To see the other types of publications on this topic, follow the link: Telephone fraud.

Journal articles on the topic 'Telephone fraud'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Telephone fraud.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sergeyev, A. Yu, and O. V. Shirokova. "Fraud in a digital society in the context of social change." Digital Sociology 6, no. 1 (2023): 59–71. http://dx.doi.org/10.26425/2658-347x-2023-6-1-59-71.

Full text
Abstract:
The article analyzes the problems of fraud in the modern digital society in the context of social changes caused by both the COVID-19 pandemic and the current geopolitical situation. The authors study in detail the types of financial fraud in this area. They pay special attention to the types of digital fraud: telephone fraud and IP-telephony, SMS fraud, phishing, sniffering (message interception), skimming (theft of card data), which are associated with the emergence of cryptocurrencies. The article presents the data of the authors’ sociological research conducted by the method of an online q
APA, Harvard, Vancouver, ISO, and other styles
2

Mikhaleva, U. A. "Application of mivar expert systems in the fight against telephone fraud." Herald of Dagestan State Technical University. Technical Sciences 51, no. 1 (2024): 166–72. http://dx.doi.org/10.21822/2073-6185-2024-51-1-166-172.

Full text
Abstract:
Objective. Currently, there is no comprehensive approach to solving the problems of telephone fraud. Despite the widespread awareness of citizens about telephone fraud through the media, the number of victims of this type of fraud is growing day by day. The purpose of the study is to substantiate the possibility of using mivar technologies as part of an expert system to combat telephone fraud.Method. This article uses the following methods: description, analysis, deduction.Result. The analysis of the use of mivar expert systems in various areas of life allowed us to conclude that their use in
APA, Harvard, Vancouver, ISO, and other styles
3

Zhan, Rong-Fang, Elias Mpofu, and Cheng Yin. "TELEPHONE FRAUD AGAINST OLDER ADULTS IN CHINA: EVIDENCE FROM THE CHINA HEALTH AND RETIREMENT LONGITUDINAL STUDY." Innovation in Aging 6, Supplement_1 (2022): 14. http://dx.doi.org/10.1093/geroni/igac059.049.

Full text
Abstract:
Abstract Background Falling victim to telephone fraud is a devastating crisis for older adults because they can lose their life savings, adversely affecting their well-being. This study aimed to identify risk factors associated with telephone fraud among Chinese older adults. Method: A case-control study was conducted using the fourth wave of the 2018 China Health and Retirement Longitudinal Study data on older adults 60 years and above (N = 445 with telephone fraud experience; 9,994 with no fraud and other fraud experience). Control variables for the logistic regression analysis included the
APA, Harvard, Vancouver, ISO, and other styles
4

Kuzmin, Yury A. "PREVENTION OF TELEPHONE FRAUD (CRIMINOLOGICAL ASPECT)." Oeconomia et Jus, no. 3 (September 30, 2022): 47–54. http://dx.doi.org/10.47026/2499-9636-2022-3-47-54.

Full text
Abstract:
The problems of committing fraud using telephone communication are updated. The relevance of issues related to the prevention of telephone fraud, first and foremost caller ID spoofing and phishing, is substantiated. The article analyzes the methods of preventing telephone fraud, such as the possibility of establishing the number of fraudsters through electronic search services, special free services, Viber and WhatsApp messengers, Sberbank Online, caller ID for incoming calls on "Avito" and "Yula", through applications for iPhone and Android, caller ID from "Kaspersky Lab" – Kaspersky Who Call
APA, Harvard, Vancouver, ISO, and other styles
5

Dyatlov, G. A. "Comparative Analysis of the Telephone Fraud Liability in the Criminal Law of Russia and Foreign Countries Based on the Dynamics of Damage Example." Legal Order and Legal Values 2, no. 3 (2024): 61–67. http://dx.doi.org/10.23947/2949-1843-2024-2-3-61-67.

Full text
Abstract:
Introduction. The telephone fraud is a serious problem faced both in Russia and abroad. With the development of digital technologies and Internet, the fraudsters find the new ways to deceive citizens by calling them on the phone, pretending to be the representatives of banks, law enforcement agencies or other official institutions. The dynamics of damage caused by such crimes is constantly growing, therefore, the efficient measures should be taken to prevent and suppress fraud. The aim of the article is to conduct a comparative analysis of the criminal law with respect to telephone fraud liabi
APA, Harvard, Vancouver, ISO, and other styles
6

Аnanchenkova, P. I., I. А. Turin, and K. K. Makarova. "Role of digital socialisation of the elderly in protecting against telephone fraud." Digital Sociology 7, no. 4 (2025): 22–32. https://doi.org/10.26425/2658-347x-2024-7-4-22-32.

