SlideShare a Scribd company logo
1 of 23
Chapter 15
Consumer Fraud
Learning Objectives
• Define what consumer fraud is and understand its seriousness
• Understand identity theft
• Classify the various types of investment and consumer frauds
Consumer Fraud
• Any fraud that targets a consumer or an individual as its victim.
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
• Two types of consumer fraud
• Identity Theft
• Consumer Scams
• With advancements in technology consumer fraud has become much more common
than it used to be.
Identity Theft
• Identity theft is using the identity information of another
person to pretend to be them.
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
Identity Crime in New Zealand
Identity Crime in New Zealand
•Costs the New Zealand economy approximately $209 million every year.
•133,000 New Zealanders are victims of identity theft annually.
New Zealanders tend to be trusting people which makes New Zealand appear to
be an easy target.
(Department of Internal Affairs, 2013)
Identity Theft Cycle
Stage 1: Discovery
1. Gain Information
2. Verify
Information
Stage 2: Action
1. Accumulating
Documentation
2. Cover-up Actions
Stage 3: Trial
1. 1st Dimensional
2. 2nd
Dimensional
3. 3rd
Dimensional
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
Methods of Identity Theft
• Posing as an employee or representative of an organisation
• Shoulder surfing
• Dumpster diving
• Skimming
• Phishing
• Stealing wallets
• Theft of mail
• Social engineering
(Department of Internal Affairs, 2013) & (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
Identity Theft – RFID
Scanning
How Fraudsters Benefit from Identity Theft
• Buy large ticket items
• Take out car, home or other loans
• Establish phone or wireless service in the victims name
• Opening a new bank account
• Filing for bankruptcy under the victims name
• Reporting a victim’s name to the police in lieu of their own
• Opening new credit card accounts
• Changing victim’s mailing address
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
How to Minimise the Risks of Identity Theft
• Keep key documents (e.g. birth certificate and passport) in a safe place
• Shred or burn mail with your name and address on it.
• Be careful when publishing information in public places
• Do not log onto internet banking from a shared or public computers.
• Remove all personal information from computers before you dispose of them.
• Be suspicious of any unexpected events
• Request an access register report from Births, Deaths and Marriages
• Request a credit report from Dun & Bradstreet or Veda.
(Department of Internal Affairs, 2011)
Recent NZ Examples of Identity Theft
Other Types of Consumer Scams
• Fraudsters use various schemes to earn a
consumer’s confidence and then use that
confidence to get the consumer to pay or invest
money or provide personal information.
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
Other Consumer Scams
Foreign Advance-Fee Scams
•Nigerian money offers
•Clearinghouse scam
•Purchase of real estate scam
•Sale of crude oil at below market price
•Disbursement of money from wills
Other Consumer Scams
Work-at-Home Schemes
•Multilevel marketing
•Chain letters, mail stuffing, product testing, craft assembly
Bogus Mystery Shopping Scams
Telemarketing Fraud
Scams in New Zealand
• Increasing number of people being ripped off through simple scams in New
Zealand
• Complaints are being made almost daily
• Scams would continue until public became more savvy about how the frauds
work
(Leask, 2013)
• New Zealanders reported $4 million lost in scams last year, although the
government estimates that scams could cost the country up to half a billion
dollars every year.
(Wannan, 2013)
How to Detect Scams
• it's addressed to 'My Dear' or something generic
• there are many grammatical or spelling errors in the email
• the email address is a public service domain like Gmail / Yahoo / Livemail
• a bank that you don't have an account with contacts you
• you are urged to visit a website to update your account information or fill in a form with personal information
• you're advised to act fast to claim money or some other prize in a lottery or competition that you never entered
• you inherit money or possessions from someone you've never heard of
• you receive a request from a stranger who needs your help (usually to send money)
• someone on a social networking site asks you to send them money so they can pay debts or so that they can visit you.
(The Department of Internal Affairs, 2013)
Example Consumer Scam
Dear Alsemgeest ,
Please forgive my using this means to reach you but I can't think of any other
way of letting you know of this urgent matter at hand. I am Barrister Davidson
Paul Kingsley ,an Attorney at law and the Personal lawyer to(late)Engineer D.
Alsemgeest , who dwelt and worked here for more than twenty years as a major
contractor and businessman.
On the 21st of june 2005, my client,his wife and their only daugther were
involved in an automobile accident and It was unfortunate my client and his
family all lost their lives and leaving some huge amount of money, Eight
Million Five hundred thousand united state dollars ($8.5 )in a security finance
firm.
I shall detail you on the confirmation of your genuinty to work this out with
me. use your personal email address and contact me directly through this my
private email address davidson-atg@terra.com for more details.
Thanks
Davidson Paul Kingsley  (Esq)
Email: davidson-atg@terra.com
Scams Targeting the Elderly and Uneducated
• Those who are the most susceptible to consumer fraud are the elderly and the
uneducated.
• Elderly are more susceptible to telemarketing fraud than any other type of fraud.
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
• “old folk are being targeted by scammers”
• “People in the senior age group might have more money to invest or be seeking
online business opportunities”
• Grey Power Wanganui President seniors would probably be too embarrassed to say
they had been conned.
(Karauria, 2013)
Five Worst Scams in NZ
• Dating and romance scams
• Investment Scams
• Upfront money scams
• Online auction and trading scams
• Online products, advertising and computer hacking
(Ministry of Business Innovation and Employment’s Consumer Affairs Team, 2013)
Recent NZ Consumer Fraud Examples
Investment Scams
• Any fraud which is related to stocks, bonds, commodities, limited
partnerships, real estate, or other types of investments.
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
• Perpetrators usually make fraudulent promises or mis-statements
to induce people to make investments
Example
• Ponzi Scheme
Investment Fraud – Red Flags
• Unreasonably high or guaranteed rates of return
• Investments that do not make sound business sense or lack detail
• Pressure to make the investment early
• A business with a history of scandals
• Unaudited financial reports or adverse opinions
• Luxurious lifestyles of principals
• Investment success that is dependent on someone’s “unique expertise”
• Inability to pull out or liquidate the investment
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
Conclusion
• Consumer fraud is any type of fraud that targets consumers as its victims.
• Any offer that sounds too good to be true probably is.
• Scams operate in a manner which aim to gain an individual’s confidence and
then use that confidence to defraud the consumer.
• Advances in technology have made consumer fraud much easier for
perpetrators to commit.

