FRAUDULENT ACTIVITIES USING VIRTUAL MEETINGS
Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 5
Abstract
This paper investigates fraudulent and illegal activities that take place through virtual meeting systems. The first section gives an introduction to the problem. Section two describes some cases of fraudulent activity using virtual meeting systems. Section three explores some means of capturing such fraudulent activities so that criminals can be brought to justice. Section four provides a solution for capturing virtual meeting conversations in a way that could be admissible in court. Section five discusses tell-tale signs that indicates that a conversation maybe fraudulent. Section six discusses Artificial Intelligence (AI) techniques that might be used to detect virtual meeting crime. Section seven discusses the conclusion to the paper.
Authors and Affiliations
Aamo Iorliam , Anne James
Symmetric-key Inter-domain end-to-end Authentication Protocols for Mobile System
Our goal is to propose and design a symmetric-key interdomain end-to-end authentication protocols for a mobile system. We will be considering three mobile service domains; each has an authentication server. We denote by...
Scalability Performance of MANET Routing Protocols with Reference to Variable Pause Time
As mobile networking continues to experience increasing popularity, the need to connect large numbers of wireless devices will become more prevalent. Many recent proposals for ad hoc routing have certain characteristics....
New Design Metrics for Complexity Estimation in Object Oriented Systems
This paper proposes four design metrics of class level for early and effective feedback to manage the quality of object-oriented software. These metrics measure the complexity induced by the use of various object-oriente...
An Useful Information Extraction using Image Mining Techniques from Remotely Sensed Image (RSI)
Information extraction using mining techniques from remote sensing image (RSI) is rapidly gaining attention among researchers and decision makers because of its potential in application oriented studies. Knowledge disco...
MOST INFLUENTIAL OBSERVATIONSSUPER EFFICIENCY
To measure productive efficiency of competing firms a linear programming technique called Data Envelopment Analysis (DEA) is widely used. It requires first to adopt a production possibility set, that is axiomatic based a...