SlideShare a Scribd company logo
1 of 9
Scam, Fraud and
Phishing
Harsh Patel
Kush Patel
Shivang Goyal
Shubham Chaudhari
Yousuf Mohd Sayeed
Department Here
Problem Definition
Frauds, scams, and phishing are major threats
to individuals and organizations worldwide,
causing substantial financial losses and
reputational damage. These criminal activities
exploit vulnerabilities in the online world,
targeting unsuspecting victims who may not
have the necessary knowledge to protect
themselves. To address this problem,
awareness must be raised, and our group aims
to research strategies that can be used to
tackle this problem.
Concept Clarification
Scam, Fraud and Phishing
Scam:
• False promises, misinformation, and
psychological manipulation
• Fake websites, telemarketing calls
Fraud:
• Deception or misrepresentation
• Identity theft, credit card fraud
Phishing:
• Cyber criminals
• Fraudulent emails, text messages
Individuals
Businesses
Elderly People
Children/Teenager
Society as a whole
Scam, Fraud and Phishing
Impacted People
Motivation
Financial
gain
Revenge
Personal
Gain
Political
or social
Thrill-
seeking
Key Actors and activities that enable these criminal activities.
• Scammers/fraudsters (who initiate the fraudulent activity)
• Victims (who fall prey to the scam or fraud)
• Technology (provide the infrastructure that allows scammers to reach a wider
audience)
• Lack of awareness (it makes these things more vulnerable to falling victim to
scams and frauds.)
• Payment methods (it is an easy way for scammers to obtain money from their
victims)
Scam, Fraud and Phishing
Into the mind of scammer
• Prevent scams and be cautious
• Intervene by law enforcements to track down scammers,
identify their victims
• To help individuals rehabilitate and prevent recidivism.
Traits
• Rationalization
• Empathy deficit
• Narcissism
• Skilful manipulation
Root Causes
• Technology is constantly evolving
• Where are we going wrong?
PSYCHOLOGY OF VICTIMS
Why is it important?
• Scammer detection
• Prevention
• Law enforcement
• Recovery
Desperation Trust
Over
confidence
Cognitive bias
Fear of
missing
out
Greed
Our Role as Engineering
Leaders
• Character- Desire to innovate and solve
societal problems in ethical and responsible
ways.
• Vision- Providing Platform and Creating
Awareness around the world and starting
from the Leaders itself!
• Competency- Knowledge and skills to
identify scams. Staying informed about the
tactics and train our teams to do the same.
• Involvement and Collaboration- Creating a
culture of vigilance, and providing necessary
support by collaborating with other experts
and stakeholders

More Related Content

Similar to Frauds, Scams and Phishing.pptx Engineering Leadership

Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Alexandre Sieira
 
Managing Fraud and Corruption in Projects
Managing Fraud and Corruption in ProjectsManaging Fraud and Corruption in Projects
Managing Fraud and Corruption in ProjectsPLAcademy
 
Bucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in DigitalBucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in DigitalEric Bozinny
 
Madoff Rotary Presentation Apr23
Madoff Rotary Presentation Apr23Madoff Rotary Presentation Apr23
Madoff Rotary Presentation Apr23MikeBnntt
 
Role of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionRole of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionZeeshan Shahid
 
CYBER ATTACK SCENARIOS - Part 1: Building The Red Team
CYBER ATTACK SCENARIOS - Part 1: Building The Red TeamCYBER ATTACK SCENARIOS - Part 1: Building The Red Team
CYBER ATTACK SCENARIOS - Part 1: Building The Red TeamUniversity of Hertfordshire
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageSara-Jayne Terp
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...Sara-Jayne Terp
 
Investment Alert: Affinity Fraud Explained By Money 2.0 Conference
Investment Alert: Affinity Fraud Explained By Money 2.0 ConferenceInvestment Alert: Affinity Fraud Explained By Money 2.0 Conference
Investment Alert: Affinity Fraud Explained By Money 2.0 ConferenceMoney 2Conf
 
ISM ppt October 2014_final
ISM ppt October 2014_finalISM ppt October 2014_final
ISM ppt October 2014_finalAudrius Sapola
 
03 Member Spotlight (Virgin Media)
03   Member Spotlight (Virgin Media)03   Member Spotlight (Virgin Media)
03 Member Spotlight (Virgin Media)#TheFraudTube
 
Digital Advocacy: Using Social Media to Mobilize your Audience
Digital Advocacy: Using Social Media to Mobilize your AudienceDigital Advocacy: Using Social Media to Mobilize your Audience
Digital Advocacy: Using Social Media to Mobilize your Audienceamplifi advoc8tor
 
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2Conf
 
How To Structure An Analytical Essay. MyEssay
How To Structure An Analytical Essay. MyEssayHow To Structure An Analytical Essay. MyEssay
How To Structure An Analytical Essay. MyEssayShannon Joy
 
Elder Investment Fraud & Financial Exploitation
Elder Investment Fraud & Financial ExploitationElder Investment Fraud & Financial Exploitation
Elder Investment Fraud & Financial ExploitationOKSecurities
 
Houston Johnson - Preventing Undercover Employment Operations
Houston Johnson - Preventing Undercover Employment OperationsHouston Johnson - Preventing Undercover Employment Operations
Houston Johnson - Preventing Undercover Employment OperationsJohn Blue
 

