Online Fraud Types and Open-Source Online Fraud Prevention Tools– An Analysis
S. Vijayarani1 , R. Janani2
- Department of Computer Science, Bharathiar University, Coimbatore, India.
- Department of Computer Science, Bharathiar University, Coimbatore, India.
Section:Survey Paper, Product Type: Journal Paper
Volume-10 ,
Issue-11 , Page no. 16-19, Nov-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i11.1619
Online published on Nov 30, 2022
Copyright © S. Vijayarani, R. Janani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: S. Vijayarani, R. Janani, “Online Fraud Types and Open-Source Online Fraud Prevention Tools– An Analysis,” International Journal of Computer Sciences and Engineering, Vol.10, Issue.11, pp.16-19, 2022.
MLA Style Citation: S. Vijayarani, R. Janani "Online Fraud Types and Open-Source Online Fraud Prevention Tools– An Analysis." International Journal of Computer Sciences and Engineering 10.11 (2022): 16-19.
APA Style Citation: S. Vijayarani, R. Janani, (2022). Online Fraud Types and Open-Source Online Fraud Prevention Tools– An Analysis. International Journal of Computer Sciences and Engineering, 10(11), 16-19.
BibTex Style Citation:
@article{Vijayarani_2022,
author = {S. Vijayarani, R. Janani},
title = {Online Fraud Types and Open-Source Online Fraud Prevention Tools– An Analysis},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2022},
volume = {10},
Issue = {11},
month = {11},
year = {2022},
issn = {2347-2693},
pages = {16-19},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5527},
doi = {https://doi.org/10.26438/ijcse/v10i11.1619}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v10i11.1619}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5527
TI - Online Fraud Types and Open-Source Online Fraud Prevention Tools– An Analysis
T2 - International Journal of Computer Sciences and Engineering
AU - S. Vijayarani, R. Janani
PY - 2022
DA - 2022/11/30
PB - IJCSE, Indore, INDIA
SP - 16-19
IS - 11
VL - 10
SN - 2347-2693
ER -
VIEWS | XML | |
213 | 314 downloads | 132 downloads |
Abstract
The evolution of the world economy has been very high with the proliferation of new technology and universal communication super highways. Nonetheless, one of the unintended consequences of online or the internet is its use for illegal activities. Increasing social crime has become a global problem, and the activity of international criminal organizations has been steeply increased. Online fraudulent usually denotes to any form of fraud mechanism that uses the internet`s one or more components, such as emails, websites, web portals, etc. Nowadays, many tools are available to prevent the users from online fraudulent. The main aim of this paper to discuss the types of online fraud and tools to prevent those fraud activities.
Key-Words / Index Term
Fraudulent Types, Spam, Scam, Phishing, Identity Theft, Spyware, Tools
References
[1]. Hussein, Mohammed Juned, et al. "An evaluation of online proctoring tools." Open Praxis Vol.12, Issue.4, pp.509-525, 2020.
[2]. Wang, Shun-Yung Kevin, and Wilson Huang. "The evolutional view of the types of identity thefts and online frauds in the era of the Internet." Internet Journal of Criminology, Vol.12, pp.1 -21, 2011.
[3]. Koong, Kai S., Lai C. Liu, and June Wei. "An examination of Internet fraud occurrences." pp.441 – 449, 2012.
[4]. Apte, Manoj, Girish Keshav Palshikar, and Sriram Baskaran. "Frauds in online social networks: A review." Social networks and surveillance for society, pp.1–18, 2019.
[5]. Chen, Juan, and Chuanxiong Guo. "Online detection and prevention of phishing attacks." 2006 First International Conference on Communications and Networking in China. IEEE, pp.1-7, 2006.
[6]. Lai, Albert M., and Jason Nieh. "On the performance of wide-area thin-client computing." ACM Transactions on Computer Systems (TOCS), Vol.24, Issue.2, pp.175-209, 2006.
[7]. Alkhalil, Zainab, et al. "Phishing attacks: A recent comprehensive study and a new anatomy." Frontiers in Computer Science, Vol.3, pp.1-23, 2021.
[8]. Varshney, Gaurav, Manoj Misra, and Pradeep K. Atrey. "A survey and classification of web phishing detection schemes." Security and Communication Networks, Vol.9, Issue.18, pp. 6266-6284, 2016.
[9]. Srii Srinivasan, “A Merchant`s Guide to Online Fraud Detection”, 2022.
[10]. El Aassal, Ayman, and Rakesh Verma. "Spears Against Shields: Are Defenders Winning the Phishing War?" Proceedings of the ACM International Workshop on Security and Privacy Analytics, pp.15 – 24, 2019.
[11]. Ross, Philip E. "Microsoft to spammers: go phish [e-mail security]." IEEE Spectrum, Vol.43, Issue.1, pp.48-49, 2006.
[12]. Sonowal, Gunikhan. "Phishing Kits." Phishing and Communication Channels. Apress, Berkeley, CA, pp.115-135, 2022.
[13]. Martínez, Jeferson, and Javier M. Durán. "Software supply chain attacks, a threat to global cybersecurity: SolarWinds’ case study." International Journal of Safety and Security Engineering, Vol.11, Issue.5, pp.537-545, 2021.
[14]. Sahoo Anmol, Sahoo Aradhana, Prasad Srinivas, “ Enterprise Security Management(E-SRM)”, Indian Journals.com, Vol.10, Issue.1, 2012.
[15]. do Produto, Manual. "Norton™ AntiVirus.", 2013.
[16]. Kline, Jeffrey S. "McAfee Associates, Inc. Competitive Strategies for the Computer AntiVirus Industry."
[17]. Garba, Faisal A., et al. "Evaluating the state-of-the-art antivirus evasion tools on windows and android platform." 2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf). IEEE, pp.1-4, 2019.
[18]. Pavel, Cosmin. "Bitdefender®, the award-winning provider of innovative antivirus solutions." Romanian Distribution Committee Magazine 4.1: 20-24, 2013.