More Related Content

What's hot

Operatiional Audit
Operatiional AuditOperatiional Audit
Operatiional Audit
Malay Paul
 
A Presentation on Risk Based Auditing
A Presentation on Risk Based AuditingA Presentation on Risk Based Auditing
A Presentation on Risk Based Auditing
Amar Deep Ghimire
 

What's hot (20)

Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk Assessment and Threat Modeling
Risk Assessment and Threat ModelingRisk Assessment and Threat Modeling
Risk Assessment and Threat Modeling
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12
 
Operatiional Audit
Operatiional AuditOperatiional Audit
Operatiional Audit
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Forensic Accounting – How To Uncover Fraud Jan 2012
Forensic Accounting – How To Uncover Fraud Jan 2012Forensic Accounting – How To Uncover Fraud Jan 2012
Forensic Accounting – How To Uncover Fraud Jan 2012
 
Internal controls
Internal controlsInternal controls
Internal controls
 
Governance, Risk Management, and Internal Control
Governance, Risk Management, and Internal ControlGovernance, Risk Management, and Internal Control
Governance, Risk Management, and Internal Control
 
Internal Audit Methodology
Internal Audit MethodologyInternal Audit Methodology
Internal Audit Methodology
 
Parallel simulation
Parallel simulationParallel simulation
Parallel simulation
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)
 
Security and Audit Report Sign-Off—Made Easy
Security and Audit Report Sign-Off—Made EasySecurity and Audit Report Sign-Off—Made Easy
Security and Audit Report Sign-Off—Made Easy
 
A Presentation on Risk Based Auditing
A Presentation on Risk Based AuditingA Presentation on Risk Based Auditing
A Presentation on Risk Based Auditing
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
 
Audit an overview
Audit    an overviewAudit    an overview
Audit an overview
 
Who Commits Fraud
Who Commits Fraud   Who Commits Fraud
Who Commits Fraud
 
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSRISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
 

