Avoiding Internet Fraud

Surname 1
Name
Instructor
Course Title
Date
Avoiding Fraud on the Internet
The advancement in technology has led to increased internet usage in facilitating diverse
online activities such as online shopping, mobile banking and ease of trade across boundaries.
Consequently, this has transformed the world into a global village where people can conduct
their activities with much convenience. However, internet fraud is now on the rise, dealing a
huge blow to the ease with which online activities can be conducted. The major incidences of
internet fraud are manifested through email spamming, affinity fraud, spoofed websites among
others (Ahmad & Waqar 364-370). Spoofed websites seek to direct emails which appear to have
come from accredited banks or other credit companies and require bank holders to click
suspicious email links that lead to the spoofed website having logged in using their financial
information. Affinity fraud is another type of internet fraud which manifests itself among people
of a certain grouping, mainly on social networks where they exchange information freely.
Despite the pool of merits that come along with the internet revolution, such a change in
the way of communication and the way of doing things, unsuspecting people ought to be aware
of the different forms of internet fraud and how they occur. Gone are the moments where
consumers would visit shopping places to purchase goods, book flights or visit banking halls to
make financial transactions. Nonetheless, the execution of various online transactions has been
marred by identity theft, which is enhanced by increased fraudulent access to personal
2
information over the internet either through phishing or pharming. Phishing and pharming are the
most popular ways through which internet fraud takes place (Anderson & Keith 4). However,
certain measures have been put up in order to safeguard people from becoming victims of
phishing by some financial institutions. People can prevent themselves from becoming victims of
online fraud by avoiding links that accompany an email which seeks to direct them to suspicious
web pages. People can also refrain from completing strange forms in email messages which
usually require personal financial information such as credit cards. In essence, they should
understand that financial institutions hardly request for confidential information via regular
emails. Additionally, internet users can always ensure that they use secure websites when
submitting sensitive information through web browsers. Besides, they can also install web
browser tool bars to protect them from suspicious phishing websites (Bose 24).
Internet users can also exercise caution to phishing by often checking their bank credit and
debit card statements to confirm the legitimacy of their transactions. Furthermore, they can also
ensure to update their web browsers regularly as well as exercising some suspicion for all prompt
emails which require personal financial information. Above all, internet users can also guarantee
their safety from internet fraud by ensuring that they install antivirus software in their computers
to prevent fraudsters from maliciously hacking into their devices to access personal information
(Leyden & John 4). In conclusion, though conducting activities over the internet seem to bring a
lot of convenience to many, people should exercise preventive measures against internet
fraudsters. Particularly, this can achieved by refraining from giving out sensitive information to
suspicious prompts from unauthentic sources.
3
Works Cited
Ahmad, Waqar. "Is Credit Card Fraud a Real Crime? Does it Really Cripple the E-Commerce
Sector of E-Business?." Management of e-Commerce and e-Government, 2008.
ICMECG'08. International Conference on. IEEE, 2008. Print.
Anderson, Keith B. Consumer fraud in the United States: An FTC survey. Washington, DC:
Federal Trade Commission, 2004. Print.
Bose, Indranil, and Alvin Chung Man Leung. "Unveiling the mask of phishing: Threats,
preventive measures, and responsibilities." communications of the Association for
Information Systems 19.1 (2007): 24. Print.
Leyden, John. "Phishers tapping botnets to automate attacks." The Register11.26 (2004): 04.
Print.

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.