INTERNET FRAUD TO DECEIVE EMAIL BY USING DIFFERENT TECHNOLOGIES
Main Article Content
Abstract
Abstract: This research presents e-fraud types and clarifies the suggestions that have been reached to deal with the problems of electronic fraud so as not to be victims of this fraud, and explains how to act when detecting electronic fraud, especially with the spread of the Internet through institutions to make them more secure. Therefore, Arab countries must take a series of steps and strategies at all levels, particularly those organizational steps, which make many texts and provisions used effectively to prevent cybercrime. States should therefore take all legal measures to punish various types of attacks on information systems.
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
X. REFERENCES
A. Singh Poonia, “Cyber Crime: Challenges and its classification,†International Journal of Emerging Trends & Technology in Computer Science (IJETTCS). vol.3, pp.119-121, November-December 2014.
Rusch, Jonathan J. “The social engineering†of internet fraud,†In Internet Society Annual Conference, http://www. isoc. org/ 1999.
M. Gercke, “Understanding cybercrime: Phenomena, challenges and legal response,†e ITU publication, pp. 1-336, September 2012.
H. Saini, Y. Shankar Rao and T.C.Panda, “Cyber-Crimes and their impacts: A Review,†International Journal of Engineering Research and Applications (IJERA). vol..2, pp. 202-209, Mar-Apr 2012,.
S. Malby, R. Mace, A. Holterhof, C.Brown, S. Kascherus, and E.Ignatuschtschenko (UNODC), the Comprehensive study on cybercrime (United Nations New York, Printed in Austria, February 2013).
M. McGuire, S. Dowling, Cybercrime: A review of the evidence Chapter 1: Cyber-dependent crimes, (Home Office Research Report 75 October 2013).
M. Pironet, C. Antunes , P. Moura , J. Gomes, “Classification for Fraud Detection with Social Network Analysis,†Dissertation, October 2009.
Y. Kou, C. T. Lu, S. Sinvongwattana, Y. P. Huang, “Survey of Fraud Detection Techniques,†Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control Taipei, Taiwan, March 21-23, 2004 pp. 749-754.
K.S. Koong, L. c. Liu, J. Wei, “An Examination of Internet Fraud Occurrences,†Research Gate, January 2012, pp.441-449.
KS. Koong, H. Qin, LC. Liu, T. Ying “Occurrences of online fraud complaints: 2002 through 2015,†International Journal of Accounting and Information Management, vol. 25, pp. 484-504, August 2017.
E. Echeburúa, P. Corral and P. J. Amor “Evaluation Of Psychological Harm in the Victims of Violent Crime," Copyright 2003 by the Colegio Oficial de Psicólogos, Spain, vol.7, pp. 10-18. 2003.
L. Delamaire, H. Abdou, J. Pointon, “Credit card fraud and detection techniques: A review,†Banks and Bank Systems, vol. 4, pp. 57-68, January 2009.
T. Zeller Jr, A Common Currency for Online Fraud: Forgers of U.S. Postal Money Orders Grow". New York Times. (April 26, 2005.
Ziegenfuss, Douglas E. “An examination of the professionalism of fraud examiners,†Southern Business Review 27.1 (2001): 23.
K. Frimpong, P. Baker, “Fighting public sector fraud: The growth of professionalism in counter-fraud investigators,†Crime Prevention and Community Safety, 9(2), 130-137, 2007.
B. Gavish, C. L. Tucci, “Reducing internet auction fraud,†Communications of the ACM, vol 51, pp.89-97. 2008.
C.E.H. Chua, J. Wareham and D. Robey, “The role of online trading communities in managing internet auction fraud,†MIS Quarterly, pp.759-781,2007.
A Teich, M.S. Frankel, R. Kling, and Y.C. Lee, “Anonymous communication policies for the Internet: Results and recommendations,†of the AAAS conference. The Information Society, vol.15, pp.71-77. 1999.
Casey, Eoghan. Digital evidence and computer crime: Forensic science, computers, and the internet. Academic press, 2011.
Lail, Bradley, J. MacGregor, J. Marcum, and M. Stuebs. “Virtuous professionalism in accountants to avoid fraud and to restore financial reporting,†Journal of business ethics, vol. 140, pp.687-7044, 2017.
Grazioli, Stefano, and S. Jarvenpaa. “Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers,†IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans30, no. 4, pp. 395-410. 2000.