SlideShare a Scribd company logo
1 of 23
Chapter 15
Consumer Fraud
Learning Objectives
• Define what consumer fraud is and understand its seriousness
• Understand identity theft
• Classify the various types of investment and consumer frauds
Consumer Fraud
• Any fraud that targets a consumer or an individual as its victim.
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
• Two types of consumer fraud
• Identity Theft
• Consumer Scams
• With advancements in technology consumer fraud has become much more common
than it used to be.
Identity Theft
• Identity theft is using the identity information of another
person to pretend to be them.
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
Identity Crime in New Zealand
Identity Crime in New Zealand
•Costs the New Zealand economy approximately $209 million every year.
•133,000 New Zealanders are victims of identity theft annually.
New Zealanders tend to be trusting people which makes New Zealand appear to
be an easy target.
(Department of Internal Affairs, 2013)
Identity Theft Cycle
Stage 1: Discovery
1. Gain Information
2. Verify
Information
Stage 2: Action
1. Accumulating
Documentation
2. Cover-up Actions
Stage 3: Trial
1. 1st Dimensional
2. 2nd
Dimensional
3. 3rd
Dimensional
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
Methods of Identity Theft
• Posing as an employee or representative of an organisation
• Shoulder surfing
• Dumpster diving
• Skimming
• Phishing
• Stealing wallets
• Theft of mail
• Social engineering
(Department of Internal Affairs, 2013) & (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
Identity Theft – RFID
Scanning
How Fraudsters Benefit from Identity Theft
• Buy large ticket items
• Take out car, home or other loans
• Establish phone or wireless service in the victims name
• Opening a new bank account
• Filing for bankruptcy under the victims name
• Reporting a victim’s name to the police in lieu of their own
• Opening new credit card accounts
• Changing victim’s mailing address
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
How to Minimise the Risks of Identity Theft
• Keep key documents (e.g. birth certificate and passport) in a safe place
• Shred or burn mail with your name and address on it.
• Be careful when publishing information in public places
• Do not log onto internet banking from a shared or public computers.
• Remove all personal information from computers before you dispose of them.
• Be suspicious of any unexpected events
• Request an access register report from Births, Deaths and Marriages
• Request a credit report from Dun & Bradstreet or Veda.
(Department of Internal Affairs, 2011)
Recent NZ Examples of Identity Theft
Other Types of Consumer Scams
• Fraudsters use various schemes to earn a
consumer’s confidence and then use that
confidence to get the consumer to pay or invest
money or provide personal information.
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
Other Consumer Scams
Foreign Advance-Fee Scams
•Nigerian money offers
•Clearinghouse scam
•Purchase of real estate scam
•Sale of crude oil at below market price
•Disbursement of money from wills
Other Consumer Scams
Work-at-Home Schemes
•Multilevel marketing
•Chain letters, mail stuffing, product testing, craft assembly
Bogus Mystery Shopping Scams
Telemarketing Fraud
Scams in New Zealand
• Increasing number of people being ripped off through simple scams in New
Zealand
• Complaints are being made almost daily
• Scams would continue until public became more savvy about how the frauds
work
(Leask, 2013)
• New Zealanders reported $4 million lost in scams last year, although the
government estimates that scams could cost the country up to half a billion
dollars every year.
(Wannan, 2013)
How to Detect Scams
• it's addressed to 'My Dear' or something generic
• there are many grammatical or spelling errors in the email
• the email address is a public service domain like Gmail / Yahoo / Livemail
• a bank that you don't have an account with contacts you
• you are urged to visit a website to update your account information or fill in a form with personal information
• you're advised to act fast to claim money or some other prize in a lottery or competition that you never entered
• you inherit money or possessions from someone you've never heard of
• you receive a request from a stranger who needs your help (usually to send money)
• someone on a social networking site asks you to send them money so they can pay debts or so that they can visit you.
(The Department of Internal Affairs, 2013)
Example Consumer Scam
Dear Alsemgeest ,
Please forgive my using this means to reach you but I can't think of any other
way of letting you know of this urgent matter at hand. I am Barrister Davidson
Paul Kingsley ,an Attorney at law and the Personal lawyer to(late)Engineer D.
Alsemgeest , who dwelt and worked here for more than twenty years as a major
contractor and businessman.
On the 21st of june 2005, my client,his wife and their only daugther were
involved in an automobile accident and It was unfortunate my client and his
family all lost their lives and leaving some huge amount of money, Eight
Million Five hundred thousand united state dollars ($8.5 )in a security finance
firm.
I shall detail you on the confirmation of your genuinty to work this out with
me. use your personal email address and contact me directly through this my
private email address davidson-atg@terra.com for more details.
Thanks
Davidson Paul Kingsley  (Esq)
Email: davidson-atg@terra.com
Scams Targeting the Elderly and Uneducated
• Those who are the most susceptible to consumer fraud are the elderly and the
uneducated.
• Elderly are more susceptible to telemarketing fraud than any other type of fraud.
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
• “old folk are being targeted by scammers”
• “People in the senior age group might have more money to invest or be seeking
online business opportunities”
• Grey Power Wanganui President seniors would probably be too embarrassed to say
they had been conned.
(Karauria, 2013)
Five Worst Scams in NZ
• Dating and romance scams
• Investment Scams
• Upfront money scams
• Online auction and trading scams
• Online products, advertising and computer hacking
(Ministry of Business Innovation and Employment’s Consumer Affairs Team, 2013)
Recent NZ Consumer Fraud Examples
Investment Scams
• Any fraud which is related to stocks, bonds, commodities, limited
partnerships, real estate, or other types of investments.
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
• Perpetrators usually make fraudulent promises or mis-statements
to induce people to make investments
Example
• Ponzi Scheme
Investment Fraud – Red Flags
• Unreasonably high or guaranteed rates of return
• Investments that do not make sound business sense or lack detail
• Pressure to make the investment early
• A business with a history of scandals
• Unaudited financial reports or adverse opinions
• Luxurious lifestyles of principals
• Investment success that is dependent on someone’s “unique expertise”
• Inability to pull out or liquidate the investment
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
Conclusion
• Consumer fraud is any type of fraud that targets consumers as its victims.
• Any offer that sounds too good to be true probably is.
• Scams operate in a manner which aim to gain an individual’s confidence and
then use that confidence to defraud the consumer.
• Advances in technology have made consumer fraud much easier for
perpetrators to commit.

