...qualification of the respondents | 26 | 3.4 | Occupational status of the respondents | 28 | 3.5 | Awareness on the procedure for using ATM | 30 | 3.6 | Receipt of proper guidelines from bank | 32 | 3.6.1 | Mode of receipt of guidelines | 34 | 3.6.2 | Instructions followed by customers | 36 | 3.6.3 | Requirement for more guidelines | 38 | 3.7 | Usage of ATM in a remote/suspicious area | 40 | 3.8 | Usage of ATM besides unknown person | 42 | 3.9 | Closing the entry door while using ATM | 44 | 3.10 | Lending the card or pin to stranger’s | 46 | 3.11 | Leave the ATM before cancelling or completing the transaction | 48 | 3.12 | Mention the pin in the card | 50 | 3.13 | Usage of ATM device while they suspect ATM device has been tampered | 52 | 3.14 | Inform the bank immediately about lost card | 54 | 3.15 | Checking of bank accounts regularly | 56 | 3.16 | Inform the bank immediately on finding of any unauthorized ATM transaction | 58 | 3.17 | Usage of ATM device with any old equipment or wires attached to ATM device | 60 | 3.18 | Inform the bank if card stuck in ATM | 62 | 3.19 | Action of customers if cash does not dispensedAfter entering pin | 64 | 3.20 | Usage of ATM to withdraw large amount of cash | 66 | 3.21 | Pay attention to display screen while entering pi | 68 | 3.22 | Requirement of guard in ATM counter | 70 | 3.23 | Card swiping at the entry door...
Words: 12313 - Pages: 50
...Adapted Homework, Ch. 11 (11 points possible) 1. “An Analysis of sustainability is similar to a five forces analysis.” Comment on this, focusing on the firm you’ve been studying for your term project. (1 point) A sustainability analysis is similar to a five forces analysis because they are focus on creating competitive advantage. The sustainability analysis is to analyze and find a way to compete with competitors and deal with potential entrants, in order to maintain profits in the long run. The analysis includes the company’s resources and isolating mechanism that help the company to sustain its advantages. The five forces analysis also analyze 5 factors, like supplier power, buyer power, competitors, new entrants, and substitutes and complements, which affect to the company profits. The company can use both analysis to build competitive advantage and maintain its position, market share, and profit margin in the industry. 2. (a) How do economies of scale affect sustainability? (b) Economies of scope? (2 points: 1 point each) When economic of scales happens it definitely affects sustainability because the resources and isolating mechanism changes. For some companies might be easier to scale to large quantities of production and the competitive advantage could change for the one able to do it. Economies of scope will also change the sustainability because producing two products because it is the same cost to produce one of them can change how companies limit...
Words: 984 - Pages: 4
...statement that the banking sector in nepal exists only at rudimentary level because it has evolved difficult transition from highly centralized and planned economy to government-sector dominated, commodity-focused market economy of today. This project of “Banking" will give us the platform to use the software for basic banking purposes ranging from cash withdrawls to cash deposites.Using this software,customoers can access their bank accounts in order to make cash withdrawals,debit card cash advances and check their account balances.Moreover it also provides us with the background and infrastructres to run an ATM card. Through the project the focus has been on using the ATM on a simple and reliable manner which makes use of normal database and input/output operations to give the desired results to the customer. This project is based upon the basic uses and functioning of the ATM as a whole where a customer can create a bank account, deposit his/her balance and retrieve money using a credit or a debit card. Banking system software keeps the day to day transaction record as a part of complete banking.It can keep the information of the account type,account opening form,deposit and withdrawal and searches the transacton,transaction reports,individual account opening form,group accounts etc. The exiciting part of this project is that through this software we can display transaction reports,statistical summary of account type and interest information. 2. INTRODUCTION The “Banking...
