SlideShare ist ein Scribd-Unternehmen logo
1 von 27
CHAPTER 17A – FRAUD
IN E-COMMERCE
Jennifer Lowes
E-Business
◦ Uses information technology and electronic communication networks to exchange
business information and conduct paperless transactions.
◦ Includes virtual private networks and other specialised connections through which
businesses routinely connect to one another.
Albrecht, Albrecht, Albrecht & Zimbelman, 2012, p 602
Elements of Fraud Risk in E-Commerce
Perceived Opportunity
Perceived Pressures:
• Dramatic growth leading to
tremendous cash flow needs.
• Pressure to improve financial results
due to mergers/acquisitions.
• Borrowing or issuing stock.
• New products requiring expensive
marketing.
• Unproven or flawed business
models with tremendous cash flow
pressures.
Elements of Fraud Risk in E-Commerce
Perceived Opportunity
Perceived Opportunities:
• Lag between transaction developments
and security developments.
• Complex information systems that make
installing controls difficult.
• Removal of personal contact – easier
impersonation or falsified identity.
• Electronic transfer of funds, allowing large
frauds to be committed more easily.
• Compromised privacy resulting in theft by
using stolen or falsified information.
Elements of Fraud Risk in E-Commerce
Perceived Opportunity
Rationalisations:
• Perceived distance that decreases
the personal contact between
customer and supplier.
• Transactions between anonymous or
unknown buyers and sellers – you
can’t see who you are hurting.
• New economy thinking contends that
traditional methods of accounting no
longer apply.
E-Commerce Risks Inside Organisations
◦ Easier to infiltrate systems, steal money and information and cause damage when
perpetrators are within firewalls and security checks.
◦ Perpetrators with inside access know the control environment, understand security
mechanisms, and find ways to bypass security.
◦ Most common problem: Abuse of power granted to users.
◦ I.e. programmers with superuser access – often removal of programmers’ access is overlooked
when systems go into production.
Survey
◦ > 1/3 of network administrators admitted to snooping into HR records and custom
databases.
◦ 88% of administrators would take sensitive data if they were fired.
◦ 33% would take company password lists.
Data Theft
◦ First concern of e-commerce fraud as data have many useful attributes:
1. Can be converted to cash fairly easily.
2. Information is replicable, allowing perpetrators to simply copy data rather than remove
them, leaving the source data intact.
3. Can be transferred easily and quickly to any location.
4. Managers lack the technical expertise to prevent and detect data theft.
Passwords
◦ Password selection cannot be fully controlled, as it is left to
the end user.
◦ Common passwords can relate to personal information, so
perpetrators may be able to guess the passwords of their
employees.
◦ Social engineering techniques are used by hackers to gain
access to passwords.
◦ Hackers take information from blogs, Facebook walls and
other social network sites and use this information to ask
victims for “just a little more”.
Passwords
◦ Companies may require regular password changes to try
to mitigate the risk of passwords being stolen.
◦ However many employees will merely add a sequential
number to the end of their password.
◦ Companies and websites generally have certain
password requirements such as minimum character
length, upper case, symbol, number etc.
Passwords – How many do you have?
University Bank Work login
Email Google Microsoft
Facebook Twitter Instagram
Skype TradeMe Pinterest
Online shops Blogs Online communities
Phone login Utility companies YouTube
Need one of these?
◦ http://www.youtube.com/watch?v=Srh_TV_J144
Risk vs Convenience?
Sniffing
◦ Logging, filtering and viewing of information that passes along a network line.
◦ The most common method of gathering information from unencrypted
communications.
◦ Easily done on most networks by hackers that run freely available applications.
◦ Organisations can use firewalls, spam filters and anti-virus programmes to prevent
sniffing, however employee laptops, tablets and mobile phones can be at risk when on
business trips and connecting to other networks.
Wartrapping