More Related Content

What's hot

Accounts receivable process
Accounts receivable processAccounts receivable process
Accounts receivable processSachinh08
 
INTERNAL CONTROLS & INTERNAL AUDIT.ppt
INTERNAL CONTROLS & INTERNAL AUDIT.pptINTERNAL CONTROLS & INTERNAL AUDIT.ppt
INTERNAL CONTROLS & INTERNAL AUDIT.pptGoharSaeed6
 
Internal Controls
Internal ControlsInternal Controls
Internal Controlsmscuttle
 
Introduction to financial management ppt @ mba
Introduction to financial management ppt @ mbaIntroduction to financial management ppt @ mba
Introduction to financial management ppt @ mbaBabasab Patil
 
Coso internal control integrated framework
Coso internal control   integrated frameworkCoso internal control   integrated framework
Coso internal control integrated frameworkIrfan Ahmed - ACA, CICA
 
Lecture 16 internal control - james a. hall book chapter 3
Lecture 16  internal control - james a. hall book chapter 3Lecture 16  internal control - james a. hall book chapter 3
Lecture 16 internal control - james a. hall book chapter 3Habib Ullah Qamar
 
Internal audit and statutory audit
Internal audit and statutory auditInternal audit and statutory audit
Internal audit and statutory auditGirish Sawhney
 
Intercompany transactions of non-current assets - depreciable assets
Intercompany transactions of non-current assets - depreciable assetsIntercompany transactions of non-current assets - depreciable assets
Intercompany transactions of non-current assets - depreciable assetsArthik Davianti
 
Operational innovations in AML/CFT compliance processes and financial inclus...
Operational innovations in AML/CFT  compliance processes and financial inclus...Operational innovations in AML/CFT  compliance processes and financial inclus...
Operational innovations in AML/CFT compliance processes and financial inclus...CGAP
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal controljayussuryawan
 
Internal controls in auditing
Internal controls in auditingInternal controls in auditing
Internal controls in auditingHardik Shah
 
Chapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudChapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudVidaB
 

What's hot (20)

Recent Trends In Auditing.pptx
Recent Trends In Auditing.pptxRecent Trends In Auditing.pptx
Recent Trends In Auditing.pptx
 