Full text
Abstract:
The study is relevant for sociological theory and public practice, as it is devoted to the analysis of the role of digital socialisation of older people in protecting against telephone fraud. The purpose of the study is to characterise modern telephone fraud and identify the features of the role of digital socialisation of older people in effective protection against becoming a victim. Informational and empirical basis of the research: data of the Federal State Statistics Service “Distribution of the population who are active Internet users by type of settlement and gender and age groups”, 202
APA, Harvard, Vancouver, ISO, and other styles
7

Hassenjürgen, Christoph. "How to avoid telephone and internet fraud." Bankfachklasse 43, no. 1-2 (2021): 32–33. http://dx.doi.org/10.1007/s35139-020-0551-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Meyer, Helen. "Telephone fraud poses threat to UK business." Computers & Security 15, no. 8 (1996): 686–87. http://dx.doi.org/10.1016/s0167-4048(97)89707-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gomonova, O. A., and S. A. Ivanov. "Telephone fraud as a complex social problem." Sociology and Law 16, no. 1 (2024): 38–47. http://dx.doi.org/10.35854/2219-6242-2024-1-38-47.

Full text
Abstract:
The article studies telephone fraud as a new type of crime and an acute social problem. Attention is drawn to the complex nature of the problem, as it should be considered in the plane of different disciplines: general jurisprudence, criminology, social psychology, social engineering, information technology. The Bank of Russia estimates the scale of spread of this type of crime and the amount of stolen money. According to statistics, the majority of fraudulent schemes are based on social engineering techniques. The results of a sociological survey of the population conducted under the guidance
APA, Harvard, Vancouver, ISO, and other styles
10

RATNAKUMARI, Mrs J., SHAIK NAILO ASMIN THAHENATH, TOLUSURI SRI LAKSHMI, PERAVALI NAGA DILEEP KUMAR, and KADIYAM VEERAIAH. "DETECTION OF FRAUDULENT OR DECEPTIVE PHONE CALLS USING ARTIFICIAL INTELLIGENCE." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 15, no. 1 (2024): 96–99. http://dx.doi.org/10.61841/turcomat.v15i1.14546.

Full text
Abstract:
With an increase advancement of technology, fraud phone calls, including spam’s and malicious calls have become a major concern in telecommunication industry and causes millions of global financial losses every year. Fraudulent phone calls or scams and spams via telephone or mobile phone have become a common threat to individuals and organizations. Artificial Intelligence (AI) and Machine Learning (ML) has emerged as powerful tools in detecting and analyzing fraud or malicious calls. This project presents an overview of AI-based fraud or spam detection and analysis techniques, along with its c
APA, Harvard, Vancouver, ISO, and other styles
11

Экономюк, В. С. "Methods of fraud committed with the use of communications: a criminalistic aspect." Ius Publicum et Privatum, no. 5(15) (December 28, 2021): 114–17. http://dx.doi.org/10.46741/2713-2811-2021-5-114-117.

Full text
Abstract:
В статье раскрываются особенности совершения мошенничества с использованием мобильных средств связи, приводится статистика и выявляются причины роста числа преступлений данной категории. Анализируются способы совершения телефонных мошенничеств с описанием технологий их реализации The article reveals the features of committing fraud with the use of mobile communications, provides statistics and indicates the reasons for the increase in the number of crimes in this category. Methods of committing telephone frauds with a description of the technologies for their implementation are analyzed
APA, Harvard, Vancouver, ISO, and other styles
12

Pleshakova, Ekaterina Sergeevna, Sergei Timurovich Gataullin, Aleksei Viktorovich Osipov, and Pavel Gennadievich Bylevskii. "The factor of complex interaction in responding to telephone fraud." Вопросы безопасности, no. 1 (January 2023): 1–9. http://dx.doi.org/10.25136/2409-7543.2023.1.39274.

Full text
Abstract:
The subject of the study is to identify effective methods of legislative work to counteract the use by telephone fraudsters of such technical means as illegal substitution of SIM cards and Internet services for substitution of incoming call numbers. The general scientific methodology of dialectical (meaningful) logic and comparative analysis of practical problems and legislative activity of federal authorities are used. Fraud causes huge damage to society and incurs huge costs to the state. The global spread of the Internet has allowed scammers to export their activities to a fast-growing mark
APA, Harvard, Vancouver, ISO, and other styles
13

Pleshakova, Ekaterina Sergeevna, Sergei Timurovich Gataullin, Aleksei Viktorovich Osipov, Mikhail Viktorovich Koroteev, and Yuliya Vladislavovna Ushakova. "Recognition of Human Emotions by Voice in the Fight against Telephone Fraud." Национальная безопасность / nota bene, no. 5 (May 2022): 11–29. http://dx.doi.org/10.7256/2454-0668.2022.5.38782.