Similar to Frauds, Scams and Phishing.pptx Engineering Leadership (20)

Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Managing Fraud and Corruption in Projects
Managing Fraud and Corruption in ProjectsManaging Fraud and Corruption in Projects
Managing Fraud and Corruption in Projects
 
Bucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in DigitalBucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in Digital
 
Madoff Rotary Presentation Apr23
Madoff Rotary Presentation Apr23Madoff Rotary Presentation Apr23
Madoff Rotary Presentation Apr23
 
Role of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionRole of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detection
 
CYBER ATTACK SCENARIOS - Part 1: Building The Red Team
CYBER ATTACK SCENARIOS - Part 1: Building The Red TeamCYBER ATTACK SCENARIOS - Part 1: Building The Red Team
CYBER ATTACK SCENARIOS - Part 1: Building The Red Team
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
 
Investment Alert: Affinity Fraud Explained By Money 2.0 Conference
Investment Alert: Affinity Fraud Explained By Money 2.0 ConferenceInvestment Alert: Affinity Fraud Explained By Money 2.0 Conference
Investment Alert: Affinity Fraud Explained By Money 2.0 Conference
 
ISM ppt October 2014_final
ISM ppt October 2014_finalISM ppt October 2014_final
ISM ppt October 2014_final
 
03 Member Spotlight (Virgin Media)
03   Member Spotlight (Virgin Media)03   Member Spotlight (Virgin Media)
03 Member Spotlight (Virgin Media)
 
Digital Advocacy: Using Social Media to Mobilize your Audience
Digital Advocacy: Using Social Media to Mobilize your AudienceDigital Advocacy: Using Social Media to Mobilize your Audience
Digital Advocacy: Using Social Media to Mobilize your Audience
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
 
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
 
How To Structure An Analytical Essay. MyEssay
How To Structure An Analytical Essay. MyEssayHow To Structure An Analytical Essay. MyEssay
How To Structure An Analytical Essay. MyEssay
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
 
Elder Investment Fraud & Financial Exploitation
Elder Investment Fraud & Financial ExploitationElder Investment Fraud & Financial Exploitation
Elder Investment Fraud & Financial Exploitation
 
2013-05-07 Nonprofit Fraud: Part II
2013-05-07 Nonprofit Fraud: Part II2013-05-07 Nonprofit Fraud: Part II
2013-05-07 Nonprofit Fraud: Part II
 
Houston Johnson - Preventing Undercover Employment Operations
Houston Johnson - Preventing Undercover Employment OperationsHouston Johnson - Preventing Undercover Employment Operations
Houston Johnson - Preventing Undercover Employment Operations
 
Fraud prevention
Fraud preventionFraud prevention
Fraud prevention
 

Recently uploaded

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

Frauds, Scams and Phishing.pptx Engineering Leadership

  • 1.
  • 2. Scam, Fraud and Phishing Harsh Patel Kush Patel Shivang Goyal Shubham Chaudhari Yousuf Mohd Sayeed Department Here
  • 3. Problem Definition Frauds, scams, and phishing are major threats to individuals and organizations worldwide, causing substantial financial losses and reputational damage. These criminal activities exploit vulnerabilities in the online world, targeting unsuspecting victims who may not have the necessary knowledge to protect themselves. To address this problem, awareness must be raised, and our group aims to research strategies that can be used to tackle this problem.
  • 4. Concept Clarification Scam, Fraud and Phishing Scam: • False promises, misinformation, and psychological manipulation • Fake websites, telemarketing calls Fraud: • Deception or misrepresentation • Identity theft, credit card fraud Phishing: • Cyber criminals • Fraudulent emails, text messages
  • 5. Individuals Businesses Elderly People Children/Teenager Society as a whole Scam, Fraud and Phishing Impacted People Motivation Financial gain Revenge Personal Gain Political or social Thrill- seeking
  • 6. Key Actors and activities that enable these criminal activities. • Scammers/fraudsters (who initiate the fraudulent activity) • Victims (who fall prey to the scam or fraud) • Technology (provide the infrastructure that allows scammers to reach a wider audience) • Lack of awareness (it makes these things more vulnerable to falling victim to scams and frauds.) • Payment methods (it is an easy way for scammers to obtain money from their victims) Scam, Fraud and Phishing
  • 7. Into the mind of scammer • Prevent scams and be cautious • Intervene by law enforcements to track down scammers, identify their victims • To help individuals rehabilitate and prevent recidivism. Traits • Rationalization • Empathy deficit • Narcissism • Skilful manipulation Root Causes • Technology is constantly evolving • Where are we going wrong?
  • 8. PSYCHOLOGY OF VICTIMS Why is it important? • Scammer detection • Prevention • Law enforcement • Recovery Desperation Trust Over confidence Cognitive bias Fear of missing out Greed
  • 9. Our Role as Engineering Leaders • Character- Desire to innovate and solve societal problems in ethical and responsible ways. • Vision- Providing Platform and Creating Awareness around the world and starting from the Leaders itself! • Competency- Knowledge and skills to identify scams. Staying informed about the tactics and train our teams to do the same. • Involvement and Collaboration- Creating a culture of vigilance, and providing necessary support by collaborating with other experts and stakeholders