Windows Support Chat

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 12 October 2009

How Aussies succumb to e-mail fraud (and other online evils)

Posted on 21:11 by Unknown

Yesterday I penned an article about a favourite e-mail tracking tool of mine, eMailTrackerPro, see here.

Following that up, I’d like to point out that the Australian Institute of Criminology has just published a report related to that:

Consumer fraud in Australia: costs, rates and awareness of the risks in 2008 (by Russell Smith and Carolyn Budd).

Abstract

This paper examines the current evidence of the cost, extent of and awareness of consumer fraud in Australia. In 2008, the ABS found that approximately five percent of the Australian population reported being victimised by consumer scams, with personal losses reaching almost $1b. This paper compares the findings of the ABS survey with those gathered by the AIC during the annual fraud awareness-raising activities conducted by the Australasian Consumer Fraud Taskforce. In 2008, a self-selected sample of 919 respondents to the AIC’s online survey reported being victimised by a wide variety of scams, including those relating to fictitious lotteries, phishing scams, financial advice and other attempts to elicit personal information from respondents. Individuals from all age groups were targeted in these scams, with older Australians being victimised to a similar extent to those in their middle years. Armed with an understanding of the nature and scope of the risks, consumer protection and other regulatory agencies can tailor their fraud prevention activities to maximise their impact—therefore reducing the extent to which consumers take up offers which are too good to be true.

Remember that, it applies globally (and in outer space too, I suppose):
TOO GOOD TO BE TRUE.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home
View mobile version

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • I was going to delay writing this, but here it is anyway …
    What’s the difference between ignorance and apathy?    ANSWER: I don’t know, and I don’t care! It’s been one of those days for me, ...
  • The premise is … I’m getting even madder
    I was reading this IBM Redbook today, and it didn’t make a good first impression: I really love IBM Redbooks, but not at all the way...
  • "Simple Signer" - Freeware tool to easily sign Lotus Notes databases
    This is a deliberately simple tool enabling you to select any Lotus Notes database -- local, or on a Lotus Domino server -- and then to sign...
  • Which one is "bigger" -- Microsoft or IBM?
    There's an IT industry debate that has been going on for a decade or more now, about whether or not " The mainframe is dead." ...
  • Another weird LotusScript compiler problem
    I had barely told you about a LotusScript compiler error that I had a few days ago (see The curious case of the "Name previously decla...
  • Get knotted!
    Hey, you might find any topic discussed on this blog! These days, I tend to dress very formally and don't have all that much use for th...
  • How to fix Eudora when the spell checker doesn't want to remember added words
    I started using Eudora as my mail client way back in 1993 or thereabouts. I still use Eudora to this day; it's not perfect, but has many...
  • How to install CDBurnerXP (and WinSCP) without Open Candy
    CDBurnerXP is free and very good software for burning CDs, DVDs and Blu-ray disks, but unfortunately the default installer installs OpenC...
  • Hot topic? A new ice age is coming (eventually)
    My science/engineering background is bubbling to the surface again. I’ve just examined Burt Rutan’s presentations and highly recommend them...
  • Life Begins at Requirements (not at 40)
    "Few people have the same notion of what requirements are and where they fit into the big picture" writes Richard M. Marshall, in ...