Full text
Abstract:
Advances in communication technologies have made communication between people more accessible. In the era of information technology, information exchange has become very simple and fast. However, personal and confidential information may be available on the Internet. For example, voice phishing is actively used by intruders. The harm from phishing is a serious problem all over the world, and its frequency is growing. Communication systems are vulnerable and can be easily hacked by attackers using social engineering attacks. These attacks are aimed at tricking people or businesses into performi
APA, Harvard, Vancouver, ISO, and other styles
14

Грязева, Надежда Викторовна, and Александр Петрович Некрасов. "ACTUAL METHODS OF COMMITTING FRAUD WITH USE OF MEANS OF CELLULAR COMMUNICATION WITHIN THE PENAL INSTITUTIONS." Vestnik Samarskogo iuridicheskogo instituta, no. 4(40) (December 14, 2020): 33–42. http://dx.doi.org/10.37523/sui.2020.40.4.005.

Full text
Abstract:
В статье изложен обзор актуальных способов совершения осужденными мошенничеств с использованием средств сотовой связи в учреждениях уголовно-исполнительной системы России. Исследованы и оценены практические материалы, в частности судебная практика по делам рассматриваемой категории, на предмет способа совершения осужденными мошенничеств с использованием средств сотовой связи в учреждениях уголовно-исполнительной системы России. Разработаны основания для классификации способов совершения мошенничеств с использованием средств сотовой связи, совершаемых осужденными в период отбывания наказания в
APA, Harvard, Vancouver, ISO, and other styles
15

Meshkova, Natalia V., V. T. Kudryavtsev, and Sergey N. Enikolopov. "TO THE PSYCHOLOGICAL PORTRAIT OF THE VICTIMS OF TELEPHONE FRAUD." Moscow University Psychology Bulletin, no. 1 (2022): 138–57. http://dx.doi.org/10.11621/vsp.2022.01.06.

Full text
Abstract:
Th e article presents the results of an empirical study of the relationship of psychological characteristics (traits of the Big Five, values, cognitive styles) with behavior when contacting telephone scammers pretending to be bank employees. Th e relevance of the study is associated with an increase in the number of victims of telephone fraud, especially among the elderly, and the need to clarify psychological characteristics that allow to resist manipulative infl uence. Th e aim of the work was to identify the psychological characteristics of people at risk of telephone fraud and prone to man
APA, Harvard, Vancouver, ISO, and other styles
16

Steuernagel, Robert. "Prevent [Cellular Telephone] Roaming Fraud Using the Rvr Solution." EDPACS 25, no. 8 (1998): 15–16. http://dx.doi.org/10.1201/1079/43236.25.8.19980201/30192.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

McCormack, Michael. "Combatting the spread of calling-card and telephone fraud." Computer Fraud & Security Bulletin 1995, no. 11 (1995): 19. http://dx.doi.org/10.1016/0142-0496(95)80078-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Iacobucci, G. "Police advise GPs to take steps against telephone fraud." BMJ 349, jul10 3 (2014): g4537. http://dx.doi.org/10.1136/bmj.g4537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Bashir, Abdul, Azwardi Azwardi, Bambang Bemby Soebyakto, et al. "Raising Awareness and Knowledge of Rural Communities against Lottery Fraud and Illegal Online Loans through Telephone and Short Message Services." Sricommerce: Journal of Sriwijaya Community Services 3, no. 2 (2022): 89–96. http://dx.doi.org/10.29259/jscs.v3i2.83.

Full text
Abstract:
The Covid-19 pandemic has had a major socio-economic impact on the community, especially the decline in income and job losses. The urgency of economic needs makes people make online loans that are illegal and have very high interest rates. The lack of public knowledge about licensed and illegal online loans has resulted in debtors being trapped in large debts and spreading personal data. Considering that rural communities who have low levels of education and knowledge are victims of prize draw scams which are disseminated via short message service (SMS) and telephone calls. Therefore, there is
APA, Harvard, Vancouver, ISO, and other styles
20

Woo Park, Hyung, Jong Bae Kim, and Myung Jin Bae. "Prevention of Voice Phishing through Analysis of Telephone Call Voice Characteristic." International Journal of Engineering & Technology 7, no. 3.33 (2018): 62. http://dx.doi.org/10.14419/ijet.v7i3.33.18525.

Full text
Abstract:
Using a phone call to morale of others seeking money as voice phishing. When receiving these fraudulent calls are easily embarrassed, and if they get embarrassed, become more easily be cheated. These voice phishing techniques are evolving to be more intelligent and more diverse. Accordingly, the amount of damage and the victim reality is increasing. The phone call, only the minimum data necessary to transfer the information contained is passed to the other party through the wired or wireless communication networks. In the voice of phone call, It is because the communication system mainly conve
APA, Harvard, Vancouver, ISO, and other styles
21

M. Khris Aditya Fajari, Erniwati, and Bitoh Purnomo. "Tinjauan Hukum Positif dan Hukum Islam terhadap Orang Yang Menyamar sebagai TNI Gadungan dengan Motif Penipuan." Indonesian Journal of Multidisciplinary Sciences (IJoMS) 3, no. 2 (2024): 158–77. https://doi.org/10.59066/ijoms.v3i2.986.