Ppt business risk
Ppt business riskPpt business risk
Ppt business risk
 
Accounts receivable process
Accounts receivable processAccounts receivable process
Accounts receivable process
 
Chapter 3 Business In Global Setting
Chapter 3 Business In Global SettingChapter 3 Business In Global Setting
Chapter 3 Business In Global Setting
 
INTERNAL CONTROLS & INTERNAL AUDIT.ppt
INTERNAL CONTROLS & INTERNAL AUDIT.pptINTERNAL CONTROLS & INTERNAL AUDIT.ppt
INTERNAL CONTROLS & INTERNAL AUDIT.ppt
 
Internal Controls
Internal ControlsInternal Controls
Internal Controls
 
Introduction to financial management ppt @ mba
Introduction to financial management ppt @ mbaIntroduction to financial management ppt @ mba
Introduction to financial management ppt @ mba
 
Understanding Financial Statement fraud- Forensic Accounting Perspective
Understanding Financial Statement fraud- Forensic Accounting PerspectiveUnderstanding Financial Statement fraud- Forensic Accounting Perspective
Understanding Financial Statement fraud- Forensic Accounting Perspective
 
Importance of Bookkeeping ppt
Importance of Bookkeeping  pptImportance of Bookkeeping  ppt
Importance of Bookkeeping ppt
 
Fraud, Internal Control & Cash
Fraud, Internal Control & CashFraud, Internal Control & Cash
Fraud, Internal Control & Cash
 
Coso internal control integrated framework
Coso internal control   integrated frameworkCoso internal control   integrated framework
Coso internal control integrated framework
 
Lecture 16 internal control - james a. hall book chapter 3
Lecture 16  internal control - james a. hall book chapter 3Lecture 16  internal control - james a. hall book chapter 3
Lecture 16 internal control - james a. hall book chapter 3
 
Internal audit and statutory audit
Internal audit and statutory auditInternal audit and statutory audit
Internal audit and statutory audit
 
Intercompany transactions of non-current assets - depreciable assets
Intercompany transactions of non-current assets - depreciable assetsIntercompany transactions of non-current assets - depreciable assets
Intercompany transactions of non-current assets - depreciable assets
 
Operational innovations in AML/CFT compliance processes and financial inclus...
Operational innovations in AML/CFT  compliance processes and financial inclus...Operational innovations in AML/CFT  compliance processes and financial inclus...
Operational innovations in AML/CFT compliance processes and financial inclus...
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal control
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Internal controls in auditing
Internal controls in auditingInternal controls in auditing
Internal controls in auditing
 
Chapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudChapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraud
 
Howie's cafe caper
Howie's cafe caperHowie's cafe caper
Howie's cafe caper
 

Viewers also liked

Respite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentationRespite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentationRespiteNowGreg
 
Elder Care: Fraud Protection
Elder Care: Fraud ProtectionElder Care: Fraud Protection
Elder Care: Fraud Protectioncaretocontinue
 
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015Age Action
 
Protect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the ElderlyProtect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the ElderlyGlass Jacobson
 
Fraud Committed Against the Elderly in N.C.
Fraud Committed Against the Elderly in N.C.Fraud Committed Against the Elderly in N.C.
Fraud Committed Against the Elderly in N.C.NCCPPR
 
Neuroeconomics Evidence for Decision-making Theory
Neuroeconomics Evidence for Decision-making TheoryNeuroeconomics Evidence for Decision-making Theory
Neuroeconomics Evidence for Decision-making TheoryMeiling XU
 
Navigating Elder Financial Abuse
Navigating Elder Financial AbuseNavigating Elder Financial Abuse
Navigating Elder Financial AbuseMegan Yip
 
5.4 whose laws rule the web
5.4 whose laws rule the web 5.4 whose laws rule the web
5.4 whose laws rule the web Hasan Dang
 
Scammin Elderly PP
Scammin Elderly PPScammin Elderly PP
Scammin Elderly PPKatelyn Lutz
 
HCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINALHCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINALGina Leymeister
 
Elder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
Elder Abuse: A Concern For Social Work Practice ...Lloyd DsouzaElder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
Elder Abuse: A Concern For Social Work Practice ...Lloyd Dsouzadyutirajagiri
 
Overview of Neuroeconomics
Overview of NeuroeconomicsOverview of Neuroeconomics
Overview of Neuroeconomicsdpirouz
 