Words: 1152 - Pages: 5
...and carriage holding a roller, the front of the case holds the keyboard. When you type on a typewriter the carriage and ribbon move from left to right. While a computer, before you saved what you type is only for temporarily shown on the monitor you can still edit it when there’s an error. There similarity is both utilized with ink; they are also mechanical and there keyboard are just the same. Word Derivation: The Italian Guseppe Ravissa created a photo type typewriter called cembalo serivano o macchina de scrivere a tasti. Source: http://www.thefreedictionary.com/typewriter, http://en.wikipedia.org/wiki/Typewriter Classification ATM Card. Most common among the types of bank cards are ATM cards. ATM cards are also known as a bank card, client card, key card, or cash card. ATM is for transactions such as: deposits, cash withdrawals, obtaining account information, and other types of banking transactions, often through interbank networks. General...
Words: 1540 - Pages: 7
...Categories of Computer Crimes Keshia Lubin Strayer University Abstract Computer crime is any crime that has to do with a computer and a network. Computer crimes are criminal activities which involve the use of information technology to get illegal or unauthorized access to a a computer system with the mind set of damaging, deleting, and altering computer data. Computer crimes are include but are not limited to electronic frauds, misuse of devices, identity theft and data. Computer crimes do not necessarily have to involve damage to physical property. The computer could have participated in the crime or may have been the target. There are for common types of computer crimes computer as the target, the computer as an instrument of a crime, the computer as incidental to a crime, and crimes associated with the prevalence of computers. Categories of Computer Crime There are four common types of computer crimes. Computers can be used as an target. Crimes were the computer is the can include offenses like theft of intellectual property, theft of marketing information or blackmail based on information gained from computerized files. Crimes of this nature can sabotage intellectual property, marketing, pricing, or personnel data or can even sabotage of operating systems and programs with the thought of creating chaos in a business operations. There are many ways computers can be targeted unlawful access to criminal justice and other government records...
Words: 802 - Pages: 4
...When Edwin Sutherland first began his study/analysis under the Traditional Summary Reporting System, there was a limited amount of information available on White Color Crime. The white-collar offenses that are measured are fraud, forgery/counterfeiting, embezzlement, and all other offenses. Because white-collar crimes are not Index crimes, the only information available on these offenses is arrest information, which includes age, sex, and race of the arrestee. Additionally, all other offenses arrest category is very limited in its ability to measure the white-collar offenses included in its counts. This is due to the inability to differentiate the white-collar offenses from the others that also fall in this category. Based upon the most recently published data from the FBI, the arrest rates for the offenses of embezzlement, fraud, and forgery/counterfeiting are much lower than the arrest rates for property, crime, or for total crimes in general. In order to assess the utility of using NIBRS to measure white-collar crime, a substantial, but not exhaustive, list of white-collar offenses and its classification under NIBRS is provided (see Appendix A). Based upon that analysis, the following UCR offenses could be considered white-collar crime: fraud, bribery, counterfeiting/forgery, embezzlement (all of which are Group A offenses),...
Words: 1583 - Pages: 7
...store, gas station or anywhere else that a card transaction takes place, including an ATM” (Munton and McLeod 164). Skimming method is another identity theft scheme that is used by criminals and happens when individuals use their credit cards. Upon the utilization of the credit card, a skimming machine reads the magnetic stripe on the back of a credit or debit card when it is swiped to make a purchase or to access your account through an ATM. The skimmer records the following data: cardholder’s name, account number, expiration date and the card security code and saves it. Now criminals have all the information they need to make unauthorized purchases on the victim’s card (Levin and...
Words: 957 - Pages: 4
...Integrated Fraud Management Actimize Integrated Fraud Management solutions deliver real-time, customer-centric fraud prevention that supports a holistic, enterprise-wide fraud management program. Fully integrated channel and line-of-business specific detection solutions that seamlessly share data for true cross-channel fraud management Advanced and comprehensive set of fraud framework services that provide detection, decisioning, and operations capabilities Used by top global banks, such as Bank of America and BB&T, and recognized as Best-In-Class in Enterprise Fraud by CEB TowerGroup. Card Fraud Customer-centric, cross-channel, and cross-product fraud detection covers ATM, PIN and signature POS, and card not present transactions. Remote Banking Cross-channel models for retail online and mobile banking, call center, and IVR channels, to detect fraudulent monetary and non-monetary transactions. Commercial Banking Multi-channel monitoring and analytics for commercial banking transactions (e.g. wires, ACH, payroll) and non-monetary transactions (e.g. template creation, transaction approval) with user, account, and company-level profiling. Deposit Fraud Best practice rules and analytics for detection of suspicious incoming funds via electronic transactions and checks, to address schemes such as kiting and bust out fraud. Employee Fraud Proven rules and analytics, combined with proactive investigation tools...
