SlideShare una empresa de Scribd logo
1 de 25
Internet Fraud
Dr. Elijah Ezendu
FIMC, FCCM, FIIAN, FBDI, FAAFM, FSSM, MIMIS, MIAP, MITD, ACIArb, ACIPM,
PhD, DocM, MBA, CWM, CBDA, CMA, MPM, PME, CSOL, CCIP, CMC, CMgr
Learning Objectives
At the end of this course, participants should be
able to do the following:
• Identify the nature of internet fraud
• List the tools used for internet fraud
• Categorise internet fraudulent practices
“Internet fraud is a form of fraud which
uses any component of the Internet to
accomplish the intended fraudulent
activity.”
- National White Collar Crime Center, USA
“The term ‘Internet fraud’ refers generally to any
type of fraud scheme that uses one or more
components of the Internet - such as chat
rooms, e-mail, message boards, or Web sites -
to present fraudulent solicitations to
prospective victims, to conduct fraudulent
transactions, or to transmit the proceeds of
fraud to financial institutions or to other
connected with the scheme.”
Source: US Department of Justice
“Internet auction fraud was by far the most
reported offense, comprising 44.9% of referred
complaints. Non-delivered merchandise
and/or payment accounted for 19.0% of
complaints. Check fraud made up 4.9% of
complaints. Credit/debit card fraud, computer
fraud, confidence fraud, and financial
institutions fraud round out the top seven
categories of complaints referred to law
enforcement during the year.”
Source: Internet Crime Complaints Center
Tools Used for Internet Fraud
• Email
• Chat rooms
• Websites
• Message Boards
• Portals
• Web Application
Types of Internet Fraud 1
• Credit/Debit Card Fraud
• Business Deceit
• Recruitment Deceit
• Freight Forwarding Scam
• Counterfeit Cheque Scam
• Advance Fee Fraud
• Non-Delivery of Goods/Service Fraud
Types of Internet Fraud 2
• Fake Escrow Scam
• Spoofing/Phishing Scam
• Investment Rip-Off
• Identity Theft
• Ponzi/Pyramid Fraud
• Auction Fraud
Credit/Debit Card Fraud
This involves the use of credit/debit card to
obtain money or acquire properties without
appropriate authorization.
Fraudsters obtain credit/debit card numbers of
victims from unsecured web media.
Business Deceit
In this case, fraudsters masquerade themselves
as genuine business people and attempt to
collect personal information such as social
security number and date of birth from
respondents, in order to use the data for
purchasing goods which would most likely be
transferred or shipped out of the country.
Recruitment Deceit
Generic public or private portals can be used for
advertising spurious job openings with the
intention to collect vital information from
applicants, and deploy them for purchasing
goods.
Freight Forwarding Scam
This is an internet fraud that entails the
movement of merchandise from one party to
another until it gets to the major perpetrator,
who must have enlisted the other participants
without informing them that the goods were
bought with fake credit cards.
Counterfeit Cheque Scam
This entails the use of counterfeit cheque to pay
for goods, such that the face value of the
cheque would be far higher than the
requirement; thus the seller would be
instructed to return the overage amount to a
foreign account because it’s needed for an
ancillary purpose.
Advance Fee Fraud
This is popularly known as 4-1-9. It refers to the
type of fraud in which a substantial amount
would be demanded for payment of
processing fees that stand as requirement for
release of non-existing merchandise or large
amount of money.
Non-Delivery of Goods/Service Fraud
This refers to scam in which people are
encouraged to pay for goods and or service
via a web portal, and thereafter nothing
would be delivered to the buyers.
Fake Escrow Scam
This involves presentation of a spoofed website
of a third party as a medium for payment ,
claiming that when the merchandise is
successfully shipped to a buyer only then
would the money be transferred to the seller;
even when the supposed escrow service is a
