Windows Support Chat

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 12 October 2009

How Aussies succumb to e-mail fraud (and other online evils)

Posted on 21:11 by Unknown

Yesterday I penned an article about a favourite e-mail tracking tool of mine, eMailTrackerPro, see here.

Following that up, I’d like to point out that the Australian Institute of Criminology has just published a report related to that:

Consumer fraud in Australia: costs, rates and awareness of the risks in 2008 (by Russell Smith and Carolyn Budd).

Abstract

This paper examines the current evidence of the cost, extent of and awareness of consumer fraud in Australia. In 2008, the ABS found that approximately five percent of the Australian population reported being victimised by consumer scams, with personal losses reaching almost $1b. This paper compares the findings of the ABS survey with those gathered by the AIC during the annual fraud awareness-raising activities conducted by the Australasian Consumer Fraud Taskforce. In 2008, a self-selected sample of 919 respondents to the AIC’s online survey reported being victimised by a wide variety of scams, including those relating to fictitious lotteries, phishing scams, financial advice and other attempts to elicit personal information from respondents. Individuals from all age groups were targeted in these scams, with older Australians being victimised to a similar extent to those in their middle years. Armed with an understanding of the nature and scope of the risks, consumer protection and other regulatory agencies can tailor their fraud prevention activities to maximise their impact—therefore reducing the extent to which consumers take up offers which are too good to be true.

Remember that, it applies globally (and in outer space too, I suppose):
TOO GOOD TO BE TRUE.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • The programmer/developer/coder role is not dead – and long live the project manager!
    It’s no problem being a geek, it would seem, according to Jason Hiner in his ZDNet blog posting The future of IT jobs? It's in three ...
  • I was going to delay writing this, but here it is anyway …
    What’s the difference between ignorance and apathy?    ANSWER: I don’t know, and I don’t care! It’s been one of those days for me, ...
  • The premise is … I’m getting even madder
    I was reading this IBM Redbook today, and it didn’t make a good first impression: I really love IBM Redbooks, but not at all the way...
  • LotusScript and the Curious Case of the "Name previously declared" error
    During final testing of the NotesTracker Version 5.0 (released on 4/4/2007), I was amazed to get an annoying LotusScript error popping up wh...
  • The "Do no harm" principle
    In all my IT work over the decades, I have always tried to abide by the maxim "Do no harm". A subtitle of this post could be: ...
  • Which one is "bigger" -- Microsoft or IBM?
    There's an IT industry debate that has been going on for a decade or more now, about whether or not " The mainframe is dead." ...
  • Windows 7 SP1 upgrade went horribly wrong … NetBeans IDE 7.0 Beta 2, MailWasher and the Christchurch earthquake
    Installing the Windows 7 Service Pack 1 (SP1) on my workhorse desktop system last Saturday turned into a total disaster for me, a really ...
  • IBM invites you... Tune Your Servers!
    IBM's Redbooks are sometimes of considerable to those who don't use IBM software and hardware, one example of which is TCP/IP Tutori...
  • The benefits of ever-decreasing technology size and weight
    This video obviously applies to the old-style PC hardware of the 1980s and 1990s, so presumably newer technology (such as LCD monitors) i...
  • IBM Symphony Plug-ins site has an Achilles’ Heel
    It seems that a weakness of the IBM Lotus Symphony plug-ins site is that not all of the plug-ins are hosted by IBM, and you can suffer tryin...

