SlideShare a Scribd company logo
1 of 9
Scam, Fraud and
Phishing
Harsh Patel
Kush Patel
Shivang Goyal
Shubham Chaudhari
Yousuf Mohd Sayeed
Department Here
Problem Definition
Frauds, scams, and phishing are major threats
to individuals and organizations worldwide,
causing substantial financial losses and
reputational damage. These criminal activities
exploit vulnerabilities in the online world,
targeting unsuspecting victims who may not
have the necessary knowledge to protect
themselves. To address this problem,
awareness must be raised, and our group aims
to research strategies that can be used to
tackle this problem.
Concept Clarification
Scam, Fraud and Phishing
Scam:
• False promises, misinformation, and
psychological manipulation
• Fake websites, telemarketing calls
Fraud:
• Deception or misrepresentation
• Identity theft, credit card fraud
Phishing:
• Cyber criminals
• Fraudulent emails, text messages
Individuals
Businesses
Elderly People
Children/Teenager
Society as a whole
Scam, Fraud and Phishing
Impacted People
Motivation
Financial
gain
Revenge
Personal
Gain
Political
or social
Thrill-
seeking
Key Actors and activities that enable these criminal activities.
• Scammers/fraudsters (who initiate the fraudulent activity)
• Victims (who fall prey to the scam or fraud)
• Technology (provide the infrastructure that allows scammers to reach a wider
audience)
• Lack of awareness (it makes these things more vulnerable to falling victim to
scams and frauds.)
• Payment methods (it is an easy way for scammers to obtain money from their
victims)
Scam, Fraud and Phishing
Into the mind of scammer
• Prevent scams and be cautious
• Intervene by law enforcements to track down scammers,
identify their victims
• To help individuals rehabilitate and prevent recidivism.
Traits
• Rationalization
• Empathy deficit
• Narcissism
• Skilful manipulation
Root Causes
• Technology is constantly evolving
• Where are we going wrong?
PSYCHOLOGY OF VICTIMS
Why is it important?
• Scammer detection
• Prevention
• Law enforcement
• Recovery
Desperation Trust
Over
confidence
Cognitive bias
Fear of
missing
out
Greed
Our Role as Engineering
Leaders
• Character- Desire to innovate and solve
societal problems in ethical and responsible
ways.
• Vision- Providing Platform and Creating
Awareness around the world and starting
from the Leaders itself!
• Competency- Knowledge and skills to
identify scams. Staying informed about the
tactics and train our teams to do the same.
• Involvement and Collaboration- Creating a
culture of vigilance, and providing necessary
support by collaborating with other experts
and stakeholders

More Related Content

Similar to Frauds, Scams and Phishing.pptx Engineering Leadership

Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Alexandre Sieira
 
Managing Fraud and Corruption in Projects
Managing Fraud and Corruption in ProjectsManaging Fraud and Corruption in Projects
Managing Fraud and Corruption in ProjectsPLAcademy
 
Bucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in DigitalBucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in DigitalEric Bozinny
 
Madoff Rotary Presentation Apr23
Madoff Rotary Presentation Apr23Madoff Rotary Presentation Apr23
Madoff Rotary Presentation Apr23MikeBnntt
 
Role of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionRole of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionZeeshan Shahid
 
CYBER ATTACK SCENARIOS - Part 1: Building The Red Team
CYBER ATTACK SCENARIOS - Part 1: Building The Red TeamCYBER ATTACK SCENARIOS - Part 1: Building The Red Team
CYBER ATTACK SCENARIOS - Part 1: Building The Red TeamUniversity of Hertfordshire
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageSara-Jayne Terp
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...Sara-Jayne Terp
 
Investment Alert: Affinity Fraud Explained By Money 2.0 Conference
Investment Alert: Affinity Fraud Explained By Money 2.0 ConferenceInvestment Alert: Affinity Fraud Explained By Money 2.0 Conference
Investment Alert: Affinity Fraud Explained By Money 2.0 ConferenceMoney 2Conf
 
ISM ppt October 2014_final
ISM ppt October 2014_finalISM ppt October 2014_final
ISM ppt October 2014_finalAudrius Sapola
 
03 Member Spotlight (Virgin Media)
03   Member Spotlight (Virgin Media)03   Member Spotlight (Virgin Media)
03 Member Spotlight (Virgin Media)#TheFraudTube
 
Digital Advocacy: Using Social Media to Mobilize your Audience
Digital Advocacy: Using Social Media to Mobilize your AudienceDigital Advocacy: Using Social Media to Mobilize your Audience
Digital Advocacy: Using Social Media to Mobilize your Audienceamplifi advoc8tor
 
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2Conf
 
How To Structure An Analytical Essay. MyEssay
How To Structure An Analytical Essay. MyEssayHow To Structure An Analytical Essay. MyEssay
How To Structure An Analytical Essay. MyEssayShannon Joy
 
Elder Investment Fraud & Financial Exploitation
Elder Investment Fraud & Financial ExploitationElder Investment Fraud & Financial Exploitation
Elder Investment Fraud & Financial ExploitationOKSecurities
 
Houston Johnson - Preventing Undercover Employment Operations
Houston Johnson - Preventing Undercover Employment OperationsHouston Johnson - Preventing Undercover Employment Operations
Houston Johnson - Preventing Undercover Employment OperationsJohn Blue
 