falsification and simply an account of the
same seller.
Spoofing/Phishing Scam
Spoofing is a type of fraud in which a fraudster
masquerades as another person by using
another person’s email identity or header to
transact business and obtain vital information
such as bank account numbers, credit card
numbers and associated passwords. While
Phishing is a form of spoofing in which the
webpage of a particular entity can be
duplicated and positioned with url for the
purpose of luring people to divulge vital
financial information.
Typical Webpage Used for Phishing
Investment Rip-Off
This refers to a system of trading on
counterfeit securities or using fraudulent
claims to solicit for loan or investment.
Identity Theft
This entails the use of another’s personal
information without appropriate consent, for
the purpose of fraudulent practices.
Ponzi/Pyramid Fraud
This is a system of luring investors to invest in a
scheme in which the investment firm
promises abnormally high returns, meanwhile
the early investors shall be paid with
investment capital obtained from successive
investors. The payment chain would continue
till the point of collapse.
Auction Fraud
In this case, people are encouraged to
participate in online auction and when money
must have been paid for specific items, the
fraudster would send either a lower standard
item or counterfeit.
Exercise
1. Identify the key relationship between
business deceit and phishing.
2. List two examples of Ponzi Pyramid Fraud
Dr Elijah Ezendu is Award-Winning Business Expert & Certified Management Consultant with expertise
in Interim Management, Strategy, Competitive Intelligence, Transformation, Restructuring, Turnaround
Management, Business Development, Marketing, Project & Cost Management, Leadership, HR, CSR, e-
Business & Software Architecture. He had functioned as Founder, Initiative for Sustainable Business
Equity; Chairman of Board, Charisma Broadcast Film Academy; Group Chief Operating Officer, Idova
Group; CEO, Rubiini (UAE); Special Advisor, RTEAN; Director, MMNA Investments; Chair, Int’l Board of
GCC Business Council (UAE); Senior Partner, Shevach Consulting; Chairman (Certification & Training),
Coordinator (Board of Fellows), Lead Assessor & Governing Council Member, Institute of Management
Consultants, Nigeria; Lead Resource, Centre for Competitive Intelligence Development; Lead
Consultant/ Partner, JK Michaels; Turnaround Project Director, Consolidated Business Holdings Limited;
Technical Director, Gestalt; Chief Operating Officer, Rohan Group; Executive Director (Various Roles),
Fortuna, Gambia & Malta; Chief Advisor/ Partner, D & E; Vice Chairman of Board, Refined Shipping;
Director of Programmes & Governing Council Member, Institute of Business Development, Nigeria;
Member of TDD Committee, International Association of Software Architects, USA; Member of Strategic
Planning and Implementation Committee, Chartered Institute of Personnel Management of Nigeria;
Country Manager (Nigeria) & Adjunct Faculty (MBA Programme), Regent Business School, South Africa;
Adjunct Faculty (MBA Programme), Ladoke Akintola University of Technology; Editor-in-Chief, Cost
Management Journal; Council Member, Institute of Internal Auditors of Nigeria; Member, Board of
Directors (Several Organizations). He holds Doctoral Degree in Management, Master of Business
Administration and Fellow of Professional Institutes in North America, UK & Nigeria. He is Innovator of
Corporate Investment Structure Based on Financials and Intangibles, for valuation highlighting
intangible contributions of host communities and ecological environment: A model celebrated globally
as remedy for unmitigated depreciation of ecological capital and developmental deprivation of host
communities. He had served as Examiner to Professional Institutes and Universities. He had been a
member of Guild of Soundtrack Producers of Nigeria. He's an author and extensively featured speaker.
Thank You