Viewers also liked

Elder Care: Fraud Protection
Elder Care: Fraud ProtectionElder Care: Fraud Protection
Elder Care: Fraud Protection
caretocontinue
 
Scammin Elderly PP
Scammin Elderly PPScammin Elderly PP
Scammin Elderly PP
Katelyn Lutz
 
HCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINALHCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINAL
Gina Leymeister
 
Overview of Neuroeconomics
Overview of NeuroeconomicsOverview of Neuroeconomics
Overview of Neuroeconomics
dpirouz
 

Viewers also liked (20)

Respite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentationRespite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentation
 
Elder Care: Fraud Protection
Elder Care: Fraud ProtectionElder Care: Fraud Protection
Elder Care: Fraud Protection
 
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
 
Protect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the ElderlyProtect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the Elderly
 
Fraud Committed Against the Elderly in N.C.
Fraud Committed Against the Elderly in N.C.Fraud Committed Against the Elderly in N.C.
Fraud Committed Against the Elderly in N.C.
 
Neuroeconomics Evidence for Decision-making Theory
Neuroeconomics Evidence for Decision-making TheoryNeuroeconomics Evidence for Decision-making Theory
Neuroeconomics Evidence for Decision-making Theory
 
Navigating Elder Financial Abuse
Navigating Elder Financial AbuseNavigating Elder Financial Abuse
Navigating Elder Financial Abuse
 
5.4 whose laws rule the web
5.4 whose laws rule the web 5.4 whose laws rule the web
5.4 whose laws rule the web
 
Scammin Elderly PP
Scammin Elderly PPScammin Elderly PP
Scammin Elderly PP
 
Senior scams
Senior scamsSenior scams
Senior scams
 
Elder Abuse on the Front Lines
Elder Abuse on the Front LinesElder Abuse on the Front Lines
Elder Abuse on the Front Lines
 
HCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINALHCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINAL
 
Keeping The Elderly Safe In The 21st Century
Keeping The Elderly Safe In The 21st CenturyKeeping The Elderly Safe In The 21st Century
Keeping The Elderly Safe In The 21st Century
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
What is neuroeconomics
What is neuroeconomicsWhat is neuroeconomics
What is neuroeconomics
 
Elder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
Elder Abuse: A Concern For Social Work Practice ...Lloyd DsouzaElder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
Elder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
 
Overview of Neuroeconomics
Overview of NeuroeconomicsOverview of Neuroeconomics
Overview of Neuroeconomics
 
Elder financial exploitation gov conf presentation
Elder financial exploitation gov conf presentation Elder financial exploitation gov conf presentation
Elder financial exploitation gov conf presentation
 
EC4024 Financial Economics Lecture 19L Neurofinance
EC4024 Financial Economics Lecture 19L NeurofinanceEC4024 Financial Economics Lecture 19L Neurofinance
EC4024 Financial Economics Lecture 19L Neurofinance
 
Utility and neuroscience: a mechanistic approach of decision-making and ratio...
Utility and neuroscience: a mechanistic approach of decision-making and ratio...Utility and neuroscience: a mechanistic approach of decision-making and ratio...
Utility and neuroscience: a mechanistic approach of decision-making and ratio...
 

Similar to Chapter 15Consumer Fraud by Rachel

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
charlesgarrett
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
Matt Smith
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
Matt Smith
 

Similar to Chapter 15Consumer Fraud by Rachel (20)

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft Overview Webinar
Identity Theft Overview WebinarIdentity Theft Overview Webinar
Identity Theft Overview Webinar
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
ONLINE FRAUD GUIDE
ONLINE FRAUD GUIDEONLINE FRAUD GUIDE
ONLINE FRAUD GUIDE
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Idt workshop group benefits
Idt workshop group benefitsIdt workshop group benefits
Idt workshop group benefits
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 

More from VidaB

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
VidaB
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
VidaB
 
Chapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by EmmaChapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by Emma
VidaB
 
Chapter 16 B Artika
Chapter 16 B ArtikaChapter 16 B Artika
Chapter 16 B Artika
VidaB
 
Chapter 14 by Svetlana
Chapter 14 by SvetlanaChapter 14 by Svetlana
Chapter 14 by Svetlana
VidaB
 
Chapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosuresChapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosures
VidaB
 
Chapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory FraudChapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory Fraud
VidaB
 
Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet
VidaB
 
Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud
VidaB
 
Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud  Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud
VidaB
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
VidaB
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
VidaB
 
Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen
VidaB
 
Chapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudChapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraud
VidaB
 
Chapter 1 the nature of fraud
Chapter 1 the nature of fraudChapter 1 the nature of fraud
Chapter 1 the nature of fraud
VidaB
 
Week 1 audit and assurance services
Week 1 audit  and assurance servicesWeek 1 audit  and assurance services
Week 1 audit and assurance services
VidaB
 

More from VidaB (16)

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Chapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by EmmaChapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by Emma
 
Chapter 16 B Artika
Chapter 16 B ArtikaChapter 16 B Artika
Chapter 16 B Artika
 
Chapter 14 by Svetlana
Chapter 14 by SvetlanaChapter 14 by Svetlana
Chapter 14 by Svetlana
 
Chapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosuresChapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosures
 
Chapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory FraudChapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory Fraud
 
Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet
 
Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud
 
Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud  Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
 
Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen
 
Chapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudChapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraud
 
Chapter 1 the nature of fraud
Chapter 1 the nature of fraudChapter 1 the nature of fraud
Chapter 1 the nature of fraud
 
Week 1 audit and assurance services
Week 1 audit  and assurance servicesWeek 1 audit  and assurance services
Week 1 audit and assurance services
 

Recently uploaded

FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 

Recently uploaded (20)

FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 

Chapter 15Consumer Fraud by Rachel

  • 2. Learning Objectives • Define what consumer fraud is and understand its seriousness • Understand identity theft • Classify the various types of investment and consumer frauds
  • 3. Consumer Fraud • Any fraud that targets a consumer or an individual as its victim. (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012) • Two types of consumer fraud • Identity Theft • Consumer Scams • With advancements in technology consumer fraud has become much more common than it used to be.
  • 4. Identity Theft • Identity theft is using the identity information of another person to pretend to be them. (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
  • 5. Identity Crime in New Zealand Identity Crime in New Zealand •Costs the New Zealand economy approximately $209 million every year. •133,000 New Zealanders are victims of identity theft annually. New Zealanders tend to be trusting people which makes New Zealand appear to be an easy target. (Department of Internal Affairs, 2013)
  • 6. Identity Theft Cycle Stage 1: Discovery 1. Gain Information 2. Verify Information Stage 2: Action 1. Accumulating Documentation 2. Cover-up Actions Stage 3: Trial 1. 1st Dimensional 2. 2nd Dimensional 3. 3rd Dimensional (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
  • 7. Methods of Identity Theft • Posing as an employee or representative of an organisation • Shoulder surfing • Dumpster diving • Skimming • Phishing • Stealing wallets • Theft of mail • Social engineering (Department of Internal Affairs, 2013) & (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
  • 8. Identity Theft – RFID Scanning
  • 9. How Fraudsters Benefit from Identity Theft • Buy large ticket items • Take out car, home or other loans • Establish phone or wireless service in the victims name • Opening a new bank account • Filing for bankruptcy under the victims name • Reporting a victim’s name to the police in lieu of their own • Opening new credit card accounts • Changing victim’s mailing address (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
  • 10. How to Minimise the Risks of Identity Theft • Keep key documents (e.g. birth certificate and passport) in a safe place • Shred or burn mail with your name and address on it. • Be careful when publishing information in public places • Do not log onto internet banking from a shared or public computers. • Remove all personal information from computers before you dispose of them. • Be suspicious of any unexpected events • Request an access register report from Births, Deaths and Marriages • Request a credit report from Dun & Bradstreet or Veda. (Department of Internal Affairs, 2011)
  • 11. Recent NZ Examples of Identity Theft
  • 12. Other Types of Consumer Scams • Fraudsters use various schemes to earn a consumer’s confidence and then use that confidence to get the consumer to pay or invest money or provide personal information. (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
  • 13. Other Consumer Scams Foreign Advance-Fee Scams •Nigerian money offers •Clearinghouse scam •Purchase of real estate scam •Sale of crude oil at below market price •Disbursement of money from wills
  • 14. Other Consumer Scams Work-at-Home Schemes •Multilevel marketing •Chain letters, mail stuffing, product testing, craft assembly Bogus Mystery Shopping Scams Telemarketing Fraud
  • 15. Scams in New Zealand • Increasing number of people being ripped off through simple scams in New Zealand • Complaints are being made almost daily • Scams would continue until public became more savvy about how the frauds work (Leask, 2013) • New Zealanders reported $4 million lost in scams last year, although the government estimates that scams could cost the country up to half a billion dollars every year. (Wannan, 2013)
  • 16. How to Detect Scams • it's addressed to 'My Dear' or something generic • there are many grammatical or spelling errors in the email • the email address is a public service domain like Gmail / Yahoo / Livemail • a bank that you don't have an account with contacts you • you are urged to visit a website to update your account information or fill in a form with personal information • you're advised to act fast to claim money or some other prize in a lottery or competition that you never entered • you inherit money or possessions from someone you've never heard of • you receive a request from a stranger who needs your help (usually to send money) • someone on a social networking site asks you to send them money so they can pay debts or so that they can visit you. (The Department of Internal Affairs, 2013)
  • 17. Example Consumer Scam Dear Alsemgeest , Please forgive my using this means to reach you but I can't think of any other way of letting you know of this urgent matter at hand. I am Barrister Davidson Paul Kingsley ,an Attorney at law and the Personal lawyer to(late)Engineer D. Alsemgeest , who dwelt and worked here for more than twenty years as a major contractor and businessman. On the 21st of june 2005, my client,his wife and their only daugther were involved in an automobile accident and It was unfortunate my client and his family all lost their lives and leaving some huge amount of money, Eight Million Five hundred thousand united state dollars ($8.5 )in a security finance firm. I shall detail you on the confirmation of your genuinty to work this out with me. use your personal email address and contact me directly through this my private email address davidson-atg@terra.com for more details. Thanks Davidson Paul Kingsley  (Esq) Email: davidson-atg@terra.com
  • 18. Scams Targeting the Elderly and Uneducated • Those who are the most susceptible to consumer fraud are the elderly and the uneducated. • Elderly are more susceptible to telemarketing fraud than any other type of fraud. (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012) • “old folk are being targeted by scammers” • “People in the senior age group might have more money to invest or be seeking online business opportunities” • Grey Power Wanganui President seniors would probably be too embarrassed to say they had been conned. (Karauria, 2013)
  • 19. Five Worst Scams in NZ • Dating and romance scams • Investment Scams • Upfront money scams • Online auction and trading scams • Online products, advertising and computer hacking (Ministry of Business Innovation and Employment’s Consumer Affairs Team, 2013)
  • 20. Recent NZ Consumer Fraud Examples
  • 21. Investment Scams • Any fraud which is related to stocks, bonds, commodities, limited partnerships, real estate, or other types of investments. (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012) • Perpetrators usually make fraudulent promises or mis-statements to induce people to make investments Example • Ponzi Scheme
  • 22. Investment Fraud – Red Flags • Unreasonably high or guaranteed rates of return • Investments that do not make sound business sense or lack detail • Pressure to make the investment early • A business with a history of scandals • Unaudited financial reports or adverse opinions • Luxurious lifestyles of principals • Investment success that is dependent on someone’s “unique expertise” • Inability to pull out or liquidate the investment (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
  • 23. Conclusion • Consumer fraud is any type of fraud that targets consumers as its victims. • Any offer that sounds too good to be true probably is. • Scams operate in a manner which aim to gain an individual’s confidence and then use that confidence to defraud the consumer. • Advances in technology have made consumer fraud much easier for perpetrators to commit.

Editor's Notes

  1. <object width="425" height="344"><param name="movie" value="http://swf.tubechop.com/tubechop.swf?vurl=lLAFhTjsQHw&start=30&end=249&cid=1484417"></param><embed src="http://swf.tubechop.com/tubechop.swf?vurl=lLAFhTjsQHw&start=30&end=249&cid=1484417" type="application/x-shockwave-flash" allowfullscreen="true" width="425" height="344"></embed></object> http://www.youtube.com/watch?v=lLAFhTjsQHw 0:30 – 4:09