2020
DOI: 10.1108/jfc-02-2020-0026
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting trust for financial gain: an overview of business email compromise (BEC) fraud

Abstract: Purpose This paper aims to explore current knowledge of business email compromise (BEC) fraud, or approaches that specifically target organisations for financial gain, through the exploitation of trusted relationships. BEC fraud affects organisations globally and is estimated to have netted offenders over US$26bn since 2016. Despite the sheer magnitude of these losses, there is a dearth of academic research seeking to better understand this crime type, and prevent it from occurring. Design/methodology/approa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
14
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(18 citation statements)
references
References 30 publications
2
14
0
2
Order By: Relevance
“…Flexibility in building deep learning models by adding new features, such as neural layers, connections and objective functions, provides plenty of room to explore in this direction. Another future research direction is Deepfake [87], a synthetic content generation technology based on generative deep learning [88], that has recently made it possible to manipulate financial markets by digital impersonation [89], [90]. Detection of deepfakes is a technical challenge [87].…”
Section: Discussionmentioning
confidence: 99%
“…Flexibility in building deep learning models by adding new features, such as neural layers, connections and objective functions, provides plenty of room to explore in this direction. Another future research direction is Deepfake [87], a synthetic content generation technology based on generative deep learning [88], that has recently made it possible to manipulate financial markets by digital impersonation [89], [90]. Detection of deepfakes is a technical challenge [87].…”
Section: Discussionmentioning
confidence: 99%
“…Perpetrators' tactics are dubiously effective, and the financial losses sustained by businesses can be crippling. According to the information presented in this analysis, there is a global upsurge of fraud victimization and losses associated with fraud Internet Crime Complaint Centre (ICCC) and BEC fraud seem to be adopting that trend ( Cross & Gillett, 2020 ).…”
Section: Future Projectionsmentioning
confidence: 99%
“…Business Email Compromise (BEC) threats are one of the most financially devastating types of cybercrime ( Greathorn.com, 2021 , Cross and Gillett, 2020 , Cross and Kelly, 2016 ). They often use social engineering strategies and phishing emails to infiltrate organizations and fool unwary employees and executives into performing tasks that appear to come from a trustworthy sender, frequently posing as legitimate business activities.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Bilgisayarlarında yapılan incelemede 50'ye yakın dolandırıcılık bulgusuna ulaşılır. 2 BEC dolandırıcılığı açısından, hem şirketler hem de bireyler hakkında kamuya açık bilgilerin mevcudiyeti, motive olmuş bir suçlu için çok sayıda potansiyel hedef sağlamaktadır(Cross ve Gillett, 2020).3 Bu örnek Barış Terkoğlu tarafından 30 Ocak 2020 tarihli Cumhuriyet Gazetesi'ndeki köşe yazısından alınmıştır(Terkoğlu, 2020).Ses ile gerçekleştirilen dolandırıcılıklara karşı yazılım üreten bir işletme 2013 yılından günümüze ses taklidi ile gerçekleştirilen suçlarda %350 artış olduğunu ifade ettiler. Yapılan analizlerde bir işletmeye gelen her 638 telefon görüşmesinden birinde yapay olarak oluşturulan ses kullanıldığı belirtilmektedir.…”
unclassified