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
 
Phishing
PhishingPhishing
Phishing
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Fraud & corruption
Fraud & corruptionFraud & corruption
Fraud & corruption
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar a Internet Fraud

Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud Dixita S
 
Digital World Unraveling Scam Verification and Protective Measures.docx
Digital World Unraveling Scam Verification and Protective Measures.docxDigital World Unraveling Scam Verification and Protective Measures.docx
Digital World Unraveling Scam Verification and Protective Measures.docxMusharrafKhan32
 
Unveiling the Threat How to Recognize and Report Crypto Scams
Unveiling the Threat  How to Recognize and Report Crypto ScamsUnveiling the Threat  How to Recognize and Report Crypto Scams
Unveiling the Threat How to Recognize and Report Crypto ScamsMike Bike
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdfMerchantech - Payment Processing Services
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptxdarrengracia
 
Fraud management - eCommerce fraud explained
Fraud management - eCommerce fraud explainedFraud management - eCommerce fraud explained
Fraud management - eCommerce fraud explainedAaronSmith41007
 
Faisal Abidi’s Outlook On How To Avoid Mass Marketing Fraud | Mass Marketing ...
Faisal Abidi’s Outlook On How To Avoid Mass Marketing Fraud | Mass Marketing ...Faisal Abidi’s Outlook On How To Avoid Mass Marketing Fraud | Mass Marketing ...
Faisal Abidi’s Outlook On How To Avoid Mass Marketing Fraud | Mass Marketing ...Faisal Abidi
 
Unit 2- Economic Offences Types of Frauds
Unit 2- Economic Offences Types of FraudsUnit 2- Economic Offences Types of Frauds
Unit 2- Economic Offences Types of FraudsKumarasamy Dr.PK
 
Business Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdfBusiness Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdfNiloufer Tamboly
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A ReviewIRJET Journal
 
CYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptxCYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptxSunnyRajak12
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfGiuliaAiolo
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfSimnMarnMartn
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfAndreaCalza2
 

Similar a Internet Fraud (20)

Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
Digital World Unraveling Scam Verification and Protective Measures.docx
Digital World Unraveling Scam Verification and Protective Measures.docxDigital World Unraveling Scam Verification and Protective Measures.docx
Digital World Unraveling Scam Verification and Protective Measures.docx
 
Unveiling the Threat How to Recognize and Report Crypto Scams
Unveiling the Threat  How to Recognize and Report Crypto ScamsUnveiling the Threat  How to Recognize and Report Crypto Scams
Unveiling the Threat How to Recognize and Report Crypto Scams
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
 
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
Credit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptxCredit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptx
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Fraud management - eCommerce fraud explained
Fraud management - eCommerce fraud explainedFraud management - eCommerce fraud explained
Fraud management - eCommerce fraud explained
 
Faisal Abidi’s Outlook On How To Avoid Mass Marketing Fraud | Mass Marketing ...
Faisal Abidi’s Outlook On How To Avoid Mass Marketing Fraud | Mass Marketing ...Faisal Abidi’s Outlook On How To Avoid Mass Marketing Fraud | Mass Marketing ...
Faisal Abidi’s Outlook On How To Avoid Mass Marketing Fraud | Mass Marketing ...
 
Unit 2- Economic Offences Types of Frauds
Unit 2- Economic Offences Types of FraudsUnit 2- Economic Offences Types of Frauds
Unit 2- Economic Offences Types of Frauds
 
Business Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdfBusiness Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdf
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
 
CYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptxCYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptx
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdf
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdf
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdf
 

Más de Elijah Ezendu

Execution intelligence
Execution intelligenceExecution intelligence
Execution intelligenceElijah Ezendu
 
Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...
Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...
Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...Elijah Ezendu
 
Future of Work by Dr Elijah Ezendu, FRSA.
Future of Work by Dr Elijah Ezendu, FRSA.Future of Work by Dr Elijah Ezendu, FRSA.
Future of Work by Dr Elijah Ezendu, FRSA.Elijah Ezendu
 
Employer and Employee Relationship Versus Future of Work
Employer and Employee Relationship Versus Future of Work Employer and Employee Relationship Versus Future of Work
Employer and Employee Relationship Versus Future of Work Elijah Ezendu
 
Speaking to Influence Executives
Speaking to Influence ExecutivesSpeaking to Influence Executives
Speaking to Influence ExecutivesElijah Ezendu
 