Full text
Abstract:
With the advancement of technology, there are more and more frauds using technology, such as fraud using SMS, telephone and even internet fraud. There are many ways in which fraudsters can carry out their actions. The type of research used in this research uses library research. The results of this research, according to positive law, are explained in article 378 of the Criminal Code, imposing a sentence on the defendant with imprisonment for 3 (three) years and 6 (six) months. According to Islamic law, fraud is subject to Ta'zir punishment, namely in the form of legal bond and exile, legal di
APA, Harvard, Vancouver, ISO, and other styles
22

Pahrudin, Pajar. "Cybercrime in the Context of Cellular Telephone Scams." Jurnal Penelitian Pos dan Informatika 10, no. 1 (2020): 73. http://dx.doi.org/10.17933/jppi.2020.100106.

Full text
Abstract:
<p><em>Technological advancement comes with both positive and negative impacts to the society, including the cybercrime. The main problems discussed in this study is regulation of criminal acts of scams committed through electronic media, particularly SMS, as well as the efforts to handle such crime in accordance with applicable legal provisions, both based on the Criminal Code and based on Law Number 11 of 2008 on Electronic Information and Transactions that has been amended by Law no. 19 of 2016. This study applies the Normative Legal Research method. The results showed that the
APA, Harvard, Vancouver, ISO, and other styles
23

Pahrudin, Pajar. "Cybercrime in the Context of Cellular Telephone Scams." Jurnal Penelitian Pos dan Informatika 10, no. 1 (2020): 73–85. http://dx.doi.org/10.17933/jppi.v10i1.276.

Full text
Abstract:
Technological advancement comes with both positive and negative impacts to the society, including the cybercrime. The main problems discussed in this study is regulation of criminal acts of scams committed through electronic media, particularly SMS, as well as the efforts to handle such crime in accordance with applicable legal provisions, both based on the Criminal Code and based on Law Number 11 of 2008 on Electronic Information and Transactions that has been amended by Law no. 19 of 2016. This study applies the Normative Legal Research method. The results showed that the criminal act of sca
APA, Harvard, Vancouver, ISO, and other styles
24

Filimonov, Andrey, Aleksey Osipov, Ekaterina Pleshakova, and Sergey Gataullin. "NEURAL NETWORK METHODS FOR RECOGNIZING SPEECH EMOTIONS TO COUNTER FRAUD IN TELECOMMUNICATION SYSTEMS." Voprosy kiberbezopasnosti, no. 6(52) (2022): 83–92. http://dx.doi.org/10.21681/2311-3456-2022-6-83-92.

Full text
Abstract:
The purpose of the article is to develop a method for detecting fraud in telecommunication systems based on the analysis of the content of a telephone conversation, based on the use of neural network methods for recognizing speech emotions. Research methods: analysis of the frequency characteristics of text representations of conversations with scammers and the dynamics of their change, analysis of the occurrence of keywords. Result: a new approach to detecting fraud in telecommunications systems based on the analysis of the emotional and semantic components of dialogues with fraudsters using
APA, Harvard, Vancouver, ISO, and other styles
25

BHARGAVI, Dr K., and B. MITHILA SHIVANI. "DETECTION OF FRAUDULENT PHONE CALLS DETECTION IN MOBILE APPLICATIONS." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 15, no. 2 (2024): 1–5. http://dx.doi.org/10.61841/turcomat.v15i2.14644.

Full text
Abstract:
The primary challenge faced over the course of this decade-long endeavour is the difficulty in devising effective features without direct access to telephony network infrastructure. we conducted an extensive three-month measurement study using these call logs, which encompassed a staggering 9 billion records. Based on the insights gleaned from this study, we identified and designed 29 features that could be used by machine learning algorithms to predict malicious calls. Fraudulent phone calls or scams and spam s via telephone or mobile phone have become a common threat to individuals and organ
APA, Harvard, Vancouver, ISO, and other styles
26

Titus, Richard M., Fred Heinzelmann, and John M. Boyle. "Victimization of Persons by Fraud." Crime & Delinquency 41, no. 1 (1995): 54–72. http://dx.doi.org/10.1177/0011128795041001004.

Full text
Abstract:
This research focuses on the victimization of persons by personal fraud, which we define as involving the deliberate intent to deceive with promises of goods, services, or other financial benefits that in fact do not exist or that were never intended to be provided. The article presents data based on a national telephone survey involving a representative probability sample of 1,246 respondents aged 18 and older. The survey measured the incidence and prevalence of personal fraud victimization, the characteristics of the victims involved, and the impacts and effects of these offenses. The reacti
APA, Harvard, Vancouver, ISO, and other styles
27

Wang, Xingrui. "Reflection on Prevention and Control of Telecommunication Network Fraud in Big Data Era." Journal of Networking and Telecommunications 2, no. 2 (2020): 42. http://dx.doi.org/10.18282/jnt.v2i2.1103.

