Conferences related to Computer Fraud

Back to Top

2021 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)

FUZZ-IEEE 2021 will represent a unique meeting point for scientists and engineers, both from academia and industry, to interact and discuss the latest enhancements and innovations in the field. The topics of the conference will cover all the aspects of theory and applications of fuzzy sets, fuzzy logic and associated approaches (e.g. aggregation operators such as the Fuzzy Integral), as well as their hybridizations with other artificial and computational intelligence techniques.


2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)

The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.


2020 IEEE Power & Energy Society General Meeting (PESGM)

The Annual IEEE PES General Meeting will bring together over 2900 attendees for technical sessions, administrative sessions, super sessions, poster sessions, student programs, awards ceremonies, committee meetings, tutorials and more


2020 IEEE/PES Transmission and Distribution Conference and Exposition (T&D)

Bi-Annual IEEE PES T&D conference. Largest T&D conference in North America.


ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.


More Conferences

Periodicals related to Computer Fraud

Back to Top

Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...


Engineering in Medicine and Biology Magazine, IEEE

Both general and technical articles on current technologies and methods used in biomedical and clinical engineering; societal implications of medical technologies; current news items; book reviews; patent descriptions; and correspondence. Special interest departments, students, law, clinical engineering, ethics, new products, society news, historical features and government.


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


More Periodicals

Most published Xplore authors for Computer Fraud

Back to Top

Xplore Articles related to Computer Fraud

Back to Top

Computer Fraud and Ethics: The Societe Generale's Trading Fraud

2011 International Conference on Computer and Management (CAMAN), 2011

Computer crime is a problem that continues to increase across the world. In this paper, we use a recent case of computer fraud by a rogue trader in Societe Generale, a French bank, to examine how the fraud was committed. We then discuss how to improve the risk control systems. Even with an improved risk control systems and strengthening of ...


Dissecting computer fraud: from definitional issues to a taxonomy

37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the, 2004

Computer frauds, while less dramatic than crimes of violence, can inflict significant damage at community, organizational or individual level. In order to properly quantify and mitigate the risk, computer frauds needs to be well understood. In this paper, in a conceptual-analytical research approach, we propose a dissection of computer fraud. First, we look into the elements of an offense, the ...


Computer fraud. The villain's view of the opportunities

Electronics and Power, 1978

Are you sure that your computer system is safe from villains? Remember, most villains have to be very unlucky to get caught. Are you still sure you have full security? Well, you may not be so sure when you get to the end of this article.


Keeping information safe (computer fraud)

IEE Review, 1988

Computer-based fraud is an increasing crime with only one in twenty frauds resulting in a successful prosecution. In order to make systems secure the use of the public key cipher (PKC) system is being introduced. PKC has the advantage that the secret aspect of the process is wholly under the control of the person receiving the information. The use of ...


Phishing - the threat that still exists

2015 International Conference on Computing and Communications Technologies (ICCCT), 2015

Phishing is an online security attack in which the hacker aims in harvesting sensitive information like passwords, credit card information etc. from the users by making them to believe what they see is what it is. This threat has been into existence for a decade and there has been continuous developments in counter attacking this threat. However, statistical study reveals ...


More Xplore Articles

Educational Resources on Computer Fraud

Back to Top

IEEE-USA E-Books

  • Computer Fraud and Ethics: The Societe Generale's Trading Fraud

    Computer crime is a problem that continues to increase across the world. In this paper, we use a recent case of computer fraud by a rogue trader in Societe Generale, a French bank, to examine how the fraud was committed. We then discuss how to improve the risk control systems. Even with an improved risk control systems and strengthening of computer security systems, computer fraud cannot be prevented. Good computer ethics and ethical behaviour are needed. We conclude with proposals for mitigating this people risk.

  • Dissecting computer fraud: from definitional issues to a taxonomy

    Computer frauds, while less dramatic than crimes of violence, can inflict significant damage at community, organizational or individual level. In order to properly quantify and mitigate the risk, computer frauds needs to be well understood. In this paper, in a conceptual-analytical research approach, we propose a dissection of computer fraud. First, we look into the elements of an offense, the act of fraud in general then explain what is and what is not computer fraud. Next, from a prevention perspective, we propose a taxonomy of computer fraud with respect to perpetration platform, and to perpetration method. We believe that our contributions extend the existing knowledge of the phenomenon, and can assist those fighting computer fraud to better understand it and to design means of preventing and reporting it.

  • Computer fraud. The villain's view of the opportunities

    Are you sure that your computer system is safe from villains? Remember, most villains have to be very unlucky to get caught. Are you still sure you have full security? Well, you may not be so sure when you get to the end of this article.