Performance Wingspan Optimization Approach by Elijah Ezendu
Performance Wingspan Optimization Approach by Elijah EzenduPerformance Wingspan Optimization Approach by Elijah Ezendu
Performance Wingspan Optimization Approach by Elijah EzenduElijah Ezendu
 
Creative Selling Model for Boosting Sales Performance During Recession and Tu...
Creative Selling Model for Boosting Sales Performance During Recession and Tu...Creative Selling Model for Boosting Sales Performance During Recession and Tu...
Creative Selling Model for Boosting Sales Performance During Recession and Tu...Elijah Ezendu
 
Four Categorical Action Streams of Strategy as Yield Determinant
Four Categorical Action Streams of Strategy as Yield DeterminantFour Categorical Action Streams of Strategy as Yield Determinant
Four Categorical Action Streams of Strategy as Yield DeterminantElijah Ezendu
 
Strategic Framework for Implementation of ‘Living Our Brand’ by Elijah Ezendu
Strategic Framework for Implementation of ‘Living Our Brand’ by Elijah EzenduStrategic Framework for Implementation of ‘Living Our Brand’ by Elijah Ezendu
Strategic Framework for Implementation of ‘Living Our Brand’ by Elijah EzenduElijah Ezendu
 
10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...
10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...
10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...Elijah Ezendu
 
Spectrum of Collective Leadership by Elijah Ezendu
Spectrum of Collective Leadership by Elijah EzenduSpectrum of Collective Leadership by Elijah Ezendu
Spectrum of Collective Leadership by Elijah EzenduElijah Ezendu
 
Leadership Development Strategy and Strategic Planning: The Chicken and Egg ...
Leadership Development Strategy and Strategic Planning:  The Chicken and Egg ...Leadership Development Strategy and Strategic Planning:  The Chicken and Egg ...
Leadership Development Strategy and Strategic Planning: The Chicken and Egg ...Elijah Ezendu
 
Performance of Knowledge Management
Performance of Knowledge ManagementPerformance of Knowledge Management
Performance of Knowledge ManagementElijah Ezendu
 
6 P's of Knowledge Management Performance
6 P's of Knowledge Management Performance6 P's of Knowledge Management Performance
6 P's of Knowledge Management PerformanceElijah Ezendu
 
Knowledge Management System & Technology
Knowledge Management System & TechnologyKnowledge Management System & Technology
Knowledge Management System & TechnologyElijah Ezendu
 
7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...
7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...
7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...Elijah Ezendu
 
Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...
Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...
Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...Elijah Ezendu
 
13 Pillars of Corporate Harmony by Elijah Ezendu
13 Pillars of Corporate Harmony by Elijah Ezendu13 Pillars of Corporate Harmony by Elijah Ezendu
13 Pillars of Corporate Harmony by Elijah EzenduElijah Ezendu
 
Ratiocinative Analysis of Budd's Model for Effective Partnership
Ratiocinative Analysis of Budd's Model for Effective PartnershipRatiocinative Analysis of Budd's Model for Effective Partnership
Ratiocinative Analysis of Budd's Model for Effective PartnershipElijah Ezendu
 
Three Models of Corporate Investment Structure Based on Financials and Intang...
Three Models of Corporate Investment Structure Based on Financials and Intang...Three Models of Corporate Investment Structure Based on Financials and Intang...
Three Models of Corporate Investment Structure Based on Financials and Intang...Elijah Ezendu
 

Más de Elijah Ezendu (20)

Execution intelligence
Execution intelligenceExecution intelligence
Execution intelligence
 
Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...
Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...
Achieving Competitive Advantage Through Strategic Corporate Social Responsibi...
 
Future of Work by Dr Elijah Ezendu, FRSA.
Future of Work by Dr Elijah Ezendu, FRSA.Future of Work by Dr Elijah Ezendu, FRSA.
Future of Work by Dr Elijah Ezendu, FRSA.
 