Full text
Abstract:
<p>With the rapid development of smart phones and communication technology, the frequency of communication between the public and society through telecommunication equipment is increasing. At the same time, some lawless elements often cheat the public through telecommunication equipment, which brings irreparable economic losses to the society and the masses to a certain extent. In view of the above problems, this article takes the source of telecommunication fraud as the breakthrough point, analyzes the existing telecommunication fraud processing technology and points out its shortcoming
APA, Harvard, Vancouver, ISO, and other styles
28

Cross, Cassandra. "‘They’re Very Lonely’: Understanding the Fraud Victimisation of Seniors." International Journal for Crime, Justice and Social Democracy 5, no. 4 (2016): 60–75. http://dx.doi.org/10.5204/ijcjsd.v5i4.268.

Full text
Abstract:
There are many theories which seek to explain fraud victimisation. In particular, older victims find themselves at the intersection of various discourses which account for victimisation, primarily from a deficit model. This article examines two discourses relevant to older fraud victims. The first positions older victims of crime as weak and vulnerable and the second positions fraud victims generally as greedy and gullible. Using interviews with twenty-one Canadian volunteers who provide telephone support to older fraud victims (all seniors themselves), this article analyses the extent to whic
APA, Harvard, Vancouver, ISO, and other styles
29

Fan, Hongya, and Yanduo Dou. "A Pragmatic Study on the Identity Construction of Deceptive Telecom Discourse." Theory and Practice in Language Studies 14, no. 5 (2024): 1450–57. http://dx.doi.org/10.17507/tpls.1405.17.

Full text
Abstract:
Taking identified fraud telephone recordings as the corpus, the study first analyses the lexicon and overall structure of fraud discourse from the perspective of pragmatics and then explores the identities constructed by fraudsters. It found that, in deceptive telecom discourse, address forms and technical terms are used to construct the turn, and the fraud conversation has a relatively complete structure, including a beginning, problem construction, problem solving, and a closing. In addition, the lexical choice and the overall structure of deceptive conversation help to construct the fraudst
APA, Harvard, Vancouver, ISO, and other styles
30

Nikitin, Petr Vladimirovich, Aleksei Viktorovich Osipov, Ekaterina Sergeevna Pleshakova, Sergei Alekseevich Korchagin, Rimma Ivanovna Gorokhova, and Sergei Timurovich Gataullin. "Emotion Recognition by Audio Signals as one of the Ways to Combat Phone Fraud." Программные системы и вычислительные методы, no. 3 (March 2022): 1–13. http://dx.doi.org/10.7256/2454-0714.2022.3.38674.

Full text
Abstract:
The relevance of the study is dictated by the current state in the field of telephone fraud. According to research conducted by Kaspersky Lab, the share of users who encountered various unwanted spam calls in the spring of 2022 was at the level of 71%. The subject of the research is machine learning and deep learning technologies for determining emotions by the timbre of the voice. The authors consider in detail such aspects as: the creation of a marked-up dataset; the conversion of WAV audio format into a numerical form convenient for fast processing; machine learning methods for solving the
APA, Harvard, Vancouver, ISO, and other styles
31

Xu, Jinxin, Han Wang, Yuqiang Zhong, Lichen Qin, and Qishuo Cheng. "Predict and Optimize Financial Services Risk Using AI-driven Technology." Academic Journal of Science and Technology 10, no. 1 (2024): 299–304. http://dx.doi.org/10.54097/6zrqef25.

Full text
Abstract:
With the rapid development of internet technology, many industries have embarked on a digital transformation. However, while the Internet has brought convenience to users, it has also become a breeding ground for criminals to commit fraud. On the one hand, a large number of users on the Internet more or less left data, criminals can use this information to practice accurate fraud users, improve the success rate of fraud; On the other hand, online financial transactions such as banking and e-commerce also provide more opportunities for criminals to commit fraud. Therefore, all kinds of fraud me
APA, Harvard, Vancouver, ISO, and other styles
32

DADAEVA, T. M., and S. A. BURKOVA. "DIGITAL FRAUD: WHAT STUDENTS KNOW ABOUT IT (EXPERIENCE IN CONDUCTING A FOCUS GROUP INTERVIEW)." Sociopolitical Sciences 14, no. 2 (2024): 131–40. http://dx.doi.org/10.33693/2223-0092-2024-14-2-131-140.

Full text
Abstract:
The article, based on statistical data and sociological research from a focus group interview conducted among students, updates the problem of cyber fraud. The dynamics of stolen funds of Russians over five years, the level of awareness of students about cyber fraud, the types and forms of fraud schemes that informants have encountered are shown. The most common forms of fraud are deception associated with the transfer of money for a purchase/service on the Internet with or without priority links, phishing sites and hacking of a page (account), with the subsequent demand for money for its retu
APA, Harvard, Vancouver, ISO, and other styles
33

Duha, Novanema. "Short Message Services (SMS) Fraud Against Mobile Telephone Provider Consumer Review From Law Number 8 Of 1999 Concerning Consumer Protection." Journal of Law Science 3, no. 1 (2021): 36–43. http://dx.doi.org/10.35335/jls.v3i1.1654.

