Mohammad Ali Bani Younes


Abstract: This research presents e-fraud types and clarifies the suggestions that have been reached to deal with the problems of electronic fraud so as not to be victims of this fraud, and explains how to act when detecting electronic fraud, especially with the spread of the Internet through institutions to make them more secure. Therefore, Arab countries must take a series of steps and strategies at all levels, particularly those organizational steps, which make many texts and provisions used effectively to prevent cybercrime. States should therefore take all legal measures to punish various types of attacks on information systems.


crimes; cybercrime; Fraud; Monument; Stealing; victims

Full Text:




A. Singh Poonia, “Cyber Crime: Challenges and its classification,” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS). vol.3, pp.119-121, November-December 2014.

Rusch, Jonathan J. “The social engineering” of internet fraud,” In Internet Society Annual Conference, http://www. isoc. org/ 1999.

M. Gercke, “Understanding cybercrime: Phenomena, challenges and legal response,” e ITU publication, pp. 1-336, September 2012.

H. Saini, Y. Shankar Rao and T.C.Panda, “Cyber-Crimes and their impacts: A Review,” International Journal of Engineering Research and Applications (IJERA). vol..2, pp. 202-209, Mar-Apr 2012,.

S. Malby, R. Mace, A. Holterhof, C.Brown, S. Kascherus, and E.Ignatuschtschenko (UNODC), the Comprehensive study on cybercrime (United Nations New York, Printed in Austria, February 2013).

M. McGuire, S. Dowling, Cybercrime: A review of the evidence Chapter 1: Cyber-dependent crimes, (Home Office Research Report 75 October 2013).

M. Pironet, C. Antunes , P. Moura , J. Gomes, “Classification for Fraud Detection with Social Network Analysis,” Dissertation, October 2009.

Y. Kou, C. T. Lu, S. Sinvongwattana, Y. P. Huang, “Survey of Fraud Detection Techniques,” Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control Taipei, Taiwan, March 21-23, 2004 pp. 749-754.

K.S. Koong, L. c. Liu, J. Wei, “An Examination of Internet Fraud Occurrences,” Research Gate, January 2012, pp.441-449.

KS. Koong, H. Qin, LC. Liu, T. Ying “Occurrences of online fraud complaints: 2002 through 2015,” International Journal of Accounting and Information Management, vol. 25, pp. 484-504, August 2017.

E. Echeburúa, P. Corral and P. J. Amor “Evaluation Of Psychological Harm in the Victims of Violent Crime," Copyright 2003 by the Colegio Oficial de Psicólogos, Spain, vol.7, pp. 10-18. 2003.

L. Delamaire, H. Abdou, J. Pointon, “Credit card fraud and detection techniques: A review,” Banks and Bank Systems, vol. 4, pp. 57-68, January 2009.

T. Zeller Jr, A Common Currency for Online Fraud: Forgers of U.S. Postal Money Orders Grow". New York Times. (April 26, 2005.

Ziegenfuss, Douglas E. “An examination of the professionalism of fraud examiners,” Southern Business Review 27.1 (2001): 23.

K. Frimpong, P. Baker, “Fighting public sector fraud: The growth of professionalism in counter-fraud investigators,” Crime Prevention and Community Safety, 9(2), 130-137, 2007.

B. Gavish, C. L. Tucci, “Reducing internet auction fraud,” Communications of the ACM, vol 51, pp.89-97. 2008.

C.E.H. Chua, J. Wareham and D. Robey, “The role of online trading communities in managing internet auction fraud,” MIS Quarterly, pp.759-781,2007.

A Teich, M.S. Frankel, R. Kling, and Y.C. Lee, “Anonymous communication policies for the Internet: Results and recommendations,” of the AAAS conference. The Information Society, vol.15, pp.71-77. 1999.

Casey, Eoghan. Digital evidence and computer crime: Forensic science, computers, and the internet. Academic press, 2011.

Lail, Bradley, J. MacGregor, J. Marcum, and M. Stuebs. “Virtuous professionalism in accountants to avoid fraud and to restore financial reporting,” Journal of business ethics, vol. 140, pp.687-7044, 2017.

Grazioli, Stefano, and S. Jarvenpaa. “Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers,” IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans30, no. 4, pp. 395-410. 2000.



  • There are currently no refbacks.

Copyright (c) 2019 International Journal of Advanced Research in Computer Science