Access the full text.
Sign up today, get DeepDyve free for 14 days.
V. Choudhury, R. Sabherwal (2003)
Portfolios of Control in Outsourced Software Development ProjectsInf. Syst. Res., 14
BusinessWeek
Alibaba fraud scandal may help Google, Global Sources
L. McGlasson
Agencies issue ACH, wire fraud advisory
Michael Cahill, D. Lambert, J. Pinheiro, Don Sun (2002)
Detecting fraud in the real world
IC3
IC3 Annual Internet Crime Report 2011
B. Xiao, I. Benbasat (2011)
Product-Related Deception in E-Commerce: A Theoretical PerspectiveMIS Q., 35
John Short, Ederyn Williams, B. Christie (1976)
The social psychology of telecommunications
Mieke Jans, N. Lybaert, K. Vanhoof (2010)
Internal Fraud Risk Reduction - Results of a Data Mining Case StudyInt. J. Account. Inf. Syst., 11
D. Laufer, S. Betzer
Teaching notes: hide and seek: a divorce fraud case study
RSA
RSA Online Fraud Report
P. Ferreira, R. Alves, O. Belo, Luís Cortesão (2006)
Establishing Fraud Detection Patterns Based on Signatures
Allen Lee (1989)
A Scientific Methodology for MIS Case StudiesMIS Q., 13
Kim-Kwang Choo (2011)
The cyber threat landscape: Challenges and future research directionsComput. Secur., 30
Qing Hu, Paul Hart, Donna Cooke (2007)
The role of external and internal influences on information systems security - a neo-institutional perspectiveJ. Strateg. Inf. Syst., 16
Andrew Reffett (2010)
Can Identifying and Investigating Fraud Risks Increase Auditors’ Liability?The Accounting Review, 85
Stijn Viaene, G. Dedene, R. Derrig (2005)
Auto claim fraud detection using Bayesian learning neural networksExpert Syst. Appl., 29
Scott Boss, L. Kirsch, I. Angermeier, Ray Shingler, Wayne Boss (2009)
If someone is watching, I'll do what I'm asked: mandatoriness, control, and information securityEuropean Journal of Information Systems, 18
G. Dhillon (2001)
Refereed Papers: Violation of Safeguards by Trusted Personnel and Understanding Related Information Security ConcernsComputers & Security, 20
G. Dhillon
Vilation of safeguards by trusted personnel and understanding related information security concerns
BBC News
China arrests 36 for fraud on Alibaba and other sites
ACFE
Association of Certified Fraud Examiners: Technical Report on Occupational Fraud and Abuse
R. Tomasic (2010)
The Financial Crisis and the Haphazard Pursuit of Financial CrimeCorporate Finance: Governance
Natalia Kochetova, William Jr., A. Eilifsen (2010)
Improving Auditors’ Fraud Judgments Using a Frequency Response ModeBehavioral & Experimental Accounting eJournal
Corinna Cortes, D. Pregibon (2001)
Signature-Based Methods for Data StreamsData Mining and Knowledge Discovery, 5
Y. Rotem (2011)
Company Duplication: Plain Fraud or a ‘Poor Man’s’ Bankruptcy? A Case Study in the Financial Distress of Small BusinessesCorporate Governance & Law eJournal
Vincent Owhoso, A. Weickgenannt (2010)
Vinand Petroleum, Inc.: Initial Audit Engagement and Fraud Risk Case for a Specialized IndustryIssues in Accounting Education, 25
M. Edge, P. Sampaio (2009)
A survey of signature based methods for financial fraud detectionComput. Secur., 28
Wall Street Journal
Alibaba.com CEO resigns in wake of fraud by sellers
A.S. Adepoju, M.E. Alhassan
Challenges of automated teller machine (ATM) usage and fraud occurrences in Nigeria – a case study of selected banks in Minna metropolis
Zac Sadan, D. Schwartz (2011)
WhiteScript: Using social network analysis parameters to balance between browser usability and malware exposureComput. Secur., 30
Purpose – The purpose of this paper is to report the findings and lessons learned from a case study that is based on Alibaba's business‐to‐business (B2B) fraud in China. The influence of such incidents and post‐hoc solutions are research worthy in today's booming digital business world. Design/methodology/approach – The paper uses a case study approach and practice‐driven method that rely on user behaviors, corporate policies, and financial data. The taxonomic framework of online fraud and corresponding countermeasures arise from digital forensic reports, policy reviews, data analysis, and a literature review. Findings – The key findings are indigenous to the Chinese B2B landscape, yet they help international stakeholders understand and address fraudulent issues. The paper finds beside the traditional customer‐based account signature, internal employees must be assigned their own signature systems to track malicious activities. Meanwhile, digital signature systems can be enhanced by reducing the record inter‐arrival time. Policy revisions are proposed to (e.g. offshore companies) lead to the decrease in the number of fraudulent incidents. Originality/value – The paper extends existing understanding of online fraud by studying a Chinese case. The findings are timely and based on real world experience. Actual practices are discussed and evaluated. A range of fraudulent activities is reviewed in a comprehensive framework. The findings are important due to the public exposure and wide implications of such an incident. Also, this study reveals that fraud protection is an on‐going effort requiring a triangulation of technical artifacts, policy management, and operations management.
International Journal of Accounting and Information Management – Emerald Publishing
Published: Oct 19, 2012
Keywords: Online fraud; E‐commerce security; B2B; Internal threat; Alibaba; Cyber crime; Crimes; Electronic commerce; China; Fraud
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.