Tuesday, March 24, 2009

FRAUD PREVENTION

Thanx nani..know I have information about how we prevent ourself from internet crime in topic Fraud Prenvention.

~Fraud Prevention.

The solutions to Internet-related crime and particularly fraud involve a wide range of strategies which extend from traditional crime control measures to novel technology-based means of preventing illegal conduct from being carried out electronically. Fraud prevention in the digital age requires the use and adaptation of traditional measures (such as the use of appropriate fraud control policies and the provision of information) as well as the use of novel technological approaches (such as the use of effective means to authenticate users of computers and to track
how they are using computers). Fraudulent conduct may also be deterred through the use of prosecution and punishment, although in the digital age this is often difficult and costly to achieve.

The so-called ‘onion model’ of fraud prevention is likely to yield the greatest benefits. This entails the use of various layers of protection including encryption, firewalls, intrusion detection systems, incident response procedures, and monitoring of systems by external auditors.

~Similar advice is available from the Internet Fraud Complaint Center (IFCC
2001) on topics including:
• Internet auction fraud;
• non-delivery of merchandise;
• credit card fraud;
• investment fraud;
• Nigerian letter scams; and
• business fraud.
The National Fraud Information Cent

>This is some of fraud prevention.

1)Fraud Detection Software
If one is unable to prevent online fraud from taking place entirely, it may at least be possible to identify the presence of fraudulent transactions quickly in order to reduce the extent of any losses which are suffered or the occurrence of repeat victimisation. A number of organisations are now providing software for use in the prevention of Internet fraud. Software has been devised to analyse user spending patterns in order to alert individuals to the presence of unauthorised transactions and also merchant deposit monitoring techniques to detect claiming patterns of corrupt merchants. The success of such an approach depends, however, upon the extent to which the software cannot be interfered with or modified.

2)Tracking and Surveillance
The use of computer software to monitor the business activities of government agencies also provides an effective means of detecting fraud and deterring individuals from acting illegally. The Australian Health Insurance Commission, for example, employs artificial neural networks to
detect inappropriate claims made by health care providers and members of the public in respect of various government-funded health services and benefits. In 1997–98, this technology contributed to the Commission locating $7.6 million in benefits which were paid incorrectly to providers and the public.

~yatie@ hayati~

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.