Employer and Employee Relationship Versus Future of Work
Employer and Employee Relationship Versus Future of Work Employer and Employee Relationship Versus Future of Work
Employer and Employee Relationship Versus Future of Work
 
Speaking to Influence Executives
Speaking to Influence ExecutivesSpeaking to Influence Executives
Speaking to Influence Executives
 
Performance Wingspan Optimization Approach by Elijah Ezendu
Performance Wingspan Optimization Approach by Elijah EzenduPerformance Wingspan Optimization Approach by Elijah Ezendu
Performance Wingspan Optimization Approach by Elijah Ezendu
 
Creative Selling Model for Boosting Sales Performance During Recession and Tu...
Creative Selling Model for Boosting Sales Performance During Recession and Tu...Creative Selling Model for Boosting Sales Performance During Recession and Tu...
Creative Selling Model for Boosting Sales Performance During Recession and Tu...
 
Four Categorical Action Streams of Strategy as Yield Determinant
Four Categorical Action Streams of Strategy as Yield DeterminantFour Categorical Action Streams of Strategy as Yield Determinant
Four Categorical Action Streams of Strategy as Yield Determinant
 
Strategic Framework for Implementation of ‘Living Our Brand’ by Elijah Ezendu
Strategic Framework for Implementation of ‘Living Our Brand’ by Elijah EzenduStrategic Framework for Implementation of ‘Living Our Brand’ by Elijah Ezendu
Strategic Framework for Implementation of ‘Living Our Brand’ by Elijah Ezendu
 
10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...
10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...
10 Elements of Open-Mindedness in Workplace Operating as Drivers for Strategi...
 
Spectrum of Collective Leadership by Elijah Ezendu
Spectrum of Collective Leadership by Elijah EzenduSpectrum of Collective Leadership by Elijah Ezendu
Spectrum of Collective Leadership by Elijah Ezendu
 
Leadership Development Strategy and Strategic Planning: The Chicken and Egg ...
Leadership Development Strategy and Strategic Planning:  The Chicken and Egg ...Leadership Development Strategy and Strategic Planning:  The Chicken and Egg ...
Leadership Development Strategy and Strategic Planning: The Chicken and Egg ...
 
Performance of Knowledge Management
Performance of Knowledge ManagementPerformance of Knowledge Management
Performance of Knowledge Management
 
6 P's of Knowledge Management Performance
6 P's of Knowledge Management Performance6 P's of Knowledge Management Performance
6 P's of Knowledge Management Performance
 
Knowledge Management System & Technology
Knowledge Management System & TechnologyKnowledge Management System & Technology
Knowledge Management System & Technology
 
7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...
7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...
7 Stimulators of Customer Indulgence that Yield Expansive Business Performanc...
 
Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...
Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...
Managing Conflicts in Departments, Cross-Functional Teams, Committees and B...
 
13 Pillars of Corporate Harmony by Elijah Ezendu
13 Pillars of Corporate Harmony by Elijah Ezendu13 Pillars of Corporate Harmony by Elijah Ezendu
13 Pillars of Corporate Harmony by Elijah Ezendu
 
Ratiocinative Analysis of Budd's Model for Effective Partnership
Ratiocinative Analysis of Budd's Model for Effective PartnershipRatiocinative Analysis of Budd's Model for Effective Partnership
Ratiocinative Analysis of Budd's Model for Effective Partnership
 
Three Models of Corporate Investment Structure Based on Financials and Intang...
Three Models of Corporate Investment Structure Based on Financials and Intang...Three Models of Corporate Investment Structure Based on Financials and Intang...
Three Models of Corporate Investment Structure Based on Financials and Intang...
 