◦ Hackers go to places such as airports where business travellers are likely to be and set
up internet access points through their laptop.
◦ The access point will appear to be legitimate i.e. Auckland Airport Free Wireless.
◦ Hackers then use sniffing techniques to find passwords and other data as the traveller
browses the internet through the connection.
E-Commerce Risks Outside Organisations
◦ Internet provides a rich medium for external hackers to gain access to personal
systems.
◦ Ability to hack from across international borders means that tracking and prosecuting
hackers is difficult.
NZ Statistics:
◦ Year to 9th August 2013:
◦ 562 online frauds reported to NetSafe
◦ $4.4 million
◦ Netsafe’s Chief Executive estimates annual losses from internet fraud to be between
$100m and $400m per year.
◦ In 2012, the Ministry of Business, Innovation & Employment reported 670 bank phishing
and tax refund scams in NZ.
Spyware
◦ Installs monitoring software in addition to the regular that a user downloads or buys.
◦ Peer-to-peer music and video-sharing applications are the worst spyware offenders.
◦ Most spyware programs monitor user behaviours so that the company can make a
profit selling the personal data they collect.
◦ More advanced spyware can copy financial or other sensitive data from internal
directories and files and send it to external entities.
Phishing
◦ Phishing involves sending emails or pop up messages asking for personal information in
inventive ways.
◦ Common method is to request victims to update account details by clicking on a link
to a website which appears to be the company’s website.
◦ Common targets have been bank customers, TradeMe/ebay customers, even
government departments such as IRD.
ANZ
◦ In July 2013, ANZ customers were targeted by a phishing scam.
◦ Phishers sent an email to ANZ customers which appeared to be from ANZ.
◦ It stated that customers must update their account information through the link or service
would be suspended.
◦ The link took customers to a fake website which replicated the logos and formatting of ANZ.
◦ The phishers gained access to bank accounts when customers attempted to log in to the
fake website.
www.stuff.co.nz/technology/digital-living/8985900/Phishing-scam-targets-ANZ-log-in-details
Large Retail Company (Un-named)
◦ Major retail chain targeted by overseas cyber criminals in September 2013.
◦ Phishing attack attempted to convince store staff to install rogue software on their
computers.
◦ Phishers called stores claiming to be a senior member of the company and directed
employees to a fake website that was designed to look like the company’s official tech
support site.
◦ No data was lost as the company’s IT staff noticed what was happening and managed to
block access to the website and cleaning it up.
◦ “As soon as there’s real humans involved we as Kiwis are more vulnerable because we’re
extremely trusting”.
www.nzherald.co.nz/business/news/article.cfm?c_id=3&objected=11130882
Spoofing
◦ Changes the information in e-mail headers or IP addresses.
◦ Perpetrators hide their identities by simply changing the information in the header, thus
allowing unauthorised access.
Falsified Identity
◦ Subtle differences in internet hose names often go unnoticed by internet users.
◦ I.e. “.com” “.org” “.nz” can be easily confused but lead to completely different
websites.
◦ If two similar names are owned by two different entities, one site could mimic the other
and trick users into thinking they are dealing with the original website.
“GoogleDirectory”
◦ NZ company with no links to Google, launched July 2013.
◦ Promotes itself as a new online marketing tool, offering special internet advertisement
packages.
◦ Over 100,000 listings – some who were contacted by the NZHerald had no idea they
were listed and had not paid.
◦ One customer was told Google was re-launching in NZ as GoogleDirectory.
www.nzherald.co.nz/business/news/article.cfm?c_id=3&objected=11111728
Conclusion
◦ Fraud risks in e-commerce systems are significant.
◦ Many employees do not fully appreciate the risks and methodologies that online fraud
perpetrators take.
◦ As auditors, it is important to be aware of the fraud risk in e-commerce and test internal
controls to minimise the risk.