Full text
Abstract:
Technological advances, especially in the telecommunications sector, are growing very rapidly. One of the communication products/tools created is a cellular phone/mobile phone. The development of this technology does not rule out the possibility of fraudulent short message service (SMS) via cellular phones against consumers. The presence of Law Number 8 of 1999 concerning Consumer Protection as a form of protecting consumers against fraud via SMS. The problems raised in writing this thesis are how to protect the rights of consumers of cellular phone providers, then how to protect personal info
APA, Harvard, Vancouver, ISO, and other styles
34

Sabyrbayeva, Ainura. "TACTICAL FEATURES OF THE INTERROGATION OF PERSONS SUSPECTED OF COMMITTING CYBERFRAUD (USING THE EXAMPLE OF PHISHING)." Review of Law Sciences 6, no. 3 (2022): 76–85. http://dx.doi.org/10.51788/tsul.rols.2022.6.3./gjwj7576.

Full text
Abstract:
The article discusses the tactical features of the interrogation of suspects in the commission of cyber fraud, and also developed an approximate list of questions that should be asked to suspects in phishing attacks. The article describes the types of phishing attacks as well as the most dangerous ways to commit them. One of the types of cyber fraud using the Oson Credit application is described, which is aimed at capturing confidential user data, such as bank card data, gaining access to accounts in social messengers, video, photo files and documents located on a telephone device to which the
APA, Harvard, Vancouver, ISO, and other styles
35

Dr. V. Radha, J. Deepa Anbarasi,. "TFD: TELECOM FRAUD DETECTION USING CONSOLIDATED WEIGHTED REPUTATION ALGORITHM." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 2 (2021): 168–74. http://dx.doi.org/10.17762/itii.v9i2.325.

Full text
Abstract:
Noisy phone calls are aggravating and distracting, as well as frustrating. They may be classed as 'nuisance', 'emergency', 'random', and 'unsolicited' calls. Users have no inherent privileges on the internet; rather, their personalities are produced without any arrangement or evidence of involvement. It costs the U.S. communications company $8 billion per year to avoid call spam on the phone grid. Between January 2014 and June 2018, the FTC (Federal Trade Commission) received over 22 million reports of fraudulent and illegal telemarketing calls. Nowadays, the mobile network is used to issue au
APA, Harvard, Vancouver, ISO, and other styles
36

Pleshakova, Ekaterina Sergeevna, Sergei Timurovich Gataullin, Aleksei Viktorovich Osipov, Ekaterina Vladimirovna Romanova, and Anna Sergeevna Marun'ko. "Application of Thematic Modeling Methods in Text Topic Recognition Tasks to Detect Telephone Fraud." Программные системы и вычислительные методы, no. 3 (March 2022): 14–27. http://dx.doi.org/10.7256/2454-0714.2022.3.38770.

Full text
Abstract:
The Internet has emerged as a powerful infrastructure for worldwide communication and human interaction. Some unethical use of this technology spam, phishing, trolls, cyberbullying, viruses caused problems in the development of mechanisms that guarantee affordable and safe opportunities for its use. Currently, many studies are being conducted to detect spam and phishing. The detection of telephone fraud has become critically important, as it entails huge losses. Machine learning and natural language processing algorithms are used to analyze a huge amount of text data. Fraudsters are identified
APA, Harvard, Vancouver, ISO, and other styles
37

王, 学萌. "A Conversation Analysis Study on the Dynamic Construction of Institutional Identity as a Resource for Fraud—Taking Telephone Fraud as an Example." Modern Linguistics 12, no. 04 (2024): 273–79. http://dx.doi.org/10.12677/ml.2024.124246.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Widodo, Dwi Yulian, Fathur Rachman, and Ino Susanti. "Penerapan Alat Bukti Dalam Sistem Pembuktian Tindak Pidana Penipuan." Viva Themis: Jurnal Ilmu Hukum 1, no. 1 (2020): 98–108. http://dx.doi.org/10.24967/vt.v1i2.699.

Full text
Abstract:
Many people take advantage of the situation by misusing the means of cellular technology communication, one of which is a crime that is a fraud that often occurs today is fraud by using sophisticated technology tools such as cellular phones by utilizing Short Message Service services. The problem that will be discussed is how is the application of evidence in the system of proof of fraud and whether the supporting factors and inhibiting factors in the application of evidence in the system of evidence of criminal acts of fraud.This legal research method uses a type of normative descriptive lega
APA, Harvard, Vancouver, ISO, and other styles
39

Starostenko, Oleg A. "New Methods and Classification of Fraudulent Actions during the COVID-19 Pandemic." Legal education and science 2 (February 18, 2021): 36–39. http://dx.doi.org/10.18572/1813-1190-2021-2-36-39.

