Retrieved from https://studentshare.org/business/1534774-toll-fraud-and-prevention
https://studentshare.org/business/1534774-toll-fraud-and-prevention.
Toll Fraud: Preventive Measures Declaration – I XXX confirm that I have carefully studied all the Workbook references in constructing this proposal 1. Title: Toll fraud – preventive measures.2. Problem Setting – Telephone or mobile is a technology that almost everyone uses in the home, at work or on the move. Traditionally, telephone is a simple one-to-one or one to many communication technology but it is now offered with enhancements that include video, chat, file passing and file sharing where suppliers are attempting to present a complete communication environment over mobile or landline. 3. Presenting Problem Definition – Toll fraud is identity theft using telephone where a person tries to make long distance calls by breaking into the authorization code of another person/employee or taking control of the phone with all features to make long distance out bound calls.
The intention is therefore is to fool the company and the colleague to satisfy his personal needs rather than the intended use. 4. Real-World Target – Increase the awareness among the employees and other telephone users about the nefarious activity of toll fraud and hence help prevent identity theft occurring and therefore reducing cases of fraud.5. Research Question – How can Toll fraud be reduced or eliminated in order to reduce the risk increased telephone charges, which the company has to pay and hence incurring loss.6. Speculation – Toll fraud might be combated in several ways: user training, detection schemes, regular monitoring of internal extensions and issuing a personal authorization code for every employee according to the requirement and only then any long distance call be matured.
Sending bills regularly to the employee and ensuring payment for the calls made for personal use.7. Intended Project Outcome – my expected form of outcome will be a set of guidance notes for all the employees and also individuals using the public switched telephone network on effective strategies to use (including examples) in the event of a Toll fraud incident occurring.8. Design for Collecting Primary Data – Any employee making an outbound call will be tracked by his authorization code and the extension from where he is making an out bound call.
With this we can track the person trying to fool the company and the colleagues pass code to make outbound call. The call billing software like ESCAPE or TELESOFT, which is a fool proof software will be able to track every single detail of the callers profile by identifying his security, credentials. 9. Utilizing and processing Primary Data – once I have the primary data in the form of a collection of toll fraud incidents I will pre-process that data by classifying them into known violation or unknown violation.
If it is an unknown violation then I will send that particular data to the IT security team who will take sever action against such erroneous crime committed by the fellow employee. ReferenceMichael D. Myers. (1997). Qualitative Research in Information Systems. [online]. Available from: http://www.qual.auckland.ac.nz/ [Accessed 29 October 2006].
Read More