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
An overview on laws against spamming in India
An overview on laws against spamming in IndiaAn overview on laws against spamming in India
An overview on laws against spamming in IndiaAltacit Global
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber SecurityFireEye, Inc.
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber CrimeDeepak Kumar
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingCase IQ
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking SectorSamvel Gevorgyan
 

Was ist angesagt? (20)

Types of Fraud.pptx
Types of Fraud.pptxTypes of Fraud.pptx
Types of Fraud.pptx
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
An overview on laws against spamming in India
An overview on laws against spamming in IndiaAn overview on laws against spamming in India
An overview on laws against spamming in India
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
 
Fraud Prevention
Fraud PreventionFraud Prevention
Fraud Prevention
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Fraud risk management
Fraud risk managementFraud risk management
Fraud risk management
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
 

Andere mochten auch

E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraudblogzilla
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.pptshaks9151
 
Mobile commerce
Mobile commerceMobile commerce
Mobile commercetumetr1
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protectiontumetr1
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
The electronic payment systems
The electronic payment systemsThe electronic payment systems
The electronic payment systemsVishal Singh
 
Basic Internal Auditing Presentation
Basic Internal Auditing PresentationBasic Internal Auditing Presentation
Basic Internal Auditing PresentationVernon Benjamin
 
RSA E-Commerce Fraud Trends 2013
RSA E-Commerce Fraud Trends 2013RSA E-Commerce Fraud Trends 2013
RSA E-Commerce Fraud Trends 2013EMC
 
Audit Process, Audit Procedures, Audit Planning, Auditing
Audit Process, Audit Procedures, Audit Planning, AuditingAudit Process, Audit Procedures, Audit Planning, Auditing
Audit Process, Audit Procedures, Audit Planning, AuditingAdvance Business Consulting
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 

Andere mochten auch (14)

E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraud
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Mobile commerce
Mobile commerceMobile commerce
Mobile commerce
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protection
 
Transmission modes
Transmission modesTransmission modes
Transmission modes
 
Transmission modes
Transmission modesTransmission modes
Transmission modes
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
The electronic payment systems
The electronic payment systemsThe electronic payment systems
The electronic payment systems
 
Basic Internal Auditing Presentation
Basic Internal Auditing PresentationBasic Internal Auditing Presentation
Basic Internal Auditing Presentation
 
RSA E-Commerce Fraud Trends 2013
RSA E-Commerce Fraud Trends 2013RSA E-Commerce Fraud Trends 2013
RSA E-Commerce Fraud Trends 2013
 
Audit Process, Audit Procedures, Audit Planning, Auditing
Audit Process, Audit Procedures, Audit Planning, AuditingAudit Process, Audit Procedures, Audit Planning, Auditing
Audit Process, Audit Procedures, Audit Planning, Auditing
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 

Ähnlich wie Chapter 17 a fraud in e commerce Jen

Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxprashanth73488
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxprtabal_25
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessImran Khan
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerZitaAdlTrk
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan BreachAny Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan BreachCBIZ Risk & Advisory Services
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...Rishav Gupta
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 

Ähnlich wie Chapter 17 a fraud in e commerce Jen (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
security threats.pptx
security threats.pptxsecurity threats.pptx
security threats.pptx
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptx
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Information security
Information securityInformation security
Information security
 
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan BreachAny Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Data security
Data securityData security
Data security
 

Mehr von VidaB

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedVidaB
 
Chapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by EmmaChapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by EmmaVidaB
 
Chapter 16 B Artika
Chapter 16 B ArtikaChapter 16 B Artika
Chapter 16 B ArtikaVidaB
 
Chapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by RachelChapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by RachelVidaB
 
Chapter 14 by Svetlana
Chapter 14 by SvetlanaChapter 14 by Svetlana
Chapter 14 by SvetlanaVidaB
 
Chapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosuresChapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosuresVidaB
 
Chapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory FraudChapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory FraudVidaB
 
Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet VidaB
 
Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud VidaB
 
Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud  Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud VidaB
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methodsVidaB
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methodsVidaB
 
Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen VidaB
 
Chapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudChapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudVidaB
 
Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud VidaB
 
Chapter 1 the nature of fraud
Chapter 1 the nature of fraudChapter 1 the nature of fraud
Chapter 1 the nature of fraudVidaB
 
Week 1 audit and assurance services
Week 1 audit  and assurance servicesWeek 1 audit  and assurance services
Week 1 audit and assurance servicesVidaB
 

Mehr von VidaB (17)

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
Chapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by EmmaChapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by Emma
 
Chapter 16 B Artika
Chapter 16 B ArtikaChapter 16 B Artika
Chapter 16 B Artika
 
Chapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by RachelChapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by Rachel
 
Chapter 14 by Svetlana
Chapter 14 by SvetlanaChapter 14 by Svetlana
Chapter 14 by Svetlana
 
Chapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosuresChapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosures
 
Chapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory FraudChapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory Fraud
 
Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet
 
Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud
 
Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud  Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
 
Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen
 
Chapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudChapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraud
 
Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud
 
Chapter 1 the nature of fraud
Chapter 1 the nature of fraudChapter 1 the nature of fraud
Chapter 1 the nature of fraud
 
Week 1 audit and assurance services
Week 1 audit  and assurance servicesWeek 1 audit  and assurance services
Week 1 audit and assurance services
 

Kürzlich hochgeladen

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Kürzlich hochgeladen (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Chapter 17 a fraud in e commerce Jen

  • 1. CHAPTER 17A – FRAUD IN E-COMMERCE Jennifer Lowes
  • 2. E-Business ◦ Uses information technology and electronic communication networks to exchange business information and conduct paperless transactions. ◦ Includes virtual private networks and other specialised connections through which businesses routinely connect to one another. Albrecht, Albrecht, Albrecht & Zimbelman, 2012, p 602
  • 3. Elements of Fraud Risk in E-Commerce Perceived Opportunity Perceived Pressures: • Dramatic growth leading to tremendous cash flow needs. • Pressure to improve financial results due to mergers/acquisitions. • Borrowing or issuing stock. • New products requiring expensive marketing. • Unproven or flawed business models with tremendous cash flow pressures.
  • 4. Elements of Fraud Risk in E-Commerce Perceived Opportunity Perceived Opportunities: • Lag between transaction developments and security developments. • Complex information systems that make installing controls difficult. • Removal of personal contact – easier impersonation or falsified identity. • Electronic transfer of funds, allowing large frauds to be committed more easily. • Compromised privacy resulting in theft by using stolen or falsified information.
  • 5. Elements of Fraud Risk in E-Commerce Perceived Opportunity Rationalisations: • Perceived distance that decreases the personal contact between customer and supplier. • Transactions between anonymous or unknown buyers and sellers – you can’t see who you are hurting. • New economy thinking contends that traditional methods of accounting no longer apply.
  • 6. E-Commerce Risks Inside Organisations ◦ Easier to infiltrate systems, steal money and information and cause damage when perpetrators are within firewalls and security checks. ◦ Perpetrators with inside access know the control environment, understand security mechanisms, and find ways to bypass security. ◦ Most common problem: Abuse of power granted to users. ◦ I.e. programmers with superuser access – often removal of programmers’ access is overlooked when systems go into production.
  • 7. Survey ◦ > 1/3 of network administrators admitted to snooping into HR records and custom databases. ◦ 88% of administrators would take sensitive data if they were fired. ◦ 33% would take company password lists.
  • 8. Data Theft ◦ First concern of e-commerce fraud as data have many useful attributes: 1. Can be converted to cash fairly easily. 2. Information is replicable, allowing perpetrators to simply copy data rather than remove them, leaving the source data intact. 3. Can be transferred easily and quickly to any location. 4. Managers lack the technical expertise to prevent and detect data theft.
  • 9. Passwords ◦ Password selection cannot be fully controlled, as it is left to the end user. ◦ Common passwords can relate to personal information, so perpetrators may be able to guess the passwords of their employees. ◦ Social engineering techniques are used by hackers to gain access to passwords. ◦ Hackers take information from blogs, Facebook walls and other social network sites and use this information to ask victims for “just a little more”.
  • 10. Passwords ◦ Companies may require regular password changes to try to mitigate the risk of passwords being stolen. ◦ However many employees will merely add a sequential number to the end of their password. ◦ Companies and websites generally have certain password requirements such as minimum character length, upper case, symbol, number etc.
