• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Precautions against internet scamming

Extracts from this document...

Introduction

Internet scamming                                                                                                            

INTERNET SCAMMING

Introduction

Internet scamming is a form of fraud on the internet, which involves running of scams by some anonymous individual through the use of internet. Internet scamming is done mainly to steal money from the public or some personal property or information. This has been a great challenge to our technology, and has increased the risks of e-commerce thereby reducing the confidence of the consumers to transact using internet. Examples of activities associated with internet scams are investment schemes, identity fraud, and job or business opportunities. It has been one of the major obstacles in communication and information management.

Many people ignore the warnings about internet scams, and interesting enough they fall on the trap. Scammers target all kind of individuals all over the world ranging from the young to the elderly. This problem can be prevented through education. When someone is educated, it’s hard to fall in such traps of con schemers and con artists. There are several articles that discuss internet scamming. Three of them have been summarized below.

Impact of internet scamming on e-commerce

Introduction

E-commerce is defined by World Trade Organization as the process by which products are produced, advertised and distributed through telecom networks. It involves the buying and selling of goods or services over the internet (Laudon & Traver, 2009). Instruments or channels used to do e-commerce include internet, phone, fax among others.

...read more.

Middle

Effects of this  to e-commerce can be immense. Smith points out that Scammers may end up using other people identity to carry out online transactions. It would be hard to know whether you are dealing with the right person or whether it’s a fraudulent individual (2011). This is one of the major chalenge affecting e-commerce.

Business oportunity/work at home schemes scams.

This form of scam promise the victims great opportunities of making a lot of money without straining. The victims are usually enticede by the scammers using such statements as ‘be your own boss’.This involve adverising business opportunities for  a given amount of money through email. The victim who fall into the trap of paying for the venture, end up losing the money by either not receiving the information concerning the venture, or the person end up getting works such as data entry and other works which can be done through the computer.customer ends up spending a lot of money through this form of scam. According to National Fraud Information center, many victim of this trap are people under the age of 30. This also poses threat to e-commerce, and may discourage people from doing online businesses.

Advanced payment scams

This requires a person to give an advance payment in order to be given something of greater value such as loan, credit card or job. After the money has been given it losts and the contact breaks.

...read more.

Conclusion

References

Baker, P. (2011, september 23). Online Ad Scams, Part 2: Fighting Back. Retrieved March 18, 2012, from E-Commerce Times : http://www.ecommercetimes.com/story/73343.html

Burrel, J. (2011). User Agency in the Middle Range: Rumors and the Reinvention of the Internet in Accra, Ghana. Science Technology and Human Values(0162-2439) , 139-159.

Chang, J. (2008). An analysis of advance fee fraud on the internet: protect yourself. Journal of

 finance crime(1359-0790) , 71-81.

Federal Trade Commission.. (2004, july 15). Identity Theft and Assumption Deterrence Act. Retrieved March 11, 2012, from Federal laws: Criminals: http://www.ftc.gov/bcp/edu/microsites/idtheft/law-enforcement/federal-laws-criminal.html

Laudon, K., & Traver, C. (2009). E-commerce: business, technology, society. Upper Saddle: Prentice Hall.

Paulus, S., Pohlmann, N., & Reimer, H. (2005). ISSE 2005: securing electronic business

processes : highlights of the Information Security Solutions Europe 2005 conference. New York: Springer.

Reuters, T. (2012, February 28). Five years worth of fraud investigations ahead - FBI. Retrieved March 18, 2012, from Fraud magazine: http://www.fraud-magazine.com/home.aspx?pageid=50

Rusch, J. (2001, may 6). The Rising Tide of Internet Fraud. Internet Fraud Cyber Crime II. Retrieved march 11, 2012, from United States Attorney’s Bulletin:http://www.usdoj.gov/usao/eousa/foia/foiamanuals.html

Shadel, D. (2012). Outsmarting the Scam Artists: How to Protect Yourself From the Most Clever Cons. Washington DC: John Wiley & Sons.

Smith, M. D. (2011). Identity, Theft, Phishing and Scamming: Protect Yourself. All hands 1134 , 22-23.

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Computer Crime - Hacking

    Although hacking doesn't cause assault and battery to anybody directly, it usually performances activities like breaking into protected computer systems, releasing viruses, stealing passwords or other sensitive data, denial of service so on. And public announcements of hacking may affect customer trust and privacy.

  2. Introduction to Internet Report- - creating a website

    href="events.html" title="?">Events</a></li> <li><a href="contact.html" title="?">Contact</a></li> </ul> <!--Header 3 "H3" can be find in CSS code--> <blockquote id="quotes" cite=""><h3></h3> <p> Great slide, more fun!</p> </blockquote> <!--Here where I keep my news. Every section has its own Header - At this point the Header 4 "H4"--> <div id="maincontent"> <!--CSS Code Name--> <div id="introductionnews"> <p id="intro"> SideWays is Europe's number 1 for Drifting.

  1. The project explains various algorithms that are exercised to recognize the characters present on ...

    ; x++) { for ( xx = 0; xx < image_row; xx++) // image_row check { pixel_sum = 0; for ( y = new_row_no1[x]; y < new_row_no2[x] ; y++) // { pixel_sum = pixel_sum + my_image[y][xx]; // troubleshoot if not getting } pixel_average = (new_row_no2[x]-new_row_no1[x])- (pixel_sum/255); if (pixel_average < 5)

  2. Precise analysis about The legal or illegal utilization of Internet cookies

    EC 4.05). As Palmer (2005, p. 273) mentions, when Internet users are browsing web sites, cookies can enter their computer. Such cookies record lots of data about the user that is regained in future by the site that placed them on the user's computer.

  1. Methods and technology used in Computer Forensics

    of data that an unsuspecting user may have considered to have been deleted. More advanced users will know that to truly delete a file, put it beyond the bounds of less complex methods such as this, the space on which that data once resided must be overwritten with data of

  2. Investigating the viability of e-commerce in an organization

    The research will also examine the advantages and disadvantages of e-commerce over the traditional business operations. Part of the research will be focused on the feasibility of improving organizational operations through e-commerce. Embarking upon this research will help greatly in deciding upon the best operational means for organizations in the current technology related business world.

  1. Lifecycle Management Of Information Technology Project In Construction

    Potential conflict? will be re?olved before re?earch begin?. The re?earch will be avoided undue intru?ion into live? of individual? or communitie? they ?tudy. The welfare of informant? had highe?t priority; their dignity? privacy and intere?t? will be protected at all time?. Freely given informed con?ent will be obtained from all human ?ubject?

  2. conflicker worm-computer virus

    installing even critical patches because of the requirement in many cases to reboot the systems which may cause disruption to business The worm operates by copying itself to a Windows system folder using a random name, modifies registry keys, attempts connection to well-used websites to obtain the public address of

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work