Words: 426 - Pages: 2
...crime, including (1) the computer as an instrument of crime, (2) the computer as a target, (3) the computer as incidental to crime, and (4) crimes associated with the prevalence of computers. (Taylor, & Fritsch, 2011) The first category, the computer as an instrument of crime is basically using the computer to facilitate the crime. The criminal introduces a program to manipulate the computer's analytical processes, thereby facilitating the crime. The computer is used to connect to networks so the criminal can do such crimes as fraud, theft of service, theft, threats and even harassment. Another method involves converting legitimate computer processes for illegitimate purposes. Crimes in this category include fraudulent use of automated teller machine (ATM) cards and accounts; theft of money from accrual, conversion, or transfer accounts; credit card fraud; fraud from computer transactions (stock transfers, sales, or billings); and telecommunications fraud. Crimes in which the computer is the target include such offenses as theft of intellectual property, theft of marketing information (e.g., customer lists, pricing data, or marketing plans), or blackmail based on information gained from computerized files (e.g., medical information, personal history, or sexual preference). These crimes also could entail sabotage of intellectual property, marketing, pricing, or personnel data or sabotage of operating systems and programs with the intent to impede a business or create chaos in...
Words: 803 - Pages: 4
...crime, including (1) the computer as an instrument of crime, (2) the computer as a target, (3) the computer as incidental to crime, and (4) crimes associated with the prevalence of computers. (Taylor, & Fritsch, 2011) The first category, the computer as an instrument of crime is basically using the computer to facilitate the crime. The criminal introduces a program to manipulate the computer's analytical processes, thereby facilitating the crime. The computer is used to connect to networks so the criminal can do such crimes as fraud, theft of service, theft, threats and even harassment. Another method involves converting legitimate computer processes for illegitimate purposes. Crimes in this category include fraudulent use of automated teller machine (ATM) cards and accounts; theft of money from accrual, conversion, or transfer accounts; credit card fraud; fraud from computer transactions (stock transfers, sales, or billings); and telecommunications fraud. Crimes in which the computer is the target include such offenses as theft of intellectual property, theft of marketing information (e.g., customer lists, pricing data, or marketing plans), or blackmail based on information gained from computerized files (e.g., medical information, personal history, or sexual preference). These crimes also could entail sabotage of intellectual property, marketing, pricing, or personnel data or sabotage of operating systems and programs with the intent to impede a business or create chaos in...
Words: 803 - Pages: 4
...government and the community Surveys of households, businesses, offenders and victims Analysis of media reporting of crime Research methods Dissemination of findings • Reports, books, articles, conference papers, roundtables, online, media Cyber crime concepts Organised Crime e.g. OMCGs Identity Crime Cyber Crime e.g. off-line crimes e.g. ID theft Internet Crime e.g. Offensive Content Phishing Financial Crime e.g. Home renovation scams A chronology of cyber crime Cloud computing risks 2009 Wireless vulnerabilities 2007 M-commerce attacks 2006 Phishing 2002 Cyberstalking 1998 Cyberterrorism attacks 1997 Spam 1995 Identity crime 1995 Online piracy 1995 Botnets 1993 Child exploitation1990 ATM fraud 1985 Funds transfer fraud 1985 Extortion 1980 Denial of service 1980 Creeper virus 1971 Computer hacking 1970 Telemarketing scams 1965 Phreaking 1961 Organised...
