PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

E-fraud

Treść / Zawartość
Identyfikatory
Warianty tytułu
PL
Oszustwa internetowe
Języki publikacji
EN
Abstrakty
EN
On-line fraud and cheating constitute the biggest part of all computer crime. Cheating is a kind of fraud that does not have direct evidence of its appearance. The purpose of this article is to analyze the current state of e-fraud in selected countries in the context of contemporary Internet system. In the first part of the paper, the authors present various definitions and classification of e-fraud. The next part of the paper is devoted to presenting methods to fraud electronic payment systems. The last part of the work will be focused on case studies concerning e-fraud in Poland and Romania. This study brings its contribution to the understanding of the methods of e-fraud. To prepare this article, information available from the Internet, as well as the official websites of government institutions, banks, portals, European Union, national and international media was used.
PL
Elektroniczne oszustwa i matactwa stanowią największą część wszystkich przestępstw komputerowych. Nadużycie jest rodzajem oszustwa, na którego wystąpienie nie ma bezpośrednich dowodów. Celem niniejszego artykułu jest analiza obecnego stanu przestępstw komputerowych w wybranych krajach w kontekście aktualnego wykorzystania systemów internetowych. W pierwszej części artykułu autorzy przedstawiają różne definicje i klasyfikacje e-oszustw. Kolejna część poświęcona jest prezentacji wybranych metod oszustw systemów płatności elektronicznych. Jej ostatnia część skupia się na prezentacji case studies dotyczących e-oszustw w Polsce i Rumunii. Przeprowadzone badania stanowią wkład w zrozumienie metod oszustw elektronicznych.
Twórcy
  • DWSPiT w Polkowicach
autor
  • Politechnika Wrocławska
  • Uniwersytet w Piteszti, Rumunia, student
Bibliografia
  • 1. Akintoye K. A., Araoye O. I., Combating E-Fraud on Electronic Payment System, http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.259.3383 [Accessed 25 November, 2013].
  • 2. Malakedsuwan P., Stevens K., A Model of E-fraud, http://www.pacis-net.org/file/2003/papers/e-business/233.pdf, University of NSW, Sydney 2003, p. 4 [Accessed 15 November, 2013].
  • 3. Bergman B., E-fraud: State of the art and countermeasures, Linkoping University, Sweden 2005.
  • 4. Turban E., Lee J., Electronic Commerce 2010, Pearson, 2010, p. 484.
  • 5. Card Skimming, http://www.scamwatch.gov.au/content/index.phtml/tag/CardSkimming [Accessed 21 November, 2013].
  • 6. How ATM card skimming and PIN capturing scams work, http://www.slideshare.net/worldstuff/how-to-detect-atm-card-skimming-and-pin-capturing-scams [Accessed 23 November, 2013].
  • 7. Olteanu G. I., Methodology Criminology – Structures criminal and illegal activities carried out by them, Editura AIT Laboratories s.r.l, Bucharest 2008, p. 65.
  • 8. E-mails Phishing and Scams, http://www.securingthehuman.org/newsletters/ouch/issues/OUCH-201112_en.pdf, p. 2 [Accessed 23 November, 2013].
  • 9. How Phishing Works, http://computer.howstuffworks.com/phishing.htm [Accessed 22 November, 2013].
  • 10. Milletary J., Technical Trends in Phishing Attacks, www.cert.org/archive/pdf/Phishing_trends.pdf, p. 4 [Accessed 14 November, 2013].
  • 11. King D., Lee J., Electronica Commerce 2010A Managerial Perspective, Pearson 2010, p. 486.
  • 12. Beware the cash trap! Claw-like devices inserted into ATM slots can steal notes in latest hole-in-the-wall scam, http://www.dailymail.co.uk/news/article-2236213/Clawlike-devices-inserted-ATM-slots-steal-notes-latest-hole-wall-scam.html [Accessed 17 November, 2013].
  • 13. Best Practice for ATM Security, Overview of ATM security situation, forecast, and best practices, GRGBanking Equipment (HK) Co. Ltd, 27.05.2011, http://www.grgbanking.com/en/exh/images/Best%20Practice%20for%20ATM%20Security%20-GRGBanking.pdf, p. 11 [Accessed 4 November, 2013].
  • 14. Identity Theft – Electronic Pickpocketing, http://pueblo.org/sites/default/files/documents/scam-alerts/January%202011%20-%20Identity%20Theft-Electronic%20Pickpocketing.pdf, p. 1 [Accessed 3 November, 2013].
  • 15. Da Costa E., GlobalE-Commerce strategies for small businesses, MIT 2001, p. 69.
  • 16. Benoni B. B., Electronic Payment Systems Fraud, Bucharest 2013.
  • 17. Accused Cyber-Bazaar “Pirate” Has Bail Hearing Delayed, http://www.bloomberg.com/news/2013-10-04/alleged-cyber-bazaar-pirate-ulbricht-bail-hearing-delayed.html [Accessed 15 November, 2013].
  • 18. Hackers Attack FBI Justice Department Websites After Megaupload Shutdown, http://news.nationalpost.com/2012/01/19/hackers-attack-fbi-justice-department-websitesafter-megaupload-shutdown/ [Accessed 28 November, 2013].
  • 19. Hackers Who Thought They Were Gods, http://www.dailymail.co.uk/news/article-2325624/Hackers-believed-gods-cyberspace-jailed-attacks-CIA-FBI-NHS-computers.html[Accessed 25 November, 2013].
