Types of Cyber Crimes. The following situations are similar, but each represents a variation of a particular crime. Identify the crime and point out the differences in the variations. (a) Chen, posing fraudulently as Diamond Credit Card Co., sends an e-mail to Emily, stating that the company has observed suspicious activity in her account and has frozen the account. The e-mail asks her to reregister her credit-card number and password to reopen the account. Chen's action is cyber theft. In this situation, it would be phishing, which is a district form of identity theft. Chen is the perpetrator to find out about Emily’s financial data and passwords by posing as Diamond Credit Card Co. The suspicious activity in her account and the frozen of her account are part of the schemes for the perpetrator to seek information from Emily. He included this information to frighten Emily, so she will immediately respond with information and her account wouldn’t be frozen. When Chen has her information, he is going to act like her to drain her credit account. (b) Claiming falsely to be Big BUy Retail Finance Co., Conner sends an email to Dino, asking him to confirm or update his personal security information to prevent his Big Buy account from being discontinued. (C) Felicia posts her resume on GotWork.com, an online job-posting site, seeking a position in business and managerial finance and accounting. Clayden, who misrepresents himself as an employment officer with International Bank&Commerce Corp. sends her an e-mail asking for more personal information.

Auditing: A Risk Based-Approach (MindTap Course List)
11th Edition
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Chapter10: Auditing Cash, Marketable Securities, And Complex Financial Instruments
Section: Chapter Questions
Problem 11CYBK
icon
Related questions
Question

Types of Cyber Crimes. The following situations are similar, but each represents a variation of a particular crime. Identify the crime and point out the differences in the variations.

(a) Chen, posing fraudulently as Diamond Credit Card Co., sends an e-mail to Emily, stating that the company has observed suspicious activity in her account and has frozen the account. The e-mail asks her to reregister her credit-card number and password to reopen the account. Chen's action is cyber theft. In this situation, it would be phishing, which is a district form of identity theft. Chen is the perpetrator to find out about Emily’s financial data and passwords by posing as Diamond Credit Card Co. The suspicious activity in her account and the frozen of her account are part of the schemes for the perpetrator to seek information from Emily. He included this information to frighten Emily, so she will immediately respond with information and her account wouldn’t be frozen. When Chen has her information, he is going to act like her to drain her credit account.

(b) Claiming falsely to be Big BUy Retail Finance Co., Conner sends an email to Dino, asking him to confirm or update his personal security information to prevent his Big Buy account from being discontinued.

(C) Felicia posts her resume on GotWork.com, an online job-posting site, seeking a position in business and managerial finance and accounting. Clayden, who misrepresents himself as an employment officer with International Bank&Commerce Corp. sends her an e-mail asking for more personal information.

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps

Blurred answer
Knowledge Booster
Frauds in Accounting information system (AIS)
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, finance and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Auditing: A Risk Based-Approach (MindTap Course L…
Auditing: A Risk Based-Approach (MindTap Course L…
Accounting
ISBN:
9781337619455
Author:
Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:
Cengage Learning