Elder financial exploitation gov conf presentation
Elder financial exploitation gov conf presentation Elder financial exploitation gov conf presentation
Elder financial exploitation gov conf presentation rexnayee
 
EC4024 Financial Economics Lecture 19L Neurofinance
EC4024 Financial Economics Lecture 19L NeurofinanceEC4024 Financial Economics Lecture 19L Neurofinance
EC4024 Financial Economics Lecture 19L NeurofinanceStephen Kinsella
 
Utility and neuroscience: a mechanistic approach of decision-making and ratio...
Utility and neuroscience: a mechanistic approach of decision-making and ratio...Utility and neuroscience: a mechanistic approach of decision-making and ratio...
Utility and neuroscience: a mechanistic approach of decision-making and ratio...Benoit Hardy-Vallée, Ph.D.
 

Viewers also liked (20)

Respite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentationRespite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentation
 
Elder Care: Fraud Protection
Elder Care: Fraud ProtectionElder Care: Fraud Protection
Elder Care: Fraud Protection
 
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
 
Protect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the ElderlyProtect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the Elderly
 
Fraud Committed Against the Elderly in N.C.
Fraud Committed Against the Elderly in N.C.Fraud Committed Against the Elderly in N.C.
Fraud Committed Against the Elderly in N.C.
 
Neuroeconomics Evidence for Decision-making Theory
Neuroeconomics Evidence for Decision-making TheoryNeuroeconomics Evidence for Decision-making Theory
Neuroeconomics Evidence for Decision-making Theory
 
Navigating Elder Financial Abuse
Navigating Elder Financial AbuseNavigating Elder Financial Abuse
Navigating Elder Financial Abuse
 
5.4 whose laws rule the web
5.4 whose laws rule the web 5.4 whose laws rule the web
5.4 whose laws rule the web
 
Scammin Elderly PP
Scammin Elderly PPScammin Elderly PP
Scammin Elderly PP
 
Senior scams
Senior scamsSenior scams
Senior scams
 
Elder Abuse on the Front Lines
Elder Abuse on the Front LinesElder Abuse on the Front Lines
Elder Abuse on the Front Lines
 
HCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINALHCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINAL
 
Keeping The Elderly Safe In The 21st Century
Keeping The Elderly Safe In The 21st CenturyKeeping The Elderly Safe In The 21st Century
Keeping The Elderly Safe In The 21st Century
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
What is neuroeconomics
What is neuroeconomicsWhat is neuroeconomics
What is neuroeconomics
 
Elder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
Elder Abuse: A Concern For Social Work Practice ...Lloyd DsouzaElder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
Elder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
 
Overview of Neuroeconomics
Overview of NeuroeconomicsOverview of Neuroeconomics
Overview of Neuroeconomics
 
Elder financial exploitation gov conf presentation
Elder financial exploitation gov conf presentation Elder financial exploitation gov conf presentation
Elder financial exploitation gov conf presentation
 
EC4024 Financial Economics Lecture 19L Neurofinance
EC4024 Financial Economics Lecture 19L NeurofinanceEC4024 Financial Economics Lecture 19L Neurofinance
EC4024 Financial Economics Lecture 19L Neurofinance
 
Utility and neuroscience: a mechanistic approach of decision-making and ratio...
Utility and neuroscience: a mechanistic approach of decision-making and ratio...Utility and neuroscience: a mechanistic approach of decision-making and ratio...
Utility and neuroscience: a mechanistic approach of decision-making and ratio...
 

Similar to Chapter 15Consumer Fraud by Rachel

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Barbara O'Neill
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Trainingswalton4
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Themmilfamln
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud Dixita S
 

Similar to Chapter 15Consumer Fraud by Rachel (20)

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft Overview Webinar
Identity Theft Overview WebinarIdentity Theft Overview Webinar
Identity Theft Overview Webinar
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
ONLINE FRAUD GUIDE
ONLINE FRAUD GUIDEONLINE FRAUD GUIDE
ONLINE FRAUD GUIDE
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Idt workshop group benefits
Idt workshop group benefitsIdt workshop group benefits
Idt workshop group benefits
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 

More from VidaB

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedVidaB
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce JenVidaB
 
Chapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by EmmaChapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by EmmaVidaB
 
