identity fraud
Recently Published Documents


TOTAL DOCUMENTS

91
(FIVE YEARS 24)

H-INDEX

6
(FIVE YEARS 2)

2021 ◽  
pp. 001112872110298
Author(s):  
Claire Seungeun Lee

E-commerce is the practice of purchasing, selling, transferring, and exchanging goods, services, or information through the Internet, a computer, and/or other devices. With the development of e-commerce markets, fraud is increasingly reported. This study uses a crime script analysis to examine how customer-to-customer (C2C) fraud occurs on China’s online platforms with a particular focus on the online marketplace Baidu Tieba and Tencent QQ, a tool that allows customers to make contact and negotiate deals and payment methods. The findings demonstrate that C2C fraud develops through pre-operation, operation, finalization, and exit stages, sharing commonalities with other online identity fraud processes. Implications for policy and interventions are also discussed in regard to e-commerce fraud in China and elsewhere.


Genealogy ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 44
Author(s):  
Roopa Bala Singh

In this Critical Yoga Studies (CYS) examination, I introduce terms, “racial tourism,” and “racial mobility,” and a method, “justice storytelling.” These terms and this method are poised to be used strategically in the quest to grapple with race and racial fraud in the academy. Racial fraud in the academy is exemplified by, but not limited to, infamous scholars such as Rachel Dolezal, Jessica Krug, Andrea Smith, Elizabeth Warren, and BethAnn McLaughlin. The terms “racial mobility” and “racial tourism,” intentionally create space in which to notice and assess racial fraud. In establishing CYS, I aim to provide epistemic space in which pause the cycle of harm (ie. instigated by exposure to racial fraud in the academy) and reaction (outrage, condemnation) and make space to notice, witness, and be (“this is happening”). The terms, method, and guiding questions offered in this study create epistemic space to notice race, to continue to be despite racism, and assess the ongoing project of racial categorizations in order to quell disorientation that results from harm. I add these terms to the basket of more highly circulating terms (such as “cultural appropriation,” and “identity fraud”) used to describe and respond to: (1) the specific phenomenon of white scholars engaging in racial fraud, and (2) the broader experience of living with and within inseparable systems of race, racial categorizations, and racism in the ivory tower. CYS is grounded in legal scholarship and critical race theory. I build on “legal storytelling” in an experimental, poetic form I call, “justice storytelling,” which enables healing. I find the terms I introduce, “racial tourism” and “racial mobility,” reveal a state of movement at the essence of the racial takings and accumulation of racial value enacted by white scholars committed to racial appropriation and fraudulently coding as Black, brown, and Indigenous in the academy.


2021 ◽  
Vol 78 ◽  
pp. 210-213
Author(s):  
Roy Huynh ◽  
Alexandra Thoms ◽  
Thuy-My Nguyen ◽  
Titus Kwok
Keyword(s):  

Author(s):  
Rizwan Ur Rahman ◽  
Deepak Singh Tomar

Security issues in e-commerce web applications are still exploratory, and in spite of an increase in e-commerce application research and development, lots of security challenges remain unanswered. Botnets are the most malicious threats to web applications, especially the e-commerce applications. Botnet is a network of BOTs. It executes automated scripts to launch different types of attack on web applications. Botnets are typically controlled by one or more hackers known as Bot masters and are exploited for different types of attacks including Dos (denial of service), DDos (distributed denial of service), phishing, spreading of malware, adware, Spyware, identity fraud, and logic bombs. The aim of this chapter is to scrutinize to what degree botnets can cause a threat to e-commerce security. In the first section, an adequate overview of botnets in the context of e-commerce security is presented in order to provide the reader with an understanding of the background for the remaining sections.


Author(s):  
Jason Diodati ◽  
John Winterdyk

There is a pressing need for understanding blockchain, cybercrime, and dark web-based fraud. As the world continues to turn digital, uses of cryptocurrencies are becoming mainstream. With this technological adoption becoming a reality, crime is adapting to the times. “Click here for free Bitcoin,” “set up an account and earn 100BTC instantly” are merely anecdotal examples of the ways the act of fraud is innovating. Deeper into this proliferation of technology lies the dark web, where your social security and identity may be offered for a small sum as we speak. Blockchain technology fueled dark web marketplaces' enormous growth, which facilitated identity fraud and many other cybercrimes taking place as we speak. This chapter and its authors aim to provide a thorough yet simplified explanation of these technologies while expressing current trends and theories surrounding dark web fraud trading of fraud guides and the use of social engineering. This chapter aims to explain all aspects of this area of cybercrime for all to understand.


Sign in / Sign up

Export Citation Format

Share Document