FRAUDULENT ACTIVITIES USING VIRTUAL MEETINGS

Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 5

Abstract

This paper investigates fraudulent and illegal activities that take place through virtual meeting systems. The first section gives an introduction to the problem. Section two describes some cases of fraudulent activity using virtual meeting systems. Section three explores some means of capturing such fraudulent activities so that criminals can be brought to justice. Section four provides a solution for capturing virtual meeting conversations in a way that could be admissible in court. Section five discusses tell-tale signs that indicates that a conversation maybe fraudulent. Section six discusses Artificial Intelligence (AI) techniques that might be used to detect virtual meeting crime. Section seven discusses the conclusion to the paper.

Authors and Affiliations

Aamo Iorliam , Anne James

Keywords

Related Articles

Performance Evaluation of CPU-GPU communication Depending on the Characteristic of Co-Located Workloads

Todays, there are many studies in complicated computation and big data processing by using the high performance computability of GPU. Tesla K20X recently announced by NVIDIA provides 3.95 TFLOPS in precision floating poi...

Cost Effective Cloud Environment Setup to Secure Corporate Data

In recent years ad-hoc parallel processing has emerged to be one among the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Major Cloud computing firms have began to integrate frameworks for parallel pr...

HIERARCHICAL DOCUMENT ORGANIZATION AND RETRIEVAL BASED ON THEMES FOR NEWS TRACKS

Organizing text documents is an important task and there are also numbers of strategies available in it. A good document clustering approach can assist computers in organizing the document corpus automatically into a mea...

Object Oriented Shadow Detection and an Enhanced Method for Shadow Removal

Remote sensing technology derives information about the earth resources from satellite imagery. In urban areas, mainly the elevated objects are the reason for the appearance of shadows. Shadows are created as the light s...

Human Gait Recognition Using Bezier Curves

Gait recognition refers to automatic identification of an individual based on the style of walking. It is a new biometrics recognition technology. It has accomplished a series of achievements in scientific research in re...

Download PDF file
  • EP ID EP87455
  • DOI -
  • Views 120
  • Downloads 0

How To Cite

Aamo Iorliam, Anne James (2013). FRAUDULENT ACTIVITIES USING VIRTUAL MEETINGS. International Journal on Computer Science and Engineering, 5(5), 409-421. https://www.europub.co.uk/articles/-A-87455