  • 11. Passwords – How many do you have? University Bank Work login Email Google Microsoft Facebook Twitter Instagram Skype TradeMe Pinterest Online shops Blogs Online communities Phone login Utility companies YouTube
  • 12. Need one of these? ◦ http://www.youtube.com/watch?v=Srh_TV_J144
  • 14.
  • 15. Sniffing ◦ Logging, filtering and viewing of information that passes along a network line. ◦ The most common method of gathering information from unencrypted communications. ◦ Easily done on most networks by hackers that run freely available applications. ◦ Organisations can use firewalls, spam filters and anti-virus programmes to prevent sniffing, however employee laptops, tablets and mobile phones can be at risk when on business trips and connecting to other networks.
  • 16. Wartrapping ◦ Hackers go to places such as airports where business travellers are likely to be and set up internet access points through their laptop. ◦ The access point will appear to be legitimate i.e. Auckland Airport Free Wireless. ◦ Hackers then use sniffing techniques to find passwords and other data as the traveller browses the internet through the connection.
  • 17. E-Commerce Risks Outside Organisations ◦ Internet provides a rich medium for external hackers to gain access to personal systems. ◦ Ability to hack from across international borders means that tracking and prosecuting hackers is difficult.
  • 18. NZ Statistics: ◦ Year to 9th August 2013: ◦ 562 online frauds reported to NetSafe ◦ $4.4 million ◦ Netsafe’s Chief Executive estimates annual losses from internet fraud to be between $100m and $400m per year. ◦ In 2012, the Ministry of Business, Innovation & Employment reported 670 bank phishing and tax refund scams in NZ.
  • 19. Spyware ◦ Installs monitoring software in addition to the regular that a user downloads or buys. ◦ Peer-to-peer music and video-sharing applications are the worst spyware offenders. ◦ Most spyware programs monitor user behaviours so that the company can make a profit selling the personal data they collect. ◦ More advanced spyware can copy financial or other sensitive data from internal directories and files and send it to external entities.
  • 20. Phishing ◦ Phishing involves sending emails or pop up messages asking for personal information in inventive ways. ◦ Common method is to request victims to update account details by clicking on a link to a website which appears to be the company’s website. ◦ Common targets have been bank customers, TradeMe/ebay customers, even government departments such as IRD.
  • 21. ANZ ◦ In July 2013, ANZ customers were targeted by a phishing scam. ◦ Phishers sent an email to ANZ customers which appeared to be from ANZ. ◦ It stated that customers must update their account information through the link or service would be suspended. ◦ The link took customers to a fake website which replicated the logos and formatting of ANZ. ◦ The phishers gained access to bank accounts when customers attempted to log in to the fake website. www.stuff.co.nz/technology/digital-living/8985900/Phishing-scam-targets-ANZ-log-in-details
  • 22. Large Retail Company (Un-named) ◦ Major retail chain targeted by overseas cyber criminals in September 2013. ◦ Phishing attack attempted to convince store staff to install rogue software on their computers. ◦ Phishers called stores claiming to be a senior member of the company and directed employees to a fake website that was designed to look like the company’s official tech support site. ◦ No data was lost as the company’s IT staff noticed what was happening and managed to block access to the website and cleaning it up. ◦ “As soon as there’s real humans involved we as Kiwis are more vulnerable because we’re extremely trusting”. www.nzherald.co.nz/business/news/article.cfm?c_id=3&objected=11130882
  • 23. Spoofing ◦ Changes the information in e-mail headers or IP addresses. ◦ Perpetrators hide their identities by simply changing the information in the header, thus allowing unauthorised access.
  • 24.
  • 25. Falsified Identity ◦ Subtle differences in internet hose names often go unnoticed by internet users. ◦ I.e. “.com” “.org” “.nz” can be easily confused but lead to completely different websites. ◦ If two similar names are owned by two different entities, one site could mimic the other and trick users into thinking they are dealing with the original website.
  • 26. “GoogleDirectory” ◦ NZ company with no links to Google, launched July 2013. ◦ Promotes itself as a new online marketing tool, offering special internet advertisement packages. ◦ Over 100,000 listings – some who were contacted by the NZHerald had no idea they were listed and had not paid. ◦ One customer was told Google was re-launching in NZ as GoogleDirectory. www.nzherald.co.nz/business/news/article.cfm?c_id=3&objected=11111728
  • 27. Conclusion ◦ Fraud risks in e-commerce systems are significant. ◦ Many employees do not fully appreciate the risks and methodologies that online fraud perpetrators take. ◦ As auditors, it is important to be aware of the fraud risk in e-commerce and test internal controls to minimise the risk.

