Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010274329 | HV6773 I573 2010 | Open Access Book | Book | Searching... |
Searching... | 30000010293662 | HV6773 I573 2010 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Real case studies on Internet fraud written by real fraud examiners
Internet Fraud Casebook: The World Wide Web of Deceit is a one-of-a-kind collection of actual cases written by the fraud examiners who investigated them. These stories were hand-selected from hundreds of submissions and together form a comprehensive, enlightening and entertaining picture of the many types of Internet fraud in varied industries throughout the world.
Each case outlines how the fraud was engineered, how it was investigated, and how perpetrators were brought to justice Topics included are phishing, on-line auction fraud, security breaches, counterfeiting, and others Other titles by Wells: Fraud Casebook, Principles of Fraud Examination, and Computer Fraud CasebookThis book reveals the dangers of Internet fraud and the measures that can be taken to prevent it from happening in the first place.
Author Notes
Dr. JOSEPH T. WELLS, CFE, CPA, is the founder and Chairman of the Board of the Association of Certified Fraud Examiners (ACFE), the world's largest anti-fraud organization. Mr. Wells writes, researches, and lectures to business and professional groups on fraud-related issues. He has authored seventeen books and scores of articles. His writing has won numerous awards, including the top articles of the year for Internal Auditor magazine and the Journal of Accountancy. The American Accounting Association previously named him Accounting Education Innovator of the Year for his pioneering work in fraud examination education.
Reviews 1
Choice Review
Each of this book's 41 chapters describes an Internet-related fraud in a brief vignette format. All these case studies are written in the first person by the individual fraud investigator involved. Each study relates the background of the fraud, the people involved, the investigator's role in solving the case, and usually what legal action concluded the case. Following this description, each study provides a "Lessons Learned" summary, a "Recommendations to Prevent Future Occurrences" list, and a brief author biography. Given the many authors and diversity of cases ("The Broken Nest Egg," "The eBay Fraud Brothers," "Wire Transfers from Nowhere," etc.), the consistency of each chapter's description and format reflects an extraordinary editing job by Wells and his staff. Though most cases occurred in the US, there are a number of international ones too, e.g., in such noted fraud-originating countries as Russia and Nigeria. This book will have broad appeal to anyone interested in gaining a better perspective of how inventive and opportunistic criminals are in exploiting the Internet to commit fraud. Summing Up: Recommended. General readers and professionals/practitioners. E. M. Aupperle emeritus, University of Michigan
Table of Contents
Preface | p. xiii |
Internet Fraud Tree | p. xvii |
Chapter 1 Phantom Figurines | p. 1 |
Chapter 2 From Russia With Love? | p. 13 |
Chapter 3 Behind a Smoke Screen | p. 21 |
Chapter 4 Cars, Cards, Chemicals and Crayons | p. 31 |
Chapter 5 Small-Town Boys | p. 43 |
Chapter 6 Dangerous Diet | p. 51 |
Chapter 7 The Suburban Spoofer | p. 59 |
Chapter 8 Don't Mess With Texas | p. 69 |
Chapter 9 Hot Wire | p. 81 |
Chapter 10 A Business Within a Business | p. 89 |
Chapter 11 Double Play | p. 97 |
Chapter 12 The eBay-Fraud Brothers | p. 105 |
Chapter 13 Not-So-Precious Metals | p. 113 |
Chapter 14 The Cool-Cash Syndicate | p. 125 |
Chapter 15 Dastardly Design | p. 133 |
Chapter 16 The Reckless Clerk | p. 141 |
Chapter 17 Close Quarters | p. 151 |
Chapter 18 Playing with Fire | p. 161 |
Chapter 19 Hack, Pump and Dump | p. 171 |
Chapter 20 Dangerous Learning Curve | p. 179 |
Chapter 21 The Sherwood Boys | p. 187 |
Chapter 22 The Broken Nest EGG | p. 197 |
Chapter 23 One More Lap to go | p. 207 |
Chapter 24 Death and Taxes | p. 217 |
Chapter 25 Keeping it all in the Family | p. 225 |
Chapter 26 No Security in Online Advance Fees | p. 237 |
Chapter 27 The G.I. Hacker | p. 245 |
Chapter 28 The Wrong Suspect | p. 253 |
Chapter 29 Dribbling on the Internet | p. 261 |
Chapter 30 Behind The Mask | p. 269 |
Chapter 31 Online Pharmacy | p. 279 |
Chapter 32 The Porn Procurement Process | p. 291 |
Chapter 33 Gambling on a Profit | p. 299 |
Chapter 34 The Solitaire Trader | p. 309 |
Chapter 35 The Big Brother He Never Had | p. 315 |
Chapter 36 Wanted: Your Money | p. 325 |
Chapter 37 The Business of Making Money | p. 333 |
Chapter 38 Failure to Deliver | p. 341 |
Chapter 39 Cyber Psycho | p. 349 |
Chapter 40 Drag Queens and Drugs | p. 359 |
Chapter 41 Wire Transfers from Nowhere | p. 369 |
Glossary | p. 379 |
Index | p. 383 |