TITLE

How Data-Sharing Can Keep Fraud from Spreading

AUTHOR(S)
Crosman, Penny
PUB. DATE
March 2014
SOURCE
American Banker;3/25/2014, Vol. 179 Issue 46, p11
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses banking industry efforts to combat fraud, focusing on the role of sharing information as a preventative strategy. Topics include cooperation between bank departments such as those responsible for tracking different aspects of suspicious activity, the suggested advantage of working more closely with other banks and third-party partners, and the efforts of organizations such as the U.S. National Cyber-Forensics & Training Alliance (NCFTA).
ACCESSION #
95117354

 

Related Articles

  • Computer Intrusion Investigation Guidelines. Davis, J. Bryan // FBI Law Enforcement Bulletin;Jan2001, Vol. 70 Issue 1, p8 

    Presents condensed version of the United States Department of Defense's `Defense Criminal Investigative Service Computer Intrusion Investigation Guidelines.' Reasons for hacking computers; Investigative techniques for tracking the hacker; 12 steps involved in the initial phases of a computer...

  • Cyber Crime Doesn't Pay. Abramovitz, Melissa // Boys' Life;Dec99, Vol. 89 Issue 12, p12 

    Presents information on the way to detect computer crimes.

  • Bangladesh police launch mega cyber theft probe.  // South Asian Post;3/24/2016, pSP12 

    No abstract available.

  • The Internet's heart of glass. Cosh, Colby // Report / Newsmagazine (National Edition);02/19/2001, Vol. 28 Issue 4, p28 

    Reports on the capture of a teenage computer hacker responsible for denial-of-service attacks on the Internet. How the hacker, known only as Mafiaboy because his identity is protected, perpetrated what is thought to be the most expensive act of computer vandalism in history; Details of how an...

  • The Internet's heart of glass. Cosh, Colby // Report / Newsmagazine (BC Edition);02/19/2001, Vol. 28 Issue 4, p28 

    Reports on the capture of a teenage computer hacker responsible for denial-of-service attacks on the Internet. How the hacker, known only as Mafiaboy because his identity is protected, perpetrated what is thought to be the most expensive act of computer vandalism in history; Details of how an...

  • The Internet's heart of glass. Cosh, Colby // Report / Newsmagazine (Alberta Edition);02/19/2001, Vol. 28 Issue 4, p28 

    Reports on the capture of a teenage computer hacker responsible for denial-of-service attacks on the Internet. How the hacker, known only as Mafiaboy because his identity is protected, perpetrated what is thought to be the most expensive act of computer vandalism in history; Details of how an...

  • Hack attacks: Victimless crimes? Bowes, Chris // Bulletin with Newsweek;01/13/98, Vol. 116 Issue 6105, p46 

    Focuses on computer or Internet related crimes occurring in Australia. Impact of cyber-related crimes; Survey of organizations reporting unauthorized use of computers; Typical computer crimes; Use of customer databases, altered records, and unauthorized access; Surveys conducted by the...

  • Young Cyber-Sleuths. McKay, Jim // Government Technology;May2006, Vol. 19 Issue 5, p30 

    The article focuses on the CyberScience Laboratory (CSL) that offers training for state and local law enforcement agencies in the U.S. for cyber-crime investigation and technological assistance. The laboratory was established by the Office of Science and Technology of the National Institute of...

  • Cyber Extortion Targets Office Workers. Swartz, Nikki // Information Management Journal;Mar/Apr2004, Vol. 38 Issue 2, p12 

    Reports on the use of email by con artists to extort money from employees with a personal computer in Europe. Background on the extortion process used by the criminals; Warning issued by British detectives against cooperating with the criminals; Benefits of a methodology developed by the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics