Online Shopping Frauds
DOI:
https://doi.org/10.61841/n1dhjh61Keywords:
Cash on delivery, Customer, Frauds, Online Shopping, SellerAbstract
CNP fraud or online shopping fraud is when a suspect enables fraudulent payment details or fraudulently acquired card cards to make online retail purchases without the consent of the account owner. Transaction scam is any type of fake or unlawful transaction by cybercriminal. The offender uses the Internet to deprive the victim of resources, personal property, interest or confidential information. Payment fraud is defined in three ways: loans that are illegal or not authorized. Missing merchandise, or robbed. The Ministry of Commerce and Industry has stated that online retail fraud has resulted in 13,873 cases since July 2016. The government has stated there is a database and a website for customers to send their concerns regarding online shopping scams. It is stated by the federal trade commission the steps that the consumer needs to follow when one opts for online shopping are getting details about the product one is buying, know about the cost of the product, beware of fake reviews etc. This paper reveals about online shopping frauds, how to identify fraudulent, how to report frauds.
Downloads
References
[1] D. M. S. J. D. J. S. Nath, “Credit Card Fraud Detection Using Neural Network,” Int. J. Soft Comput. Eng., 2014.
[2] K. Kim, Y. Choi, and J. Park, “Pricing fraud detection in online shopping malls using a finite mixture model,” Electron. Commer. Res. Appl., 2013.
[3] C. V. Amasiatu and M. H. Shah, “First party fraud: A review of the forms and motives of fraudulent consumer behaviours in e-tailing,” Int. J. Retail Distrib. Manag., 2014.
[4] K. Yoshida, K. Tsuda, S. Kurahashi, and H. Azuma, “Online Shopping Frauds Detecting System and Its Evaluation,” in Proceedings -International Computer Software and Applications Conference, 2017.
[5] M. Levi, “Assessing the trends, scale and nature of economic cybercrimes: overview and Issues: In Cybercrimes, Cybercriminals and Their Policing, in Crime, Law and Social Change,” Crime, Law Soc. Chang., 2017.
[6] S. Verma, A. Singh, D. Singh, and V. Laxmi, “Computer forensics in IT audit and credit card fraud investigation - For USB devices,” in 2014 International Conference on Computing for Sustainable Global Development, INDIACom 2014, 2014.
[7] M. Cremonini, C. Braghin, and C. Agostino Ardagna, “Privacy on the Internet,” in Computer and Information Security Handbook, 2013.
[8] R. Shafei, “Effect of customers’ emotions on perceived damage of the probability of fraud in online shopping,” Int. J. Inf. Sci. Manag., 2013.
[9] K. Prathyusha, T. Anuradha, R. Sai, and N. K. Meghana, “Detecting Frauds In Online Auction System,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., 2013.
[10] SandeepPratap Singh, S. S. P.Shukla, N. Rakesh, and Vipin Tyagi, “Problem Reduction in Online Payment System Using Hybrid Model,” Int. J. Manag. Inf. Technol., 2011.
[11] K. Yoshida, “Mining Online Shopping Frauds—A Non-Data Mining Approach,” Int. J. e-Education, eBusiness, e-Management e-Learning, 2013.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.