Words: 1301 - Pages: 6
...Introduction Over the centuries, the term ‘identity theft’ has meant many things. People have pretended to be other when committing crimes to avoid sentencing. Identities have been stolen in order to obtain certain medical care or drugs that would be unavailable otherwise. In this day and age, identity theft has become synonymous with finances. Thieves all over the world are using various methods to gain access to your money; and they’re more successful at it now than ever before. According to a 2013 Javelin report, 13.1 million people in the United States suffered financially because of identity fraud. According to multiple reports, that number is expected to rise in 2014 and beyond. As we get smarter about how financial identity theft is committed, criminals become smarter about gaining our sensitive information. When we became good about shredding old credits cards and bank statements, they used e-mail and phone schemes to coax us into giving our information to them. Companies invest millions of dollars into new technologies meant to keep criminals out of databases, and criminals simply bypass these obstacles with combinations of cutting-edge and archaic techniques. It’s a vicious cycle that seems to have no end. So how can we as consumers protect ourselves from these identity thieves? Consumers must take a more active role in their financial lives, especially when it comes to online transactions. People often rely on stores and banks to protect their identities online...
Words: 4801 - Pages: 20
...Categories of Computer Crime CIS 170 Information Technology in Criminal Justice Dr. Johnson Strayer University February 5, 2014 The four common categories of computer crimes are: Computer as a target, Computers as an instrument crime, Computers as an incidental to a crime and Computers associated with the common occurrence of a computer. Cybercrime is criminal activity or crimes committed over the internet, through a computer system or though technology. Cybercrimes is also highly known around the world. Also these computer crimes are not authorized by the victim The four common categories of computer crimes are: 1. Computer as a target – Crimes in which the computer is the target in theft, intellectual property, theft of marketing information and blackmail from information gathered from another computer. Other things such as hacking into businesses, government or state information and creating false identities, stealing information or destroying their files which causes havoc. 2. Computers as an instrument of a crime – This doesn’t refer to stealing information rather it is the lawful possession of the item to infiltrate committing the crime. In this case it is the computer that is being used. 3. Computers as an incidental to a crime – The computer isn’t the direct crime being committed however, it is used to make the crime occur faster and to gather the information more quickly, this method makes it harder to trace. These crimes include money laundering...
Words: 1427 - Pages: 6
...holds a senior management position, was employed in the organization in excess of six years and, in committing the fraud, frequently acted in concert with others. Other findings, however, are different. This time, we have developed a series of themes in order to understand the changing relationship among the fraudster, his/ her environment and the frauds committed. And after taking into account the insights of our investigation leaders around the world, we conclude that the type of fraud and the type of fraudster are continually changing. “The intriguing thing about fraud is that it is always morphing, like a strain of flu; you can cure today’s strain, but next year it evolves into something as bad if not worse, ” says Phil Ostwalt, Global Coordinator for Investigations for the Global Forensic practice at KPMG. One major change is the growing use of technology by fraudsters, and not just in the technologically advanced countries, such as the US “a concern for all business is that we are about to see a new generation of people, able to use more technology and with access to much more information than past generations. All of which points to a new era for fraud and illegal activities, ” says Arturo del Castillo, Managing Director of Forensic, KPMG in Colombia. We believe that understanding this fluidity will enable organizations to protect themselves better against fraud and may improve their ability...
Words: 10259 - Pages: 42
... | |Mayor |Atlanta, Georgia 30303 |George Turner | | |(404) 817-6900 |Chief of Police | May 19, 2009 John Blasingame 2759 Engle Rd. NW Atlanta Ga. 30318 Atlanta Police Department Case #: To whom this may concern, The Zone-1 Investigations Unit has received the crime you reported to our agency. I have reviewed the incident as reported, but at this time there is not enough evidence to locate a suspect. There are a number of variables for the investigation of Fraud cases. These include, but are not limited to, jurisdiction over the crime, the identity and location of any suspects, the availability of any real leads in the case, the amount of actual loss, the location of the person and company suffering the actual loss. Although many citizens report that they have been the victims of a financial crime, the merchants or companies that are used in the crime are the ones who usually suffer the actual loss. This means that if a suspect passes a forged check or uses a stolen credit card, the account holder does not usually have to take a direct financial loss. The bank or the merchant where these items were used assumes the loss. Also the fact that you reside or work in Atlanta does not always mean that...
Words: 804 - Pages: 4