Fraud in the Virtual World Tim Sparrow, Consultant, Client and Technical Services.

Slides:



Advertisements
Similar presentations
Is Online-Gaming for Business or Pleasure? Adam Pyszkowski Tony Zhe Richard Thompson.
Advertisements

Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
FDIC Money Smart Elaine M. Hunter Community Affairs Specialist
PERSONAL FINANCIAL MANAGEMENT
Read to Learn The four main ways to become a business owner and the advantages and disadvantages of each The different forms of legal business ownership.
Explain the social impacts of the use of IT.. Social Social networking has made the world Bigger and easier to communicate with others. It allows friends,
Public Information Online. Timothy WhitneyCaroline Aaron.
Massively Multiplayer Online Environments Donald Young Joshua Kudla Jerel Tolentino Alyssa Baca Nik Ewing An evaluation on the use of virtual worlds to.
Rethinking Construction Review of traditional construction models and a comparison of product development processes with other industries School of Architecture.
Systems Forum Northwest Innovative User Group University of Portland October 17-18, 2006.
Chapter 13 Financial Derivatives. © 2004 Pearson Addison-Wesley. All rights reserved 13-2 Hedging Hedge: engage in a financial transaction that reduces.
What are the advantages and disadvantages of each?
Economics 330 Money and Banking Lecture 18 Prof. Menzie Chinn TAs: Chikako Baba, Deokwoo Nam.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Online Gaming (for virtual living). Objectives – Understand the business related to online gaming works – Realise how online games are managed – Have.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Mobile Internet By Louise and Laura. Mobile Internet Traditionally, access to the Web has been via fixed- line services on laptops and desktop computers.
© 2012 edict egaming GmbH. ONLINE CASINO SOLUTIONS MADE IN GERMANY Risks in the I-gaming Industry Introduction General financial risks Licensing commercial.
Intellectual Property Rights and Online File Sharing Erwin Solis Antoine Herve Matt Olsen Nikolai Hart Tim Scott.
Slide 1 of Slides developed by Jeff Madura, with additions and enhancements by Tim Richardson.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Being a Business Owner Section 4.2.
Information Security. What is Information Security? A. The quality of being secure B. To protect the confidentiality, integrity, and availability of information.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Financial Statements. Users of financial information.
RTI, Nagpur 1 Day 1` Session I. 2RTI, Nagpur Why Fraud Audit? Fraud audit received powerful impetus from increased fraudulent activities both within corporate.
© 2012 Datameer, Inc. All rights reserved. Page 1 © 2012 Datameer, Inc. All rights reserved. Hadoop in Financial Services Adam Gugliciello, Solutions Engineer.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
Unit 2- Ethical Theories and Obligations
13-1 Hedging Hedge: engage in a financial transaction that reduces or eliminates risk Basic hedging principle: Hedging risk involves engaging in a financial.
Copyright ©2004 Pearson Education, Inc. All rights reserved. Chapter 2 Auto and Homeowner’s Insurance.
Protecting Your Organization Identity Theft and Data Breach.
Types of business ownership Chapter 4. Academic Preparation  To take business classes in high school  To go to college and get a degree in business.
New Principal Training Property Control July 7, 2015.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Lesson 9: Security. Objectives  Calculate shrinkage based on merchandise book value and physical inventory counts  Give examples of internal and external.
Are your chargebacks too low? - Manage your profits, not your fraud Akif Khan, PhD Manager, Solutions Architecture.
Bankruptcy 04/09. Bankruptcy What is it? A legal process performed under the Bankruptcy and Insolvency Act. Because of your inability to pay your debts,
Can you spot the honest customer… …from the fraudster? Presentation by: Alex Bowes, Corporate Sales Manager, 192.com Business Services.
CHAPTER 2 TYPES OF BUSINESS INFORMATION SYSTEM. INTRODUCTION Information System support business operations by processing data related to business operation.
UK Government BERR / OECD ICCP - Workshop: Virtual Worlds An Introduction 11th March 2009.
PwC Informations- gold assets. 2 Introduction 3 Central and Eastern EuropeGlobal Number of companies that have been victims of economic crime in the.
The social impacts of IT: Spending more time on the computer, laptop, phone, tab etc. than going outside. Negative effect on health. Negative effect on.
Professional Ethics Mälardalens högskola Västerås, Mikael Svensson.
Security Mindset Lesson Introduction Why is cyber security important?
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
Improve Your Experience ExpressRelease Debit Card.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Engineering Ethics Cory Hoi Dylan Stryker Chris Sanson Paul Goyette.
Advantages Programmers like it because they are able to change the programming to fit their preferences Great for small business because it is free Open.
IT has had a big impact social in many different ways. Facebook is a social networking site that allows people to communicate and stay in touch with friends.
Business Integrity and Fraud Prevention By Kelvin Ko and Andy Cheung.
Keeping Medicare for Tomorrow. Funded by Department of Health and Human Services Administration for Community Living/Administration on Aging SMP’s.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
Fraud Detection with Machine Learning: A Case Study from Sift Science
Merchant Services for Website Paycron. About Paycon Paycron is purposive in meeting immediate solutions in crafting merchant account services and credit.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
2016 FRAUD.
Combating Identity Fraud In A Virtual World
Fraud Protection.
Fraud protection.
InGenius Connector Enterprise Microsoft Dynamics CRM
AC 465 AC 465 Slingshot Academy
AC 465 Innovative Education--snaptutorial.com
Stay Ahead in the Battle Against Payment Fraud !
Everything old is new again
Presentation transcript:

Fraud in the Virtual World Tim Sparrow, Consultant, Client and Technical Services

Summary Virtual Services  The MMO virtual marketplace Fraud  What is MMO fraud?  What impact does it have?  Why is it attractive to fraudsters?  What does the future hold?

Virtual Services Selling the Goods…  Gold  Lord of the Rings Online 1.0 gold  Age of Conan 1.3 gold  World of Warcraft 100 gold  Eve Online 24 million gold  Items  Levelling (£180+ for max level)  Characters (€7,000 current record)  Property (Anshe Chung $1 million)

MMO Fraud “The use of deception with the intention of obtaining an advantage, avoiding an obligation or causing loss to another party.”  Direct fraud vs. “friendly” fraud  Hacked accounts  Vulnerabilities and exploits

Fraud Impact Direct  Financial losses – cost of providing service, administration costs, chargeback costs etc.  Remedial costs – Fixing exploits, changing gameplay rules, fraud screening Indirect  Reputation losses  Game economics  Disadvantage to being honest

What Attracts Fraudsters? Money!  Virtual assets have a monetary value  Low risk – Governance little to none, no physical goods trail  Fast and easy compared to conventional online fraud  Difficult for providers to stop repeat offenders  International access

The Future of Fraud…  Techniques get increasingly complex and advanced  Fraudsters are becoming more organised  As MMO virtual worlds advance, so do the rewards from fraud  Stronger, more advanced fraud screening techniques must be employed by MMO virtual world providers  Geo-location checks, IP checks, device fingerprinting, velocity checks, identity morphing and other custom business rules  Education and training

The Future of Fraud… cont’d Fraud is affecting all providers  MMO RPG  MMO virtual world  Gold/Item providers  Guide providers But most of all…  The virtual community

For More Information  Speak to me Tim Sparrow Call: +44 (0)  Contact CyberSource Call: +44 (0)