Chapter 16 B Artika
Chapter 16 B ArtikaChapter 16 B Artika
Chapter 16 B ArtikaVidaB
 
Chapter 14 by Svetlana
Chapter 14 by SvetlanaChapter 14 by Svetlana
Chapter 14 by SvetlanaVidaB
 
Chapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosuresChapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosuresVidaB
 
Chapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory FraudChapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory FraudVidaB
 
Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet VidaB
 
Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud VidaB
 
Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud  Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud VidaB
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methodsVidaB
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methodsVidaB
 
Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen VidaB
 
Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud VidaB
 
Chapter 1 the nature of fraud
Chapter 1 the nature of fraudChapter 1 the nature of fraud
Chapter 1 the nature of fraudVidaB
 
Week 1 audit and assurance services
Week 1 audit  and assurance servicesWeek 1 audit  and assurance services
Week 1 audit and assurance servicesVidaB
 

More from VidaB (16)

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Chapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by EmmaChapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by Emma
 
Chapter 16 B Artika
Chapter 16 B ArtikaChapter 16 B Artika
Chapter 16 B Artika
 
Chapter 14 by Svetlana
Chapter 14 by SvetlanaChapter 14 by Svetlana
Chapter 14 by Svetlana
 
Chapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosuresChapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosures
 
Chapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory FraudChapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory Fraud
 
Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet
 
Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud
 
Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud  Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
 
Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen
 
Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud
 
Chapter 1 the nature of fraud
Chapter 1 the nature of fraudChapter 1 the nature of fraud
Chapter 1 the nature of fraud
 
Week 1 audit and assurance services
Week 1 audit  and assurance servicesWeek 1 audit  and assurance services
Week 1 audit and assurance services
 

Recently uploaded

Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 

Recently uploaded (20)

Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 

Chapter 15Consumer Fraud by Rachel

  • 2. Learning Objectives • Define what consumer fraud is and understand its seriousness • Understand identity theft • Classify the various types of investment and consumer frauds
  • 3. Consumer Fraud • Any fraud that targets a consumer or an individual as its victim. (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012) • Two types of consumer fraud • Identity Theft • Consumer Scams • With advancements in technology consumer fraud has become much more common than it used to be.
  • 4. Identity Theft • Identity theft is using the identity information of another person to pretend to be them. (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
  • 5. Identity Crime in New Zealand Identity Crime in New Zealand •Costs the New Zealand economy approximately $209 million every year. •133,000 New Zealanders are victims of identity theft annually. New Zealanders tend to be trusting people which makes New Zealand appear to be an easy target. (Department of Internal Affairs, 2013)
  • 6. Identity Theft Cycle Stage 1: Discovery 1. Gain Information 2. Verify Information Stage 2: Action 1. Accumulating Documentation 2. Cover-up Actions Stage 3: Trial 1. 1st Dimensional 2. 2nd Dimensional 3. 3rd Dimensional (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
  • 7. Methods of Identity Theft • Posing as an employee or representative of an organisation • Shoulder surfing • Dumpster diving • Skimming • Phishing • Stealing wallets • Theft of mail • Social engineering (Department of Internal Affairs, 2013) & (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
  • 8. Identity Theft – RFID Scanning
  • 9. How Fraudsters Benefit from Identity Theft • Buy large ticket items • Take out car, home or other loans • Establish phone or wireless service in the victims name • Opening a new bank account • Filing for bankruptcy under the victims name • Reporting a victim’s name to the police in lieu of their own • Opening new credit card accounts • Changing victim’s mailing address (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
  • 10. How to Minimise the Risks of Identity Theft • Keep key documents (e.g. birth certificate and passport) in a safe place • Shred or burn mail with your name and address on it. • Be careful when publishing information in public places • Do not log onto internet banking from a shared or public computers. • Remove all personal information from computers before you dispose of them. • Be suspicious of any unexpected events • Request an access register report from Births, Deaths and Marriages • Request a credit report from Dun & Bradstreet or Veda. (Department of Internal Affairs, 2011)
  • 11. Recent NZ Examples of Identity Theft
  • 12. Other Types of Consumer Scams • Fraudsters use various schemes to earn a consumer’s confidence and then use that confidence to get the consumer to pay or invest money or provide personal information. (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
  • 13. Other Consumer Scams Foreign Advance-Fee Scams •Nigerian money offers •Clearinghouse scam •Purchase of real estate scam •Sale of crude oil at below market price •Disbursement of money from wills
  • 14. Other Consumer Scams Work-at-Home Schemes •Multilevel marketing •Chain letters, mail stuffing, product testing, craft assembly Bogus Mystery Shopping Scams Telemarketing Fraud
  • 15. Scams in New Zealand • Increasing number of people being ripped off through simple scams in New Zealand • Complaints are being made almost daily • Scams would continue until public became more savvy about how the frauds work (Leask, 2013) • New Zealanders reported $4 million lost in scams last year, although the government estimates that scams could cost the country up to half a billion dollars every year. (Wannan, 2013)
  • 16. How to Detect Scams • it's addressed to 'My Dear' or something generic • there are many grammatical or spelling errors in the email • the email address is a public service domain like Gmail / Yahoo / Livemail • a bank that you don't have an account with contacts you • you are urged to visit a website to update your account information or fill in a form with personal information • you're advised to act fast to claim money or some other prize in a lottery or competition that you never entered • you inherit money or possessions from someone you've never heard of • you receive a request from a stranger who needs your help (usually to send money) • someone on a social networking site asks you to send them money so they can pay debts or so that they can visit you. (The Department of Internal Affairs, 2013)
  • 17. Example Consumer Scam Dear Alsemgeest , Please forgive my using this means to reach you but I can't think of any other way of letting you know of this urgent matter at hand. I am Barrister Davidson Paul Kingsley ,an Attorney at law and the Personal lawyer to(late)Engineer D. Alsemgeest , who dwelt and worked here for more than twenty years as a major contractor and businessman. On the 21st of june 2005, my client,his wife and their only daugther were involved in an automobile accident and It was unfortunate my client and his family all lost their lives and leaving some huge amount of money, Eight Million Five hundred thousand united state dollars ($8.5 )in a security finance firm. I shall detail you on the confirmation of your genuinty to work this out with me. use your personal email address and contact me directly through this my private email address davidson-atg@terra.com for more details. Thanks Davidson Paul Kingsley  (Esq) Email: davidson-atg@terra.com
  • 18. Scams Targeting the Elderly and Uneducated • Those who are the most susceptible to consumer fraud are the elderly and the uneducated. • Elderly are more susceptible to telemarketing fraud than any other type of fraud. (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012) • “old folk are being targeted by scammers” • “People in the senior age group might have more money to invest or be seeking online business opportunities” • Grey Power Wanganui President seniors would probably be too embarrassed to say they had been conned. (Karauria, 2013)
  • 19. Five Worst Scams in NZ • Dating and romance scams • Investment Scams • Upfront money scams • Online auction and trading scams • Online products, advertising and computer hacking (Ministry of Business Innovation and Employment’s Consumer Affairs Team, 2013)
  • 20. Recent NZ Consumer Fraud Examples
  • 21. Investment Scams • Any fraud which is related to stocks, bonds, commodities, limited partnerships, real estate, or other types of investments. (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012) • Perpetrators usually make fraudulent promises or mis-statements to induce people to make investments Example • Ponzi Scheme
  • 22. Investment Fraud – Red Flags • Unreasonably high or guaranteed rates of return • Investments that do not make sound business sense or lack detail • Pressure to make the investment early • A business with a history of scandals • Unaudited financial reports or adverse opinions • Luxurious lifestyles of principals • Investment success that is dependent on someone’s “unique expertise” • Inability to pull out or liquidate the investment (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
  • 23. Conclusion • Consumer fraud is any type of fraud that targets consumers as its victims. • Any offer that sounds too good to be true probably is. • Scams operate in a manner which aim to gain an individual’s confidence and then use that confidence to defraud the consumer. • Advances in technology have made consumer fraud much easier for perpetrators to commit.

Editor's Notes

  1. <object width="425" height="344"><param name="movie" value="http://swf.tubechop.com/tubechop.swf?vurl=lLAFhTjsQHw&start=30&end=249&cid=1484417"></param><embed src="http://swf.tubechop.com/tubechop.swf?vurl=lLAFhTjsQHw&start=30&end=249&cid=1484417" type="application/x-shockwave-flash" allowfullscreen="true" width="425" height="344"></embed></object> http://www.youtube.com/watch?v=lLAFhTjsQHw 0:30 – 4:09