Exam 17: Fraud in E-Commerce
Exam 1: The Nature of Fraud57 Questions
Exam 2: Why People Commit Fraud56 Questions
Exam 3: Fighting Fraud: An Overview47 Questions
Exam 4: Preventing Fraud67 Questions
Exam 5: Recognizing the Symptoms of Fraud63 Questions
Exam 6: Data-Driven Fraud Detection55 Questions
Exam 7: Investigating Theft Acts40 Questions
Exam 8: Investigating Concealment26 Questions
Exam 9: Conversion Investigation Methods61 Questions
Exam 10: Inquiry Methods and Fraud Reports58 Questions
Exam 11: Financial Statement Fraud39 Questions
Exam 12: Revenue- and Inventory-Related Financial Statement Frauds46 Questions
Exam 13: Liability, Asset, and Inadequate Disclosure Frauds64 Questions
Exam 14: Fraud Against Organizations48 Questions
Exam 15: Consumer Fraud35 Questions
Exam 16: Bankruptcy, Divorce, and Tax Fraud57 Questions
Exam 17: Fraud in E-Commerce51 Questions
Exam 18: Legal Follow-Up59 Questions
Select questions type
Why must e-business organizations have proactive fraud prevention efforts in place?
Free
(Multiple Choice)
4.7/5
(39)
Correct Answer:
D
One of the greatest fallacies of e-commerce security is a prevention measure known as security through ___________.
Free
(Multiple Choice)
4.8/5
(49)
Correct Answer:
B
In traditional business, which of the following is not part of internal controls?
Free
(Multiple Choice)
4.9/5
(45)
Correct Answer:
D
All of the following are unique risks to e-commerce fraud except:
(Multiple Choice)
4.9/5
(41)
Which is not a method of preventing fraud through control activities
(Multiple Choice)
4.8/5
(33)
What is the primary electronic transaction and document control used in e-commerce?
(Multiple Choice)
4.8/5
(34)
When dealing with e-commerce fraud, the primary objective of fraudsters is to steal data. Which of the following is not a useful attribute (from the fraudsters' perspective) of data?
(Multiple Choice)
4.9/5
(43)
Which of the following are pressures commonly found in e-business?
(Multiple Choice)
4.9/5
(32)
___________ is defined by the book as "Changing the information in an email header or an IP address to hide identities".
(Multiple Choice)
4.8/5
(34)
In an electronic environment, no other control can better prevent fraud than the wise use of:
(Multiple Choice)
4.8/5
(33)
The process for detecting E-Business fraud is similar to detecting other types of fraud except:
(Multiple Choice)
4.8/5
(43)
Which of the following is not part of risk assessment in e-business?
(Multiple Choice)
4.9/5
(37)
___________ are self-contained programs that spread via direct transfer, email, or another mechanism.
(Multiple Choice)
4.8/5
(37)
Which elements of E-commerce are not risks unique to E-commerce?
(Multiple Choice)
4.8/5
(48)
Which of the following is not a risk associated with doing e-business?
(Multiple Choice)
4.8/5
(49)
According to the book, which 3 of the 5 traditional internal control elements are most important in ebusiness transactions?
(Multiple Choice)
4.9/5
(40)
Showing 1 - 20 of 51
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)