Hinweis der Redaktion

  1. Can anyone think of any perceived opportunities to commit e-commerce fraud?
  2. Can anyone think of any rationalisations of e-commerce fraud?
  3. The textbook discusses some surveys in which more than a third of network administrators admitted to snooping into HR records and custom databases, 88% of administrators would take sensitive data if they were fired and 33% said they would take company password lists. This obviously makes it important not to use the same password for work accounts as you do for personal accounts.
  4. Some websites allow customers to log in using Facebook. This makes it easier for customers to log in and not have to remember additional passwords, however it can be quite risky as if your Facebook page gets hacked they may have the ability to log in to other websites using facebook connect. How many people leave Facebook logged in on their phones or computers? What happens if your phone gets stolen? Instant access to any website which uses facebook connect.
  5. Grabone on the left, gives you the option to remember credit card details. Treatme, on the right doesn’t have an option. I used Treatme to buy something a few weeks ago and saw that it had stored my credit card details from a previous purchase made months earlier. I couldn’t believe I would have been so stupid to save the details so looked into it and found it doesn’t give you the option.If someone obtained your Facebook password, they could use the Facebook connect function to log in to different websites, and if your credit card details are stored, make multiple purchases.
  6. We will now look at e-commerce risks outside the organisation. The internet provides a rich medium for external hackers to gain access to personal systems. The ability to hack from across international borders means that tracking and prosecuting hackers is difficult.
  7. In the year to 9th August, there were 562 online frauds reported to NetSafe which totalled $4.4 million.However, Netsafe’s Chief Executive estimates annual losses from internet fraud to be between $100m and $400m per year.In 2012, the Ministry of Business, Innovation & Employment reported 670 bank phishing and tax refund scams in NZ.
  8. Last month, a major NZ retail chain was targeted by overseas cyber criminals. A phishing attack attempted to convince store staff to install rogue software on their computers.The phishers called stores claiming to be a senior member of the company and directed employees to a fake website that was designed to look like the company’s official tech support site. In this case, no data was lost as it was picked up by IT staff quickly and they were able to block access to the website and clean up the computers.There was a quote from Andy Prow, managing director of Aura Information Security, who said “As soon as there’s real humans involved we as Kiwis are more vulnerable because we’re extremely trusting”.What do you think NZ companies can do to prevent such phishing scams?Need to ensure there is a clear process to follow when phone calls or emails are received claiming to be from a senior employee. For example, returning phone calls to the IT department for confirmation. Also need a clear chain of command so that junior store employees understand they are not to download anything.
  9. This is an email I received a few weeks ago. I had actually just bought a new computer and Office software, which includes Outlook so I wasn’t initially suspicious when I saw it in my inbox. It was when I opened it and looked at the address it came from and who it was sent to that made me realise it probably wasn’t legitimate. The sender’s email address is infotechmsn@naver.com. Naver is actually a South Korean search engine. The email also isn’t addressed to my email, but to customer care at Hotmail.co.uk.The fact that such an email wasn’t picked up as spam when it was sent to a Hotmail address, which uses Outlook, is worrying and it would be easy for people to assume it was a legitimate email and click the link.
  10. Customers were reported as saying that they thought it was strange that when they Googled GoogleDirectory nothing came up. They had to type in the URL address to access the website. Now when you search for the company on Google the first hit is to the Dodgy Business website and the remaining hits all point to the company being a scam. You can see from the picture that the font is identical to Google’s and “directory” is in smaller text underneath.