Categories

  • Add-ons
  • Adobe Reader
  • AJAX
  • Application Platform
  • Architecture
  • AS/400
  • Asia
  • Australia
  • Bad Software
  • Browser
  • Browser Share
  • Bug
  • Bushfire
  • Business
  • Chemistry
  • China
  • Coding
  • Communication
  • Communities of Interest
  • Crossword
  • Crosswords
  • Curiosity
  • Device Drivers
  • DLL hell
  • Documentation
  • Dragon
  • Durian
  • Ecosystems
  • Error Messages
  • Eudora
  • Extensions
  • Facetiousness
  • Failure
  • Firefox
  • FOSS
  • Freelance
  • Freeware
  • Fun
  • Heat Wave
  • Humor
  • i Series
  • IBM
  • IBM Systems
  • IE
  • Image resource manipulation
  • Innovation
  • Installation
  • Internet Explorer
  • Intranet
  • Japan
  • Koala
  • Linux
  • Live Writer
  • Lotus Domino
  • Lotus Notes
  • Lotus Notes Lotus Domino
  • Lotus Software
  • LotusScript
  • Mainframe
  • Melbourne (Australia)
  • Microsoft
  • Multiple
  • Natural Disaster
  • NaturallySpeaking
  • Nigerian 419 fraud
  • Notes Mail
  • NotesTracker
  • Nuance
  • Open Source
  • OpenNTF.ORG
  • Patents
  • POSS
  • PowerPoint
  • Pragmatism
  • Presenter
  • Print Server
  • Project Management
  • Pronunciation
  • Proprietary
  • Registry
  • Releases
  • Research and Development
  • RIA
  • SDMS
  • Security
  • Service Oriented Architecture
  • SNA
  • SOA
  • Software
  • Software Package
  • speech recognition
  • Spell Checking
  • Standards
  • System i
  • System/38
  • TCP/IP
  • Technology
  • Usability
  • Usability Testing
  • Versions
  • Victoria
  • Weather
  • Web 2.0
  • Web 3.0
  • Web Design
  • Web Pi
  • Web Services
  • Webshots.com
  • Windows
  • Windows 7 backgrounds
  • Words
  • z Series

Blog Archive

  • ►  2013 (25)
    • ►  November (1)
    • ►  October (2)
    • ►  September (1)
    • ►  June (7)
    • ►  May (1)
    • ►  April (7)
    • ►  March (2)
    • ►  February (4)
  • ►  2012 (25)
    • ►  December (7)
    • ►  November (1)
    • ►  October (1)
    • ►  September (3)
    • ►  August (1)
    • ►  July (1)
    • ►  June (6)
    • ►  May (2)
    • ►  April (2)
    • ►  March (1)
  • ►  2011 (20)
    • ►  December (3)
    • ►  November (1)
    • ►  August (1)
    • ►  July (2)
    • ►  June (2)
    • ►  March (4)
    • ►  February (2)
    • ►  January (5)
  • ►  2010 (69)
    • ►  November (2)
    • ►  October (3)
    • ►  September (5)
    • ►  August (13)
    • ►  July (3)
    • ►  June (3)
    • ►  May (2)
    • ►  April (10)
    • ►  March (10)
    • ►  February (8)
    • ►  January (10)
  • ▼  2009 (41)
    • ►  December (5)
    • ►  November (6)
    • ▼  October (5)
      • How to resize text in embedded IE browser for IBM ...
      • Manipulating images resources directly in IBM Lotu...
      • Internet filtering by ISPs? The ACS looks at techn...
      • How Aussies succumb to e-mail fraud (and other onl...
      • Tools I like – eMailTrackerPro
    • ►  September (4)
    • ►  August (1)
    • ►  June (1)
    • ►  May (3)
    • ►  April (2)
    • ►  February (9)
    • ►  January (5)
  • ►  2008 (16)
    • ►  November (3)
    • ►  October (3)
    • ►  August (2)
    • ►  July (3)
    • ►  June (1)
    • ►  April (1)
    • ►  February (1)
    • ►  January (2)
  • ►  2007 (39)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  July (5)
    • ►  June (1)
    • ►  May (2)
    • ►  April (11)
    • ►  March (5)
    • ►  February (8)
    • ►  January (4)
  • ►  2006 (98)
    • ►  December (8)
    • ►  November (25)
    • ►  October (6)
    • ►  September (6)
    • ►  August (5)
    • ►  July (6)
    • ►  June (16)
    • ►  May (17)
    • ►  April (2)
    • ►  March (4)
    • ►  February (3)
  • ►  2005 (38)
    • ►  November (5)
    • ►  September (2)
    • ►  August (10)
    • ►  July (14)
    • ►  June (3)
    • ►  April (3)
    • ►  March (1)
Powered by Blogger.

About Me

Unknown
View my complete profile