  • 20. Hackers Attack FBI Partner Website, http://www.alternet.org/rss/breaking_news/607507/hackers_attack_fbi_partner_website [Accessed 14 November, 2013].
  • 21. Policjanci i prokuratorzy rozbili gang zajmujący się skimmingiem, http://www.polskieradio.pl/5/3/Artykul/314723,Policjanci-i-prokuratorzy-rozbili-gang-zajmujacy-sie-skimmingiem [Accessed 13 November, 2013].
  • 22. Trzech Rumunów aresztowanych za próbę skimming, http://www.dziennikbaltycki.pl/artykul/161915,szklarska-poreba-trzech-rumunow-zatrzymanych-za-probe skimmingu,id,t.html [Accessed 8 November, 2013].
  • 23. Poland Busts Online Fraud Group with Russian Links, http://en.ria.ru/crime/20130227/179717075/Poland-Busts-Online-Fraud-Group-with-Russian-Links. Html [Accessed 9 November, 2013].
  • 24. Defendant In Romanian Cybercrime Ring Convicted Of Wire Fraud And Identification Document Fraud Conspiracies, http://www.justice.gov/usao/nye/pr/2013/2013aug09.html [Accessed 7 November, 2013].
  • 25. Gruber J., Jozwiak I., Mosio Ł., Freud detection business systems using data mining method, Sil. University of Techn. Publishing House, Gliwice 2013, pp. 61–71.
  • 26. http://www.statsoft.pl/czytelnia/czytelnia.html [Accessed 7 November, 2013].
  • 27. Demski T., Creating and using data mining model using STATISTICA Data Miner provisions on fraud detection example, StatSoft Polska, http://www.statsoft.pl/czytelnia/czytelnia.htmll, 20/05/2012 [Accessed 16 November, 2013].
  • 28. Sokołowski A., The methods used in data mining, StatSoft Polska, 2002.
  • 29. Wątroba J., Examples of predictive problem solving using data mining techniques, StatSoft Polska, 2002.
  • 30. Wątroba J., Kowalski T., Demski T., Data mining and its implementation in STATISTICA DataMiner, StatSoft Polska, 2002.
  • 31. Kuijlen T., Migut G., Detection of fraud and money laundering, StatSoft Polska, 2004.
  • 32. de Lange J., Longoni A., Screpnic A., Online payments 2012, Moving beyond the web, May 2012, ECOMMERCE Europe, p. 57, www.innopay.com [Accessed 25 November, 2013].
  • 33. Polasik M., Maciejewski K., Innovative payment services in Poland and abroad, Warsaw, 2009, http://www.nbp.pl/publikacje/materialy_i_studia/ms241.pdf, p. 12 [Accessed 25 November, 2013].
  • 34. Proposal for a Regulation establishing technical requirements for credit transfers and direct debits in euros and amending Regulation (EC) no. 924/2009, COM (2010) 775, http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:52010PC0775:EN:NOT. [Accessed 24 November, 2013].
  • 35. The Paypers, Romania: e-commerce market to surpass EUR 160 million, 2011.
  • 36. http://www.aerotranslate.com/webmoney/other-online-payment-systems-in-russia.Html [Accessed 18 November, 2013].
  • 37. http://www.freewebs.com/mkurnia/chap6.doc, p. 2 [Accessed 13 November, 2013].
  • 38. Electronic Payment Systems, http://ocw.metu.edu.tr/pluginfile.php/354/mod_resource/content/0/Lecture_4.pdf, p. 15 [Accessed 19 November, 2013].
  • 39. Online Payment Systems for E-Commerce, http://www.oecd.org/internet/ieconomy/36736056.pdf, p. 4 [Accessed 20 November, 2013].
  • 40. Oshkalo A., What is the Most Popular E-Currency in Russia, http://www.russian searchtips.com/2012/04/what-is-the-most-popular-e-currency-in-russia/ [Accessed 9 November, 2013].
  • 41. Payments in Russia, http://www.payboutique.com/payments-russia[Accessed 8 November, 2013].
  • 42. Identity Theft – Electronic Pickpocketing, http://pueblo.org/sites/default/files/documents/scam-alerts/January%202011%20-%20Identity%20Theft-Electronic%20Pick pocketing.pdf, p. 13 [Accessed 4 November, 2013].
  • 43. Hackers Who Thought They Were Gods, http://www.kanyiokeke.com/2013/05/hackers-who-thought-they-were-gods.html [Accessed 2 December, 2013].
  • 44. Hackers claim another Sony attack, http://phys.org/news/2011-06-hackers-sony.html [Accessed 26 November, 2013].
  • 45. Hackers claim new Sony cyberattack, http://phys.org/news/2011-06-hackers-sony cyberattack.html [Accessed 26 November, 2013].
  • 46. Defendant in Romanian Cyber Crimes Ring Convicted of wire Fraud and Identification Document Fraud Conspiracies, http://www.fbi.gov/newyork/press-releases/2013/defendant-in-romanian-cyber-crime-ring-convicted-of-wire-fraud-and-identification-document-fraud-conspiracies [Accessed 29 November, 2013].
Uwagi
Opracowanie ze środków MNiSW w ramach umowy 812/P-DUN/2016 na działalność upowszechniającą naukę.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-f507f82f-08b0-47b8-aac3-57f6c88a8c06
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.