/

Who commits Fraud?

Fraud perpetrators usually cannot be distinguished from other people on the basis of demographic or psychological characteristics. People that commit fraud are usually good people who consider themselves to be honest – they just get caught up in a bad situation as a result of pressure, opportunity and rationalization.…

Read more
1271 views
///

Private Automatic Branch Exchange Fraud

Within the domain of Private Automatic Branch Exchange (PABX) fraud, various forms of financial and economic crimes can occur. PABX fraud refers to illegal practices aimed at abusing or manipulating telephone systems within an organization to gain financial advantage. Some examples of financial and economic crimes within this domain are: Toll fraud: This involves unauthorized use of an organization’s telephone lines to make international, long-distance, or premium-rate calls at the expense of the organization. This can occur through hacking the telephone system, using fraudulent access codes, or making unauthorized calls. Call forwarding fraud: This involves changing the settings of a…

Read more
2447 views
//

Computer Software Service Fraud (CSSF)

Within the domain of computer software service fraud, various forms of financial and economic crimes can occur. Computer software service fraud refers to illegal practices where fraudulent services related to computer software are offered, often with the aim of gaining financial advantage. Some examples of financial and economic crimes within this domain are: Software counterfeiting: This involves copying, modifying, or distributing software without the permission of the rightful owner. It can include activities such as distributing illegal copies of software programs, modifying software codes to activate functionality, or creating fake software licenses. Fraudulent software updates: This entails offering fraudulent updates…

Read more
2342 views
//

Phone Fraud

Within the domain of phone fraud, various forms of financial and economic crimes can occur. Phone fraud refers to illegal practices where fraudsters exploit telecommunications systems to gain financial advantage. Some examples of financial and economic crimes within this domain are: Identity theft: This involves the use of false identities or stolen personal information to engage in fraudulent phone calls or financial transactions. Premium number fraud: This entails fraudsters exploiting premium numbers to generate income by making unauthorized calls to these numbers. Vishing: This is a form of scam where fraudsters make phone calls to individuals and pose as a…

Read more
1861 views
//

Email Fraud

Within the domain of email fraud, various forms of financial and economic crimes can occur. Email fraud refers to illegal practices where fraudsters use email communication to gain financial advantage. Some examples of financial and economic crimes within this domain are: Phishing: This is a form of fraud where fraudulent emails are sent to obtain personal information, such as login credentials, credit card information, or other confidential data. Fraudsters often impersonate legitimate organizations to deceive victims. Business Email Compromise (BEC): This is a form of fraud where fraudsters send emails that appear to come from a trusted person or organization,…

Read more
1754 views
//

Business Email Compromise (BEC) Fraud

Within the domain of Business Email Compromise (BEC) fraud, various forms of financial and economic crimes can occur. BEC fraud refers to illegal practices where fraudsters use email communication to manipulate financial transactions and steal money. Some examples of financial and economic crimes within this domain are: Invoice fraud: Fraudsters send emails that appear to be from a legitimate company or a trusted supplier, requesting the recipient to pay outstanding invoices to a fraudulent bank account instead of the correct company account. CEO fraud: In this type of fraud, fraudsters impersonate the CEO or another executive within an organization. They…

Read more
1756 views
//

Procurement Fraud

Within the domain of procurement fraud, various forms of financial and economic crimes can occur. Procurement fraud refers to illegal practices where fraudsters manipulate the procurement process to gain financial advantage. Here are some examples of financial and economic crimes within this domain: Collusion: This involves fraudulent parties conspiring to manipulate the procurement process. They may make agreements on price fixing, falsify bids, or share information to gain an unfair competitive advantage. Document forgery: Fraudsters may forge documents such as invoices, quotes, or certificates to impersonate legitimate suppliers or manipulate prices and conditions. Bribery: This involves fraudsters offering bribes to…

Read more
2153 views
//

Invoice Redirection Fraud

Within the domain of invoice redirection fraud, various forms of financial and economic crimes can occur. Invoice redirection fraud refers to illegal practices where fraudsters attempt to redirect payments by modifying invoice information or sending fake invoices. Here are some examples of financial and economic crimes within this domain: Invoice fraud: Fraudsters create false invoices and send them to organizations, often impersonating legitimate suppliers. They modify the payment instructions on the invoice so that the money is transferred to their own account instead of the legitimate supplier. Identity theft: Fraudsters assume the identity of a legitimate supplier and send fake…

Read more
1925 views
///

Online Fraud

Within the domain of online fraud, various forms of financial and economic crimes can occur. Online fraud refers to illegal practices where fraudsters exploit the internet and digital channels to gain financial advantage. Here are some examples of financial and economic crimes within this domain: Identity theft: Fraudsters can steal personal information, such as login credentials, credit card details, or identity documents, to impersonate someone else and conduct financial transactions. Phishing: This is a form of fraud where fraudsters use fake emails, messages, or websites to gather victims’ personal information, such as login credentials, credit card numbers, or other confidential…

Read more
1258 views