Último

+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...
+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...
+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...Health
 
Responsible Finance Principles and Implication
Responsible Finance Principles and ImplicationResponsible Finance Principles and Implication
Responsible Finance Principles and ImplicationNghiaPham100
 
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdfFOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdfCocity Enterprises
 
Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024Adnet Communications
 
Significant AI Trends for the Financial Industry in 2024 and How to Utilize Them
Significant AI Trends for the Financial Industry in 2024 and How to Utilize ThemSignificant AI Trends for the Financial Industry in 2024 and How to Utilize Them
Significant AI Trends for the Financial Industry in 2024 and How to Utilize Them360factors
 
logistics industry development power point ppt.pdf
logistics industry development power point ppt.pdflogistics industry development power point ppt.pdf
logistics industry development power point ppt.pdfSalimullah13
 
falcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunitiesfalcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunitiesFalcon Invoice Discounting
 
Law of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
Law of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnLaw of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
Law of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnTintoTom3
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumFinTech Belgium
 
fundamentals of corporate finance 11th canadian edition test bank.docx
fundamentals of corporate finance 11th canadian edition test bank.docxfundamentals of corporate finance 11th canadian edition test bank.docx
fundamentals of corporate finance 11th canadian edition test bank.docxssuserf63bd7
 
Economics Presentation-2.pdf xxjshshsjsjsjwjw
Economics Presentation-2.pdf xxjshshsjsjsjwjwEconomics Presentation-2.pdf xxjshshsjsjsjwjw
Economics Presentation-2.pdf xxjshshsjsjsjwjwmordockmatt25
 
abortion pills in Jeddah Saudi Arabia (+919707899604)cytotec pills in Riyadh
abortion pills in Jeddah Saudi Arabia (+919707899604)cytotec pills in Riyadhabortion pills in Jeddah Saudi Arabia (+919707899604)cytotec pills in Riyadh
abortion pills in Jeddah Saudi Arabia (+919707899604)cytotec pills in Riyadhsamsungultra782445
 
Q1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdfQ1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdfAdnet Communications
 
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...batoole333
 
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsMahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsDeepika Singh
 
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...janibaber266
 
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.hyt3577
 
Business Principles, Tools, and Techniques in Participating in Various Types...
Business Principles, Tools, and Techniques  in Participating in Various Types...Business Principles, Tools, and Techniques  in Participating in Various Types...
Business Principles, Tools, and Techniques in Participating in Various Types...jeffreytingson
 
Explore Dual Citizenship in Africa | Citizenship Benefits & Requirements
Explore Dual Citizenship in Africa | Citizenship Benefits & RequirementsExplore Dual Citizenship in Africa | Citizenship Benefits & Requirements
Explore Dual Citizenship in Africa | Citizenship Benefits & Requirementsmarketingkingdomofku
 

Último (20)

+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...
+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...
+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...
 
Responsible Finance Principles and Implication
Responsible Finance Principles and ImplicationResponsible Finance Principles and Implication
Responsible Finance Principles and Implication
 
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdfFOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
 
Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024
 
Significant AI Trends for the Financial Industry in 2024 and How to Utilize Them
Significant AI Trends for the Financial Industry in 2024 and How to Utilize ThemSignificant AI Trends for the Financial Industry in 2024 and How to Utilize Them
Significant AI Trends for the Financial Industry in 2024 and How to Utilize Them
 
logistics industry development power point ppt.pdf
logistics industry development power point ppt.pdflogistics industry development power point ppt.pdf
logistics industry development power point ppt.pdf
 
W.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdfW.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdf
 
falcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunitiesfalcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunities
 
Law of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
Law of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnLaw of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
Law of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech Belgium
 
fundamentals of corporate finance 11th canadian edition test bank.docx
fundamentals of corporate finance 11th canadian edition test bank.docxfundamentals of corporate finance 11th canadian edition test bank.docx
fundamentals of corporate finance 11th canadian edition test bank.docx
 
Economics Presentation-2.pdf xxjshshsjsjsjwjw
Economics Presentation-2.pdf xxjshshsjsjsjwjwEconomics Presentation-2.pdf xxjshshsjsjsjwjw
Economics Presentation-2.pdf xxjshshsjsjsjwjw
 
abortion pills in Jeddah Saudi Arabia (+919707899604)cytotec pills in Riyadh
abortion pills in Jeddah Saudi Arabia (+919707899604)cytotec pills in Riyadhabortion pills in Jeddah Saudi Arabia (+919707899604)cytotec pills in Riyadh
abortion pills in Jeddah Saudi Arabia (+919707899604)cytotec pills in Riyadh
 
Q1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdfQ1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdf
 
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
 
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsMahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
 
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
 
Business Principles, Tools, and Techniques in Participating in Various Types...
Business Principles, Tools, and Techniques  in Participating in Various Types...Business Principles, Tools, and Techniques  in Participating in Various Types...
Business Principles, Tools, and Techniques in Participating in Various Types...
 