Full text
Abstract:
Purpose. Consideration of the method of committing crimes as a key element of the characteristics of crimes committed using information and telecommunication technologies during the period of current restrictions in Russia COVID-19; empirical analysis of the views of criminologists on the way of committing fraud; classification of methods of computer fraud during a pandemic. Methodology: when writing the article, the author used the methods of empirical (observation of the sanitary and epidemiological situation in the country and the state of crime) and theoretical research, through observatio
APA, Harvard, Vancouver, ISO, and other styles
40

Tretyakov, Vladimir, and Svetlana Golyatina. "Applying Big Data technologies to counter cyber fraud." Revista Amazonia Investiga 11, no. 49 (2022): 9–16. http://dx.doi.org/10.34069/ai/2022.49.01.1.

Full text
Abstract:
By January 2021, the number of Internet users amounted to 4.7 billion, while the social media audience hit the 4.2 billion mark. Two-thirds of the world’s population use mobile phones daily. The average Internet user spends 42% of his time in the global network. These figures prove convincingly that the Internet has become an integral part of human life. However, man’s using the Internet involves increasingly the risk of cybercrime perpetrated against the user. The purpose of the research is to assess the potential of Big Data technologies to combat cyber fraud as a form of cybercrime. The stu
APA, Harvard, Vancouver, ISO, and other styles
41

Asieieva, Yuliia, Irina Orlenko, Evgenij Borinshteyn, Zoia Atamaniuk, and Yuliya Dobrolyubska. "Intuition as a philosophical reflection at the time of COVID-19 pandemic." Revista Amazonia Investiga 11, no. 49 (2022): 108–16. http://dx.doi.org/10.34069/ai/2022.49.01.12.

Full text
Abstract:
By January 2021, the number of Internet users amounted to 4.7 billion, while the social media audience hit the 4.2 billion mark. Two-thirds of the world’s population use mobile phones daily. The average Internet user spends 42% of his time in the global network. These figures prove convincingly that the Internet has become an integral part of human life. However, man’s using the Internet involves increasingly the risk of cybercrime perpetrated against the user. The purpose of the research is to assess the potential of Big Data technologies to combat cyber fraud as a form of cybercrime. The stu
APA, Harvard, Vancouver, ISO, and other styles
42

Deliema, Marguerite, Doug Shadel, and Karla Pak. "Profiling Victims of Investment Fraud: Mindsets and Risky Behaviors." Journal of Consumer Research 46, no. 5 (2019): 904–14. http://dx.doi.org/10.1093/jcr/ucz020.

Full text
Abstract:
Abstract Millions of Americans are targeted by investment scams, resulting in billions of dollars lost each year. Previous research indicates that investment fraud victims are more likely to be male, white, and married, and to have higher socioeconomic status compared to the general US population, but little research examines what behaviors and mindsets differentiate them from other investors. A telephone survey was administered to 214 investment fraud victims and 813 general investors recruited using random digit dialing. Based on the opportunity model of predatory victimization, the aim was
APA, Harvard, Vancouver, ISO, and other styles
43

Marselyna, Alifia Risma, Indrawati Indrawati, and Nahdiya Sabrina. "Bentuk Penanggulangan dan Pencegahan terhadap Tindak Pidana Penipuan Lowongan Kerja Online." Bhirawa Law Journal 1, no. 1 (2020): 1–8. http://dx.doi.org/10.26905/blj.v1i1.5276.

Full text
Abstract:
Currently, there are many crimes that take advantage of the sophistication of internet developments, such as crimes that are committed online or commonly called Cyber Crime. This is based on the argument that Cyber Crime is an activity that uses computers as a medium that is supported by a communication system, whether it’s a Dial Up System, using a telephone line, or a wireless system that uses a special wireless antenna. One form of crime related to the misuse of information technology facilities is a crime or criminal act of online job vacancies as regulated in Article 378 Book II of the Cr
APA, Harvard, Vancouver, ISO, and other styles
44

Saputra EA, Ari Dwi. "Penegakkan Hukum Terhadap Tindak Pidana Penipuan Arisan Online di Indonesia." AL-BAHTS: Jurnal Ilmu Sosial, Politik, dah Hukum 2, no. 1 (2024): 44–52. http://dx.doi.org/10.32520/albahts.v2i1.3079.

Full text
Abstract:
Information technology basically has benefits for society, but the development of information technology does not escape criminal acts or cybercrime or what is known as cybercrime. In writing this journal, the author uses the library research method by using literature in the form of books, newspapers, records of investigation reports and also previous research. And the formulation of the problem is (1) what is meant by online arisan, (2) criminal sanctions obtained on the perpetrators of online arisan fraud, (3) factors causing online arisan fraud in Indonesia, (4) efforts of the government a
APA, Harvard, Vancouver, ISO, and other styles
45

Jales, Anna Luísa de Souza, and Lidiany Mendes Campos. "CRIMES CIBERNÉTICOS E O AVANÇO DO CRIME DE ESTELIONATO NO CIBERESPAÇO E AS PERSPECTIVAS NA LEGISLAÇÃO E INVESTIGAÇÃO CRIMINAL." Revista ft 29, no. 147 (2025): 40–41. https://doi.org/10.69849/revistaft/dt10202506121440.

