Abstract
Crimes have many faces, and with technology coming into play, this has been more refined and challenging. The modern world is evolving so rapidly, and new developments ease our lives, but they also pose problems. A website serves as a more admired platform for the user to access various web apps. The Internet is clearly a valuable resource for young people, but they may also pose serious difficulties. It is quite simple to create a phoney website that seems to be the genuine website where hackers operate. This is not a small act, but if these are to be studied at large, then it shows what these small acts that make a massive impact on the global level. In the said article, the authors have tried to study the types of online frauds and how they have come up a long way and resulted in the massive financial crimes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Anderson, K. B. (2008). Identity theft. Journal of Economic Perspectives, 22(2), 171–192.
Ben-Asher, N. (2015). Effects of cyber security knowledge on attack detection. Computers in Human Behavior, 48, 51–61.
Burden, K. (2003). Internet crime: Cyber crime—A new breed of criminal? Computer Law & Security Review, 19(3), 222–227.
Chouhan, R. (2014). Cyber crimes: Evolution, detection and future challenges. IUP Journal of Information Technology, 10(1), 48.
Cross, C. (2016). The problem of “white noise”: Examining current prevention approaches to online fraud. Journal of Financial Crime, 23(4), 806–818.
Dhamija, R. T. (2006, April). Why phishing works. In Proceedings of the SIGCHI conference on human factors in computing systems, pp. 581–590.
Jahankhani, H. A.-N.-F. (2014). Cybercrime classification and characteristics. In Cyber crime and cyber terrorism investigator’s handbook (pp. 149–164). Syngress.
Kaur, P. K. (2019). ATM card cloning and ethical considerations. Science and Engineering Ethics, 25(5), 1311–1320.
Klerx, T. A. (2014). On the usage of behavior models to detect ATM fraud. In ECAI 2014, pp. 1045–1046.
McGuire, M. (2013). Cyber crime: A review of the evidence. 75, 1–35: Summary of key findings and implications. Home Office Research report.
Pawar, S. C. (2021). Cyber crime, cyber space and effects of cyber crime. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 7, 210–214.
Pocar, F. (2004). New challenges for international rules against cyber-crime. European Journal on Criminal Policy and Research, 10(1), 27–37.
Riek, M. B. (2015). Measuring the influence of perceived cybercrime risk on online service avoidance. IEEE Transactions on Dependable and Secure Computing, 13(2), 261–273.
Sijan, M. A. (2022, March). A review on e-banking security in Bangladesh: An empirical study. In Proceedings of the 2nd international conference on computing advancements, pp. 330–336.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Ambashtha, K.L., Kumar, P. (2023). Online Fraud. In: Gupta, C.M. (eds) Financial Crimes. Springer, Cham. https://doi.org/10.1007/978-3-031-29090-9_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-29090-9_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-29089-3
Online ISBN: 978-3-031-29090-9
eBook Packages: Law and CriminologyLaw and Criminology (R0)