Explore Dual Citizenship in Africa | Citizenship Benefits & Requirements
Explore Dual Citizenship in Africa | Citizenship Benefits & RequirementsExplore Dual Citizenship in Africa | Citizenship Benefits & Requirements
Explore Dual Citizenship in Africa | Citizenship Benefits & Requirements
 

Internet Fraud

  • 1. Internet Fraud Dr. Elijah Ezendu FIMC, FCCM, FIIAN, FBDI, FAAFM, FSSM, MIMIS, MIAP, MITD, ACIArb, ACIPM, PhD, DocM, MBA, CWM, CBDA, CMA, MPM, PME, CSOL, CCIP, CMC, CMgr
  • 2. Learning Objectives At the end of this course, participants should be able to do the following: • Identify the nature of internet fraud • List the tools used for internet fraud • Categorise internet fraudulent practices
  • 3. “Internet fraud is a form of fraud which uses any component of the Internet to accomplish the intended fraudulent activity.” - National White Collar Crime Center, USA
  • 4. “The term ‘Internet fraud’ refers generally to any type of fraud scheme that uses one or more components of the Internet - such as chat rooms, e-mail, message boards, or Web sites - to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to other connected with the scheme.” Source: US Department of Justice
  • 5. “Internet auction fraud was by far the most reported offense, comprising 44.9% of referred complaints. Non-delivered merchandise and/or payment accounted for 19.0% of complaints. Check fraud made up 4.9% of complaints. Credit/debit card fraud, computer fraud, confidence fraud, and financial institutions fraud round out the top seven categories of complaints referred to law enforcement during the year.” Source: Internet Crime Complaints Center
  • 6. Tools Used for Internet Fraud • Email • Chat rooms • Websites • Message Boards • Portals • Web Application
  • 7. Types of Internet Fraud 1 • Credit/Debit Card Fraud • Business Deceit • Recruitment Deceit • Freight Forwarding Scam • Counterfeit Cheque Scam • Advance Fee Fraud • Non-Delivery of Goods/Service Fraud
  • 8. Types of Internet Fraud 2 • Fake Escrow Scam • Spoofing/Phishing Scam • Investment Rip-Off • Identity Theft • Ponzi/Pyramid Fraud • Auction Fraud
  • 9. Credit/Debit Card Fraud This involves the use of credit/debit card to obtain money or acquire properties without appropriate authorization. Fraudsters obtain credit/debit card numbers of victims from unsecured web media.
  • 10. Business Deceit In this case, fraudsters masquerade themselves as genuine business people and attempt to collect personal information such as social security number and date of birth from respondents, in order to use the data for purchasing goods which would most likely be transferred or shipped out of the country.
  • 11. Recruitment Deceit Generic public or private portals can be used for advertising spurious job openings with the intention to collect vital information from applicants, and deploy them for purchasing goods.
  • 12. Freight Forwarding Scam This is an internet fraud that entails the movement of merchandise from one party to another until it gets to the major perpetrator, who must have enlisted the other participants without informing them that the goods were bought with fake credit cards.
  • 13. Counterfeit Cheque Scam This entails the use of counterfeit cheque to pay for goods, such that the face value of the cheque would be far higher than the requirement; thus the seller would be instructed to return the overage amount to a foreign account because it’s needed for an ancillary purpose.
  • 14. Advance Fee Fraud This is popularly known as 4-1-9. It refers to the type of fraud in which a substantial amount would be demanded for payment of processing fees that stand as requirement for release of non-existing merchandise or large amount of money.
  • 15. Non-Delivery of Goods/Service Fraud This refers to scam in which people are encouraged to pay for goods and or service via a web portal, and thereafter nothing would be delivered to the buyers.
  • 16. Fake Escrow Scam This involves presentation of a spoofed website of a third party as a medium for payment , claiming that when the merchandise is successfully shipped to a buyer only then would the money be transferred to the seller; even when the supposed escrow service is a falsification and simply an account of the same seller.
