Evolution of the Fraudster

Lazarus, Mike
August 2005
Credit Control;2005, Vol. 26 Issue 8, p56
Trade Publication
The article presents tips for banks and other financial institutions on developing an anti-fraud strategy in Great Britain. They need to expand their field of vision across accounts and lines of business. Banks need a modular fraud infrastructure since Internet communications enable new fraud schemes to bloom rapidly.


Related Articles

  • Budgets Inch Up. Malakian, Anthony // Bank Technology News;Sep2008, Vol. 21 Issue 9, p18 

    The article focuses on the escalation of the bank spending budget for the 2008 fraud prevention. It mentions that fraud detection for money transfer and an AML system, and fraud detection for online banking are the top priorities for bank spending. Furthermore, the financial institutions will...

  • How to Make Fraud Prevention Cost-Effective. Trachtman, Jeff // American Banker;2/9/2007, Vol. 172 Issue 28, p10 

    This article discusses cost-effective methods of fraud prevention. Since 2005, fraud issues have taken center stage in the debit industry. Financial institutions have become increasingly sensitive to fraud, pouring money into detection and analysis tools to protect themselves from future losses....

  • Getting "front and center" on security policies. Bielski, Lauren // ABA Banking Journal;Mar2005, Vol. 97 Issue 3, p57 

    Provides information on the security policies of banks in the U.S. Importance of security policies to the financial service industry; Development of advanced computer security programs for banks and other financial institutions by various security technology developers; Views from several...

  • Bid Farewell to Your Mother's Maiden Name. Hunt, Ken // Bank Technology News;Jun2006 Supplement, Vol. 19, p32 

    The article discusses the recommendation given by the U.S. Federal Deposit and Insurance Corp. (FDIC) to enhance information security for the financial services industry. The FDIC has recommended that banks and financial institutions should adopt strong, two-factor authentication for online...

  • Can your business protect the data it collects? LeDuc, Susan N. // New Hampshire Business Review;6/24/2005, Vol. 27 Issue 13, p31 

    The article presents instructions to protect data in various firms. Every business collects information about its customers. Every business also transfers payment information through the financial system to collect payment. Every business that is not paid solely in cash must use other vendors to...

  • Alternative Lenders Brace for More Oversight. Reosti, John // American Banker;2/25/2015, Vol. 180 Issue 29, p1 

    The article discusses nonbank or alternative small-business lenders' preparation for more oversight from U.S. financial services industry regulators. Topics covered include increased vulnerability to fraud due to a heavy reliance on data, the need for nonbank lenders to start policing...

  • Thumbprint Signature Program helps stop bank fraud.  // Illinois Banker;Nov2007, Vol. 92 Issue 11, p31 

    The article focuses on the Thumbprint Signature Program provided by the Illinois Association to the financial institutions to stop bank fraud in Illinois. According to the author, the program is very simple that it only requires a thumbprint on the face of the check. He added that the program is...

  • COMPETITIVE ADVANTAGE in Financial Services. Fisher, James // Database Trends & Applications;Apr/May2014, Vol. 28 Issue 2, p28 

    The article focuses on issues concerning the use of predictive analytics in financial services organizations. Topics discussed include competitive advantage and the use of predictive analytics technology to detect bank fraud, to minimize risk, and to provide a better customer experience. Other...

  • Combat Fraud With Flexible Strategies. Orad, Amir // American Banker;12/1/2010, Vol. 175 Issue 184, p9 

    The author offers opinions on computer crimes and their prevention by the financial services industry. It is argued that the increased sophistication and scope of computer hacking and computer fraud means that banks must employ the same technology to develop consumer behavior profiles of their...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics