1 / 15

FRAUD EXAMINATION ALBRECHT & ALBRECHT

FRAUD EXAMINATION ALBRECHT & ALBRECHT. Fraud in E-Commerce. Chapter 15. Discuss Internet Statistics. Review the Fraud Triangle. Discuss Fraud Risks of E-Commerce - Pressure. Discuss Fraud Risks of E-Commerce - Opportunities. Discuss Fraud Risks of E-Commerce - Rationalization.

Download Presentation

FRAUD EXAMINATION ALBRECHT & ALBRECHT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. FRAUD EXAMINATIONALBRECHT & ALBRECHT Fraud in E-Commerce Chapter 15

  2. Discuss Internet Statistics

  3. Review the Fraud Triangle

  4. Discuss Fraud Risks of E-Commerce - Pressure

  5. Discuss Fraud Risks of E-Commerce - Opportunities

  6. Discuss Fraud Risks of E-Commerce - Rationalization

  7. What is the best way to prevent E – Fraud?

  8. List & Comment on Internal Control Components

  9. Discuss Topics in Risk Assessment

  10. What control activities can be used to prevent E – fraud? Highlight Most Significant

  11. What should be done to discover management fraud in E - Commerce?

  12. What should fraud examiners endeavor to do in an examination?

  13. What is one thing that should be done with E – businesses?

  14. Terms Match Using unique human body features to secure controls Biometrics Stealing data or personal information Data Theft Exchanging business information & transactions in electronic paperless form Digital Signatures & Certificates A signature sent over the internet E-Business

  15. Terms Match Pretending to be someone else Falsified Identity Illegal or unauthorized viewing of information passed along a network Sniffing Mimicking another web site to trick or confuse e-mail or e-business users Spoofing Changing information in an e-mail header or IP address to hide identity Hijacking

More Related