fraudulent practices.
  • 21. Ponzi/Pyramid Fraud This is a system of luring investors to invest in a scheme in which the investment firm promises abnormally high returns, meanwhile the early investors shall be paid with investment capital obtained from successive investors. The payment chain would continue till the point of collapse.
  • 22. Auction Fraud In this case, people are encouraged to participate in online auction and when money must have been paid for specific items, the fraudster would send either a lower standard item or counterfeit.
  • 23. Exercise 1. Identify the key relationship between business deceit and phishing. 2. List two examples of Ponzi Pyramid Fraud
  • 24. Dr Elijah Ezendu is Award-Winning Business Expert & Certified Management Consultant with expertise in Interim Management, Strategy, Competitive Intelligence, Transformation, Restructuring, Turnaround Management, Business Development, Marketing, Project & Cost Management, Leadership, HR, CSR, e- Business & Software Architecture. He had functioned as Founder, Initiative for Sustainable Business Equity; Chairman of Board, Charisma Broadcast Film Academy; Group Chief Operating Officer, Idova Group; CEO, Rubiini (UAE); Special Advisor, RTEAN; Director, MMNA Investments; Chair, Int’l Board of GCC Business Council (UAE); Senior Partner, Shevach Consulting; Chairman (Certification & Training), Coordinator (Board of Fellows), Lead Assessor & Governing Council Member, Institute of Management Consultants, Nigeria; Lead Resource, Centre for Competitive Intelligence Development; Lead Consultant/ Partner, JK Michaels; Turnaround Project Director, Consolidated Business Holdings Limited; Technical Director, Gestalt; Chief Operating Officer, Rohan Group; Executive Director (Various Roles), Fortuna, Gambia & Malta; Chief Advisor/ Partner, D & E; Vice Chairman of Board, Refined Shipping; Director of Programmes & Governing Council Member, Institute of Business Development, Nigeria; Member of TDD Committee, International Association of Software Architects, USA; Member of Strategic Planning and Implementation Committee, Chartered Institute of Personnel Management of Nigeria; Country Manager (Nigeria) & Adjunct Faculty (MBA Programme), Regent Business School, South Africa; Adjunct Faculty (MBA Programme), Ladoke Akintola University of Technology; Editor-in-Chief, Cost Management Journal; Council Member, Institute of Internal Auditors of Nigeria; Member, Board of Directors (Several Organizations). He holds Doctoral Degree in Management, Master of Business Administration and Fellow of Professional Institutes in North America, UK & Nigeria. He is Innovator of Corporate Investment Structure Based on Financials and Intangibles, for valuation highlighting intangible contributions of host communities and ecological environment: A model celebrated globally as remedy for unmitigated depreciation of ecological capital and developmental deprivation of host communities. He had served as Examiner to Professional Institutes and Universities. He had been a member of Guild of Soundtrack Producers of Nigeria. He's an author and extensively featured speaker.