  • 17. Spoofing/Phishing Scam Spoofing is a type of fraud in which a fraudster masquerades as another person by using another person’s email identity or header to transact business and obtain vital information such as bank account numbers, credit card numbers and associated passwords. While Phishing is a form of spoofing in which the webpage of a particular entity can be duplicated and positioned with url for the purpose of luring people to divulge vital financial information.
  • 18. Typical Webpage Used for Phishing
  • 19. Investment Rip-Off This refers to a system of trading on counterfeit securities or using fraudulent claims to solicit for loan or investment.
  • 20. Identity Theft This entails the use of another’s personal information without appropriate consent, for the purpose of fraudulent practices.
  • 21. Ponzi/Pyramid Fraud This is a system of luring investors to invest in a scheme in which the investment firm promises abnormally high returns, meanwhile the early investors shall be paid with investment capital obtained from successive investors. The payment chain would continue till the point of collapse.
  • 22. Auction Fraud In this case, people are encouraged to participate in online auction and when money must have been paid for specific items, the fraudster would send either a lower standard item or counterfeit.
  • 23. Exercise 1. Identify the key relationship between business deceit and phishing. 2. List two examples of Ponzi Pyramid Fraud
  • 24. Dr Elijah Ezendu is Award-Winning Business Expert & Certified Management Consultant with expertise in Interim Management, Strategy, Competitive Intelligence, Transformation, Restructuring, Turnaround Management, Business Development, Marketing, Project & Cost Management, Leadership, HR, CSR, e- Business & Software Architecture. He had functioned as Founder, Initiative for Sustainable Business Equity; Chairman of Board, Charisma Broadcast Film Academy; Group Chief Operating Officer, Idova Group; CEO, Rubiini (UAE); Special Advisor, RTEAN; Director, MMNA Investments; Chair, Int’l Board of GCC Business Council (UAE); Senior Partner, Shevach Consulting; Chairman (Certification & Training), Coordinator (Board of Fellows), Lead Assessor & Governing Council Member, Institute of Management Consultants, Nigeria; Lead Resource, Centre for Competitive Intelligence Development; Lead Consultant/ Partner, JK Michaels; Turnaround Project Director, Consolidated Business Holdings Limited; Technical Director, Gestalt; Chief Operating Officer, Rohan Group; Executive Director (Various Roles), Fortuna, Gambia & Malta; Chief Advisor/ Partner, D & E; Vice Chairman of Board, Refined Shipping; Director of Programmes & Governing Council Member, Institute of Business Development, Nigeria; Member of TDD Committee, International Association of Software Architects, USA; Member of Strategic Planning and Implementation Committee, Chartered Institute of Personnel Management of Nigeria; Country Manager (Nigeria) & Adjunct Faculty (MBA Programme), Regent Business School, South Africa; Adjunct Faculty (MBA Programme), Ladoke Akintola University of Technology; Editor-in-Chief, Cost Management Journal; Council Member, Institute of Internal Auditors of Nigeria; Member, Board of Directors (Several Organizations). He holds Doctoral Degree in Management, Master of Business Administration and Fellow of Professional Institutes in North America, UK & Nigeria. He is Innovator of Corporate Investment Structure Based on Financials and Intangibles, for valuation highlighting intangible contributions of host communities and ecological environment: A model celebrated globally as remedy for unmitigated depreciation of ecological capital and developmental deprivation of host communities. He had served as Examiner to Professional Institutes and Universities. He had been a member of Guild of Soundtrack Producers of Nigeria. He's an author and extensively featured speaker.