SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Ideas4Sale!

Masterminds:
Anna Mae Dela Cruz
Emmanuel Junio
Martin Revilla
Ed Vargas
Background

Crime

Yield

• Illegal disbursement or
dissemination of
business/corporate private
or confidential information
through MBA programs

• Pilfered Ideas
• Cheaper and easier means
to gain access to
competitor POC
• Provides vantage point to
competitor aspirants
Modus Operandi
Mechanics

Tools and Technologies

• Criminals and accessories to the crime use
MBA networks as means on collecting
internal private or confidential
information
• Perpetrators collect papers, reports,
assignments from MBA programs
• Often these papers or reports contain
confidential or private information that
should not be released to the public (but
students don't bother to get NDA thinking
that this is only for classroom activity)
• Perpetrators build a network of contacts
and use or sell the information
underground

• Internet (as headquarters and channel for
the activity)
• Email (public/free)
• Websites (underground/public/free)
• MBA classroom or online programs
• Term Papers, Assignments, etc
• Database of information
Appendix (other nominated crimes)
Centavo Heist

Big Value Zero

Description
• Cashiers, due to lack of pennies, etc, does
not give the exact change; when
transactions are amassed, the heist turns
into thousands or millions in amount

Description
• Employee pads a blank OR, or adds digits
to the OR amount and reimburses the
bogus amount to the company

Modus Operandi
• Companies encourage cashiers not to give
exact change by not providing sufficient
centavo coins
• Buyers forgo obtaining the exact change,
and the transactions get done
• Companies earn from the accumulated
centavo coins
• In financial reports, the heist is not
reflected, and taxes are not paid

Modus Operandi
• The crime is done in cahoots with teller or
cashiers, or the like
• This crime is effective with maximum
benefit and lower risks when done in small
amounts, and in multi-transactions that
unsuspecting employers hardly notice

Contenu connexe

Similaire à SPENTREP - New Crime by Group 4 (2013.Sep.9)

Valuing the data asset
Valuing the data assetValuing the data asset
Valuing the data asset
Bala Iyer
 
my km journey v9
my km journey v9my km journey v9
my km journey v9
Lyn Murnane
 

Similaire à SPENTREP - New Crime by Group 4 (2013.Sep.9) (20)

[AIIM16] How Regulatory Data Can Set the Narrative for an Analytics Opportunity
[AIIM16] How Regulatory Data Can Set the Narrative for an Analytics Opportunity[AIIM16] How Regulatory Data Can Set the Narrative for an Analytics Opportunity
[AIIM16] How Regulatory Data Can Set the Narrative for an Analytics Opportunity
 
London School of Hygiene - Maximising self-service success and user engagement
London School of Hygiene - Maximising self-service success and user engagementLondon School of Hygiene - Maximising self-service success and user engagement
London School of Hygiene - Maximising self-service success and user engagement
 
Enhancing the Prospect, Student and Alumni Experience with Communities
Enhancing the Prospect, Student and Alumni Experience with CommunitiesEnhancing the Prospect, Student and Alumni Experience with Communities
Enhancing the Prospect, Student and Alumni Experience with Communities
 
Enhancing the Prospect, Student and Alumni Experience with Communities
Enhancing the Prospect, Student and Alumni Experience with CommunitiesEnhancing the Prospect, Student and Alumni Experience with Communities
Enhancing the Prospect, Student and Alumni Experience with Communities
 
7 summits student lifecycle communities salesforce.org
7 summits student lifecycle communities   salesforce.org7 summits student lifecycle communities   salesforce.org
7 summits student lifecycle communities salesforce.org
 
Simple and Cost Effective Electronic Tools for Research with Youth
Simple and Cost Effective Electronic Tools for Research with YouthSimple and Cost Effective Electronic Tools for Research with Youth
Simple and Cost Effective Electronic Tools for Research with Youth
 
Online LSNTAP / PBN 2014 Webinar
Online LSNTAP / PBN 2014 WebinarOnline LSNTAP / PBN 2014 Webinar
Online LSNTAP / PBN 2014 Webinar
 
CIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento totalCIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento total
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptx
 
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
 
Valuing the data asset
Valuing the data assetValuing the data asset
Valuing the data asset
 
Your AI and ML Projects Are Failing – Key Steps to Get Them Back on Track
Your AI and ML Projects Are Failing – Key Steps to Get Them Back on TrackYour AI and ML Projects Are Failing – Key Steps to Get Them Back on Track
Your AI and ML Projects Are Failing – Key Steps to Get Them Back on Track
 
What value and benefits do we add? Why information professionals are essentia...
What value and benefits do we add? Why information professionals are essentia...What value and benefits do we add? Why information professionals are essentia...
What value and benefits do we add? Why information professionals are essentia...
 
my km journey v9
my km journey v9my km journey v9
my km journey v9
 
FINAL PowerPoint internship project presentation .ppt
FINAL PowerPoint internship project presentation .pptFINAL PowerPoint internship project presentation .ppt
FINAL PowerPoint internship project presentation .ppt
 
circle columbia
circle columbiacircle columbia
circle columbia
 
ZoomPowee 2019: INSZoom Product Roadmap 2020 Secrets Revealed
ZoomPowee 2019: INSZoom Product Roadmap 2020 Secrets RevealedZoomPowee 2019: INSZoom Product Roadmap 2020 Secrets Revealed
ZoomPowee 2019: INSZoom Product Roadmap 2020 Secrets Revealed
 
Webinar Next Week: Beyond Online Intake: Looking at Triage and Expert Systems
Webinar Next Week:  Beyond Online Intake: Looking at Triage and Expert SystemsWebinar Next Week:  Beyond Online Intake: Looking at Triage and Expert Systems
Webinar Next Week: Beyond Online Intake: Looking at Triage and Expert Systems
 
How to Master your Marketing Data - Cody Crumrine, Data Aptitude
How to Master your Marketing Data - Cody Crumrine, Data AptitudeHow to Master your Marketing Data - Cody Crumrine, Data Aptitude
How to Master your Marketing Data - Cody Crumrine, Data Aptitude
 
Career in Data Using Tableau
Career in Data Using TableauCareer in Data Using Tableau
Career in Data Using Tableau
 

SPENTREP - New Crime by Group 4 (2013.Sep.9)

  • 1. Ideas4Sale! Masterminds: Anna Mae Dela Cruz Emmanuel Junio Martin Revilla Ed Vargas
  • 2. Background Crime Yield • Illegal disbursement or dissemination of business/corporate private or confidential information through MBA programs • Pilfered Ideas • Cheaper and easier means to gain access to competitor POC • Provides vantage point to competitor aspirants
  • 3. Modus Operandi Mechanics Tools and Technologies • Criminals and accessories to the crime use MBA networks as means on collecting internal private or confidential information • Perpetrators collect papers, reports, assignments from MBA programs • Often these papers or reports contain confidential or private information that should not be released to the public (but students don't bother to get NDA thinking that this is only for classroom activity) • Perpetrators build a network of contacts and use or sell the information underground • Internet (as headquarters and channel for the activity) • Email (public/free) • Websites (underground/public/free) • MBA classroom or online programs • Term Papers, Assignments, etc • Database of information
  • 4. Appendix (other nominated crimes) Centavo Heist Big Value Zero Description • Cashiers, due to lack of pennies, etc, does not give the exact change; when transactions are amassed, the heist turns into thousands or millions in amount Description • Employee pads a blank OR, or adds digits to the OR amount and reimburses the bogus amount to the company Modus Operandi • Companies encourage cashiers not to give exact change by not providing sufficient centavo coins • Buyers forgo obtaining the exact change, and the transactions get done • Companies earn from the accumulated centavo coins • In financial reports, the heist is not reflected, and taxes are not paid Modus Operandi • The crime is done in cahoots with teller or cashiers, or the like • This crime is effective with maximum benefit and lower risks when done in small amounts, and in multi-transactions that unsuspecting employers hardly notice