Explain how the fraud was detected.

Locate a real-world organizational example of fraud involving technology and address the following requirements:
Provide a brief overview of what happened in the organizational example.
Outline what fraud-related clues were missed.
Explain how the fraud was detected.
Using theory and research from Chapter 8 of the textbook, what should the organization have done to prevent the fraud from occurring?
Embed course material concepts, principles, and theories, which require supporting citations along with at least two scholarly peer reviewed references supporting your answer. Keep in mind that these scholarly references can be found in the Saudi Digital Library by conducting an advanced search specific to scholarly references.
Use Saudi Electronic University academic writing standards and APA style guidelines.
ref:
Chapter 8 in Information Technology for Management: On-Demand Strategies for Performance, Growth, and Sustainability
Chapter 9 in Information Technology for Management: On-Demand Strategies for Performance, Growth, and Sustainability
Ahmadzadegan, M. H., Izadyar, M., Deilami, H. A., Banu A, S., & Ghorbani, H. (2020). Detailed study on the features of mobile Applications. 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), 901–907.
Miralles-Pechuán, L., Ponce, H., & Martínez-Villaseñor, L. (2020). A 2020 perspective on “A novel methodology for optimizing display advertising campaigns using genetic algorithms.” Electronic Commerce Research and Applications, 40.
Haryanti, T., & Subriadi, A. P. (2020). Factors and theories e-commerce adoption: A literature review. International Journal of Electronic Commerce Studies, 11(2), 87–105.

Answer & Explanation
VerifiedSolved by verified expert
“””Organizational fraud can take many different forms, but usually includes some type of misrepresentation or concealment of information that is used to obtain an unfair or illegal advantage. In the case of technology-related fraud, this may involve the use of computers or other electronic devices to commit or facilitate the crime.One real-world example of organizational fraud involving technology is the so-called “Y2K” scam. In the late 1990s, some businesses and individuals began claiming that computer systems would not be able to properly handle the change from 1999 to 2000, and that this would lead to widespread disruptions and failures. They offered to sell “Y2K-compliant” software and hardware to businesses and individuals, ofte

Looking for a similar assignment?

Let Us write for you! We offer custom paper writing services

Place your order

Step-by-step explanation
n at exorbitant prices. In many cases, these products were either ineffective or completely unnecessary. As a result, many people and businesses lost a great deal of money to this fraud.There are several clues that may have been missed in this case. For example, the claims made by the fraudsters were often vague and not well-supported by evidence. In addition, the prices they were charging were often far higher than what would be reasonable for the products or services they were offering. Finally, many of the people and businesses who were targeted by this fraud had no real need for the products or services being offered.This fraud was eventually detected by law enforcement and media investigations, which uncovered the deception and exposed the fraudsters. In addition, many of the businesses and individuals who were victimized by this fraud took legal action against the fraudsters, which helped to bring them to justice.There are several things that the organizations and individuals involved in this fraud could have done to prevent it from occurring. For example, they could have been more critical in evaluating the claims made by the fraudsters. In addition, they could have done more research on the products and services being offered, and compared the prices being charged to those of similar products and services. Finally, they could have been more selective in whom they did business with, and only worked with reputable and trustworthy individuals and organizations.

Latest Assignment