Full text
Abstract:
ABSTRACT The legislation regarding Virtual Stealth had its amendment, where the penalty is imprisonment and a fine, if the fraud is committed with the use of information provided by the victim or by a third party induced by error through social networks, telephone contacts or mailing fraudulent electronic means, or by any other similar fraudulent means. To try to curb this type of practice, Law nº 14.155, of 2021, amended the Penal Code, creating the figure of Electronic Fraud, § 2º-A, § 2º-B and § 3º of article 171, also known as Digital Fraud, which it is a qualified form of the crime of emb
APA, Harvard, Vancouver, ISO, and other styles
46

Pomykalova, Irina. "“Telephone Fraud” (Article 159 of the Russian Criminal Code) and Provocation of Bribery as a New Threat to the Security of the Russian State." Journal of Foreign Legislation and Comparative Law 19, no. 4 (2023): 35. http://dx.doi.org/10.61205/jzsp.2023.048.

Full text
Abstract:
The authors note the similarity of modern Russian crime with the criminal situation in the Western countries in the 1960s—1970s. However, in recent years, the growing confrontation between our country and the collective West has been increasingly affecting the state of crime in Russia. Expert assessments and statistics allow us to conclude that at the moment the state has failed to provide effective counteraction to a number of new forms of criminal activity, including the so-called telephone fraud, the main victims of which are elderly citizens with real estate and relatively large pensions.
APA, Harvard, Vancouver, ISO, and other styles
47

MIRNYI, D. S. "USE OF SIM-BOX TYPE EQUIPMENT: CRIMINAL-LEGAL ASPECT." Lobbying in the Legislative Process 3, no. 4 (2024): 84–88. https://doi.org/10.33693/2782-7372-2024-3-4-84-88.

Full text
Abstract:
The purpose of the research. The present article deals with the issue of criminal-legal assessment of the activity on the use of separate means of communication - equipment of SIM-box type (SIM-bank). Currently, the use of such equipment is widespread in the realization of the objective side of various crimes, including the so-called “telephone fraud”, as well as knowingly false reports of an act of terrorism. The use of SIM-box type equipment not only allows to “automate” the implementation of the objective side of the crime, through the parallel execution of mass calls, but also makes it dif
APA, Harvard, Vancouver, ISO, and other styles
48

Галина Суреновна, Чикаева, Власова Виктория Николаевна, and Ковров Владимир Викентьевич. "DEVIANT BEHAVIOR OF YOUNG PEOPLE: SOCIAL FACTORS, ITS DETERMINANTS." STATE AND MUNICIPAL MANAGEMENT SCHOLAR NOTES 1, no. 1 (2022): 263–68. http://dx.doi.org/10.22394/2079-1690-2022-1-1-263-268.

Full text
Abstract:
The changes that are taking place in modern social reality make the process of socialization of Russian youth more difficult, which in turn forces young people to find ways of social behavior that are optimal for themselves. Very often, such behavior becomes deviant from the norms existing in society - deviant. The authors of the article draw attention to the fact that the uncertainty of social reality, in addition to traditional deviations, encourages new types of deviations, for example, cyberbullying, virtual fraud, computer, telephone addiction. According to the authors of the work, the em
APA, Harvard, Vancouver, ISO, and other styles
49

Oyeyemi, Dare Azeez, and Adebola K. Ojo. "SMS Spam Detection and Classification to Combat Abuse in Telephone Networks Using Natural Language Processing." Journal of Advances in Mathematics and Computer Science 38, no. 10 (2023): 144–56. http://dx.doi.org/10.9734/jamcs/2023/v38i101832.

Full text
Abstract:
In the modern era, mobile phones have become ubiquitous, and Short Message Service (SMS) has grown to become a multi-million-dollar service due to the widespread adoption of mobile devices and the millions of people who use SMS daily. However, SMS spam has also become a pervasive problem that endangers users' privacy and security through phishing and fraud. Despite numerous spam filtering techniques, there is still a need for a more effective solution to address this problem [1]. This research addresses the pervasive issue of SMS spam, which poses threats to users' privacy and security. Despit
APA, Harvard, Vancouver, ISO, and other styles
50

Romious, Tamar S., Randall Thompson, and Elizabeth Thompson. "Ethics Training and Workplace Ethical Decisions of MBA Professionals." Journal of Education and Learning 5, no. 1 (2016): 190. http://dx.doi.org/10.5539/jel.v5n1p190.

Full text
Abstract:
<p>We recruited 15 MBA professionals in the St. Louis, Missouri metropolitan area to explore experiences and perceptions of classroom ethics training and ethical experiences in the workplace. Telephone interviews were conducted using open-ended questions to collect data that were uploaded to NVivo 10 for qualitative analysis. As a result of the data analysis, seven themes were recognized: (a) effective decision-making; (b) combining classroom instruction with real-world experience; (c) reasoning through an ethical issue; (d) resolution of workplace ethical issues; (e) feelings about ethi
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!