Similar to Frauds, Scams and Phishing.pptx Engineering Leadership (20)

Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Managing Fraud and Corruption in Projects
Managing Fraud and Corruption in ProjectsManaging Fraud and Corruption in Projects
Managing Fraud and Corruption in Projects
 
Bucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in DigitalBucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in Digital
 
Madoff Rotary Presentation Apr23
Madoff Rotary Presentation Apr23Madoff Rotary Presentation Apr23
Madoff Rotary Presentation Apr23
 
Role of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionRole of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detection
 
CYBER ATTACK SCENARIOS - Part 1: Building The Red Team
CYBER ATTACK SCENARIOS - Part 1: Building The Red TeamCYBER ATTACK SCENARIOS - Part 1: Building The Red Team
CYBER ATTACK SCENARIOS - Part 1: Building The Red Team
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
 
Investment Alert: Affinity Fraud Explained By Money 2.0 Conference
Investment Alert: Affinity Fraud Explained By Money 2.0 ConferenceInvestment Alert: Affinity Fraud Explained By Money 2.0 Conference
Investment Alert: Affinity Fraud Explained By Money 2.0 Conference
 
ISM ppt October 2014_final
ISM ppt October 2014_finalISM ppt October 2014_final
ISM ppt October 2014_final
 
03 Member Spotlight (Virgin Media)
03   Member Spotlight (Virgin Media)03   Member Spotlight (Virgin Media)
03 Member Spotlight (Virgin Media)
 
Digital Advocacy: Using Social Media to Mobilize your Audience
Digital Advocacy: Using Social Media to Mobilize your AudienceDigital Advocacy: Using Social Media to Mobilize your Audience
Digital Advocacy: Using Social Media to Mobilize your Audience
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
 
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
 
How To Structure An Analytical Essay. MyEssay
How To Structure An Analytical Essay. MyEssayHow To Structure An Analytical Essay. MyEssay
How To Structure An Analytical Essay. MyEssay
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
 
Elder Investment Fraud & Financial Exploitation
Elder Investment Fraud & Financial ExploitationElder Investment Fraud & Financial Exploitation
Elder Investment Fraud & Financial Exploitation
 
2013-05-07 Nonprofit Fraud: Part II
2013-05-07 Nonprofit Fraud: Part II2013-05-07 Nonprofit Fraud: Part II
2013-05-07 Nonprofit Fraud: Part II
 
Houston Johnson - Preventing Undercover Employment Operations
Houston Johnson - Preventing Undercover Employment OperationsHouston Johnson - Preventing Undercover Employment Operations
Houston Johnson - Preventing Undercover Employment Operations
 
Fraud prevention
Fraud preventionFraud prevention
Fraud prevention
 

Recently uploaded

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 

Recently uploaded (20)

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 

Frauds, Scams and Phishing.pptx Engineering Leadership

  • 1.
  • 2. Scam, Fraud and Phishing Harsh Patel Kush Patel Shivang Goyal Shubham Chaudhari Yousuf Mohd Sayeed Department Here
  • 3. Problem Definition Frauds, scams, and phishing are major threats to individuals and organizations worldwide, causing substantial financial losses and reputational damage. These criminal activities exploit vulnerabilities in the online world, targeting unsuspecting victims who may not have the necessary knowledge to protect themselves. To address this problem, awareness must be raised, and our group aims to research strategies that can be used to tackle this problem.
  • 4. Concept Clarification Scam, Fraud and Phishing Scam: • False promises, misinformation, and psychological manipulation • Fake websites, telemarketing calls Fraud: • Deception or misrepresentation • Identity theft, credit card fraud Phishing: • Cyber criminals • Fraudulent emails, text messages
  • 5. Individuals Businesses Elderly People Children/Teenager Society as a whole Scam, Fraud and Phishing Impacted People Motivation Financial gain Revenge Personal Gain Political or social Thrill- seeking
  • 6. Key Actors and activities that enable these criminal activities. • Scammers/fraudsters (who initiate the fraudulent activity) • Victims (who fall prey to the scam or fraud) • Technology (provide the infrastructure that allows scammers to reach a wider audience) • Lack of awareness (it makes these things more vulnerable to falling victim to scams and frauds.) • Payment methods (it is an easy way for scammers to obtain money from their victims) Scam, Fraud and Phishing
  • 7. Into the mind of scammer • Prevent scams and be cautious • Intervene by law enforcements to track down scammers, identify their victims • To help individuals rehabilitate and prevent recidivism. Traits • Rationalization • Empathy deficit • Narcissism • Skilful manipulation Root Causes • Technology is constantly evolving • Where are we going wrong?
  • 8. PSYCHOLOGY OF VICTIMS Why is it important? • Scammer detection • Prevention • Law enforcement • Recovery Desperation Trust Over confidence Cognitive bias Fear of missing out Greed
  • 9. Our Role as Engineering Leaders • Character- Desire to innovate and solve societal problems in ethical and responsible ways. • Vision- Providing Platform and Creating Awareness around the world and starting from the Leaders itself! • Competency- Knowledge and skills to identify scams. Staying informed about the tactics and train our teams to do the same. • Involvement and Collaboration- Creating a culture of vigilance, and providing necessary support by collaborating with other experts and stakeholders