  • Keeping information safe (computer fraud)

    Computer-based fraud is an increasing crime with only one in twenty frauds resulting in a successful prosecution. In order to make systems secure the use of the public key cipher (PKC) system is being introduced. PKC has the advantage that the secret aspect of the process is wholly under the control of the person receiving the information. The use of PKC with a digital signature is discussed.<<ETX>>

  • Phishing - the threat that still exists

    Phishing is an online security attack in which the hacker aims in harvesting sensitive information like passwords, credit card information etc. from the users by making them to believe what they see is what it is. This threat has been into existence for a decade and there has been continuous developments in counter attacking this threat. However, statistical study reveals how phishing is still a big threat to today's world as the online era booms. In this paper, we look into the art of phishing and have made a practical analysis on how the state of the art anti-phishing systems fail to prevent Phishing. With the loop-holes identified in the state-of-the-art systems, we move ahead paving the roadmap for the kind of system that will counter attack this online security threat more effectively.

  • Data security-can auditor involvement or use of auditing techniques help in building more secure systems?

    Advances in technology allow the building of ever more complex applications systems, typified by systems involving electronic data interchange (EDI). While management has become less concerned with the issue of security, systems are becoming more difficult to control, while computer fraud crimes, particularly those perpetrated by 'trusted' insiders continue to rise. It is vital that those involved in building systems ensure that they are auditable, controllable and secure, as well as usable and maintainable. Systems analysts and EDP auditors have roles to play, and methodologies and tools must be enhanced to meet these requirements.<<ETX>>

  • The Dark Net: Self-Regulation Dynamics of Illegal Online Markets for Identities and Related Services

    Identity data, e.g. data to gain online access to computers, bank accounts, and credit card data, are traded in online marketplaces. This paper investigates the functioning of illegal online markets. These markets lack state regulation and the means to enforce agreements and the paper shows that they use alternative mechanisms to create trust among market participants. The sales outlets of illegal online markets are able to self-regulate the market and should be considered as a major device that makes cyber crime profitable.

  • IDENTIFIED (Integrated Dictionary-based Extraction of Non-language-dependent Token Information for Forensic Identification, Examination, and Discrimination): a dictionary-based system for extracting source code metrics for software forensics

    The frequency and severity of computer-based attacks such as viruses and worms, logic bombs, trojan horses, computer fraud, and plagiarism of software code have all become of increasing concern to many of those involved with information systems. Part of the difficulty experienced in collecting evidence regarding the attack or theft in such situations has been the definition and collection of appropriate measurements to use in models of authorship, With this purpose in mind a system called IDENTIFIED is being developed to assist with the task of software forensics which is the use of software code authorship analysis for legal or official purposes. IDENTIFIED uses combinations of wildcards and special characters to define count-based metrics, allows for hierarchical metametric definitions, automates much of the file handling task, extracts metric values from source code, and assists with the analysis and modelling processes. It is hoped that the availability of such tools will encourage more detailed research into this area of ever- increasing importance.

  • Technology-based Financial Frauds in Taiwan: Issues and Approaches

    Financial fraud or deception for personal gain had become one of the major crimes in society. The situation worsened by the advance and widely application of information technology (IT). In recent years, the number of financial frauds in Taiwan increased dramatically, from 2,817 in 1997 to 43,342 in 2005, which means a 15 fold increase in 8 years. Besides the fact that the transcendence and the anonymity of network allow fraudsters to acquire their victims effectively and to avoid the risk of apprehension, the IT-enabled platform also makes it much more efficient and effective for fraudsters to exchange information with their victims and to transfer financial data. Major types of financial frauds in Taiwan include: computer fraud, credit card fraud, auction fraud, e-commerce fraud, and telemarketing fraud. Modus operandi of financial frauds are depicted and current remedies are summarized. A framework for developing countermeasures is also proposed for future research.

  • Author Identification of Software Source Code with Program Dependence Graphs

    With the significant increase of computer and Internet based crimes, it becomes increasingly important to have techniques that can be applied in a legal setting to assist the court in making judgements about malware, theft of code and computer fraud. To better deal with author identification of software, we propose a semantic approach to identifying authorship through the comparison of program data flows. To do so, we compute program dependences, compute program similarity if detecting theft of code is needed, and thus query about not only the syntactic structure of programs but also the data flow within in order to discriminate authors. The experimental result reveals that our technique is more robust even with some intentional code modifications.



Standards related to Computer Fraud

Back to Top

No standards are currently tagged "Computer Fraud"


Jobs related to Computer Fraud

Back to Top