Categories

  • Add-ons
  • Adobe Reader
  • AJAX
  • Application Platform
  • Architecture
  • AS/400
  • Asia
  • Australia
  • Bad Software
  • Browser
  • Browser Share
  • Bug
  • Bushfire
  • Business
  • Chemistry
  • China
  • Coding
  • Communication
  • Communities of Interest
  • Crossword
  • Crosswords
  • Curiosity
  • Device Drivers
  • DLL hell
  • Documentation
  • Dragon
  • Durian
  • Ecosystems
  • Error Messages
  • Eudora
  • Extensions
  • Facetiousness
  • Failure
  • Firefox
  • FOSS
  • Freelance
  • Freeware
  • Fun
  • Heat Wave
  • Humor
  • i Series
  • IBM
  • IBM Systems
  • IE
  • Image resource manipulation
  • Innovation
  • Installation
  • Internet Explorer
  • Intranet
  • Japan
  • Koala
  • Linux
  • Live Writer
  • Lotus Domino
  • Lotus Notes
  • Lotus Notes Lotus Domino
  • Lotus Software
  • LotusScript
  • Mainframe
  • Melbourne (Australia)
  • Microsoft
  • Multiple
  • Natural Disaster
  • NaturallySpeaking
  • Nigerian 419 fraud
  • Notes Mail
  • NotesTracker
  • Nuance
  • Open Source
  • OpenNTF.ORG
  • Patents
  • POSS
  • PowerPoint
  • Pragmatism
  • Presenter
  • Print Server
  • Project Management
  • Pronunciation
  • Proprietary
  • Registry
  • Releases
  • Research and Development
  • RIA
  • SDMS
  • Security
  • Service Oriented Architecture
  • SNA
  • SOA
  • Software
  • Software Package
  • speech recognition
  • Spell Checking
  • Standards
  • System i
  • System/38
  • TCP/IP
  • Technology
  • Usability
  • Usability Testing
  • Versions
  • Victoria
  • Weather
  • Web 2.0
  • Web 3.0
  • Web Design
  • Web Pi
  • Web Services
  • Webshots.com
  • Windows
  • Windows 7 backgrounds
  • Words
  • z Series

Blog Archive

  • ►  2013 (25)
    • ►  November (1)
    • ►  October (2)
    • ►  September (1)
    • ►  June (7)
    • ►  May (1)
    • ►  April (7)
    • ►  March (2)
    • ►  February (4)
  • ►  2012 (25)
    • ►  December (7)
    • ►  November (1)
    • ►  October (1)
    • ►  September (3)
    • ►  August (1)
    • ►  July (1)
    • ►  June (6)
    • ►  May (2)
    • ►  April (2)
    • ►  March (1)
  • ►  2011 (20)
    • ►  December (3)
    • ►  November (1)
    • ►  August (1)
    • ►  July (2)
    • ►  June (2)
    • ►  March (4)
    • ►  February (2)
    • ►  January (5)
  • ►  2010 (69)
    • ►  November (2)
    • ►  October (3)
    • ►  September (5)
    • ►  August (13)
    • ►  July (3)
    • ►  June (3)
    • ►  May (2)
    • ►  April (10)
    • ►  March (10)
    • ►  February (8)
    • ►  January (10)
  • ▼  2009 (41)
    • ►  December (5)
    • ►  November (6)
    • ▼  October (5)
      • How to resize text in embedded IE browser for IBM ...
      • Manipulating images resources directly in IBM Lotu...
      • Internet filtering by ISPs? The ACS looks at techn...
      • How Aussies succumb to e-mail fraud (and other onl...
      • Tools I like – eMailTrackerPro
    • ►  September (4)
    • ►  August (1)
    • ►  June (1)
    • ►  May (3)
    • ►  April (2)
    • ►  February (9)
    • ►  January (5)
  • ►  2008 (16)
    • ►  November (3)
    • ►  October (3)
    • ►  August (2)
    • ►  July (3)
    • ►  June (1)
    • ►  April (1)
    • ►  February (1)
    • ►  January (2)
  • ►  2007 (39)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  July (5)
    • ►  June (1)
    • ►  May (2)
    • ►  April (11)
    • ►  March (5)
    • ►  February (8)
    • ►  January (4)
  • ►  2006 (98)
    • ►  December (8)
    • ►  November (25)
    • ►  October (6)
    • ►  September (6)
    • ►  August (5)
    • ►  July (6)
    • ►  June (16)
    • ►  May (17)
    • ►  April (2)
    • ►  March (4)
    • ►  February (3)
  • ►  2005 (38)
    • ►  November (5)
    • ►  September (2)
    • ►  August (10)
    • ►  July (14)
    • ►  June (3)
    • ►  April (3)
    • ►  March (1)
Powered by Blogger.

About Me

Unknown
View my complete profile