Downloaded from Elgar Online at 09/27/2021 05:11:36PM Via Free Access

Total Page:16

File Type:pdf, Size:1020Kb

Downloaded from Elgar Online at 09/27/2021 05:11:36PM Via Free Access JOBNAME: Barker PAGE: 1 SESS: 5 OUTPUT: Fri Nov 17 12:14:20 2017 Bibliography Abdelal, Rawi, ‘Sovereign Wealth in Abu Dhabi’ (2009) 14 Geopolitics 317. Abner, David J, The ETF Handbook: How to Value and Trade Exchange- Traded Funds (Chichester: John Wiley & Sons, 2010). Acharya, Viral V, Hahn, Moritz and Kehoe, Conor, ‘Corporate Govern- ance and Value Creation: Evidence from Private Equity’ (2009) at http://ssrn.com/abstract=1324016. Acharya, Viral V, Kehoe, Conor and Reyner, Michael, ‘Private Equity vs PLC Boards in the U.K.: A Comparison of Practices and Effectiveness’ (ECGI Working Paper, 2008). Achleitner, Ann-Kristin, Betzer, André and Gider, Jasmin, ‘Do Corporate Governance Motives Drive Hedge Funds and Private Equity Activ- ities?’ (2009) at http://ssrn.com/abstract=1292896. Achleitner, Ann-Kristin, Lutz, Eva, Herman, Kerry and Lerner, Josh, ‘New Look: Going Private with Private Equity Support’ (2009) at http://ssrn.com/abstract=1120230. Admati, Anat R and Pfleiderer, Paul, ‘The “Wall Street Walk” and Shareholder Activism: Exit as a Form of Voice’ (2009) 22 Review of Financial Studies 2645. Adrian, Tobias, Begalle, Brian, Copeland, Adam and Martin, Antoine, ‘Repo and Securities Lending’ (2011) http://ssrn.com/abstract=1976 327. Aggarwal, Reena, Bai, Jennie and Laeven, Luc, ‘The Securities Lending Market and the Collateral Channel of Monetary Policy Transmission’ (2016) at http://ssrn.com/abstract=2692251. Agarwal, Vikas, Gay, Gerald D and Ling, Leng, ‘Window Dressing in Mutual Funds’ (2014) at http://ssrn.com/abstract=1804939. Aggarwal, Reena, Erel, Isli and Starks, Laura T, ‘Influence of Public Opinion on Investor Voting and Proxy Advisors’ (2014) at http:// papers.ssrn.com/sol3/papers.cfm?abstract_id=2447012. Agle, Bradley R, Donaldson, Thomas, Freeman, R Edward, Jensen, Michael C, Mitchell, Ronald K and Wood, Donna J, Towards Superior Stakeholder Theory (2008) 18 Business Ethics Quarterly 159. Aglietta, Michel, ‘Sovereign Wealth Funds and the Mutation of Global Finance’ (2014) 8 Law and Financial Markets Review 282. 447 Roger M. Barker and Iris H.-Y. Chiu - 9781784713522 Downloaded from Elgar Online at 09/27/2021 05:11:36PM via free access Columns Design XML Ltd / Job: Barker-Corporate_governance_and_investment_management / Division: 10-bibliography /Pg. Position: 1 / Date: 13/10 JOBNAME: Barker PAGE: 2 SESS: 6 OUTPUT: Fri Nov 17 12:14:20 2017 448 Corporate governance and investment management Aglietta, Michel, Brière, Marie, Rigotc, Sandra, Signori, Ombretta ‘Rehabilitating the Role of Active Management for Pension Funds’ (2012) at http://ssrn.com/abstract=1948726. Agrawal, Ashwini K, ‘Corporate Governance Objectives of Labor Union Shareholders: Evidence from Proxy Voting’ (2011) 25 Review of Financial Studies 187. Ahmadov, Ingilab, Tsani, Stela and Aslanli, Kenan, Sovereign Wealth Funds: New Challenges for Caspian Countries (Baku 2011) at http:// www.resourcegovernance.org/sites/default/files/SWFs-Caspian-Countries. pdf. Ahmandov, Ingilab and Asnali, Kenan, ‘State Oil Fund of Azerbaijan Republic: Past, Present and Future’ in Ingilab Ahmadov et al, Sover- eign Wealth Funds: New Challenges for Caspian Countries (Baku 2011) at http://www.resourcegovernance.org/sites/default/files/SWFs- Caspian-Countries.pdf. Aizenmann, Joshua and Glick, Reuven, ‘Sovereign Wealth Funds: Styl- ized Facts About Their Determinants and Governance’ (NBER Working Paper 2008) at http://www.nber.org/papers/w14562. Akinbami, Folarin, ‘Retail Financial Products in the Global Financial Crisis’ (2012) at http://papers.ssrn.com/sol3/papers.cfm?abstract_id= 2087548. Albuquerque, Rui, Lei, Zicheng, Rocholl, Jörg and Zhang, Chendi, ‘Institutional Investors and Corporate Political Activism’ (ECGI Work- ing Paper 2016) at http://www.ecgi.org/wp/wp_id.php?id=785&mc_ cid=faf516730b&mc_eid=bad7753e00. Alhashel, Bader, ‘Sovereign Wealth Funds: A Literature Review’ (2015) 78 Journal of Economics and Business 1. Ali, Paul, Ramsay, Ian and Saunders, Benjamin B, ‘Securities Lending, Empty Voting and Corporate Governance’ (2014) at http://ssrn.com/ abstract=2443217. Allen, Franklin and Gale, Douglas, ‘Asset Price Bubbles and Monetary Policy’ (2000) at http://finance.wharton.upenn.edu/~allenf/download/ Vita/apbm.pdf. Allen, Franklin, Qian, Jun Q J, Shan, Susan Chenyu and Zhao, Mengxin, ‘The IPO of Industrial and Commercial Bank of China and the ‘Chinese Model’ of Privatizing Large Financial Institutions’ (2012) 20 European Journal of Finance 599. Allianz Global Investors, Defining the Direction of Defined Contribution in Europe: Results of an Expert Survey (2009). Alternative Investment Market Association (AIMA), Roadmap to Hedge Funds (2008). Amadi, Amir A, ‘Equity Home Bias: A Disappearing Phenomenon?’ (2004) at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=540662. Roger M. Barker and Iris H.-Y. Chiu - 9781784713522 Downloaded from Elgar Online at 09/27/2021 05:11:36PM via free access Columns Design XML Ltd / Job: Barker-Corporate_governance_and_investment_management / Division: 10-bibliography /Pg. Position: 2 / Date: 14/11 JOBNAME: Barker PAGE: 3 SESS: 5 OUTPUT: Fri Nov 17 12:14:20 2017 Bibliography 449 Amornsiripanitch, Natee, Gompers, Paul A and Xuan, Yuhai, ‘More than Money: Venture Capitalists on Boards’ (2015) at http://ssrn.com/ abstract=2586592. Anabtawi, Iman, ‘Some Skepticism about Increasing Shareholder Power’ (2006) 53 UCLA Law Review 561. Anabtawi, Iman, ‘Predatory Management Buy-outs’ (2015) 49 UC Davis Law Review 1287 at http://ssrn.com/abstract=2649192. Anabtawi, Iman and Stout, Lynn, ‘Fiduciary Duties for Activist Share- holders’ (2008) 60 Stanford Law Rev 1255. Andenas, Mads and Chiu, Iris H-Y, The Foundations and Future of Financial Regulation: Governance for Responsibility (Oxford: Rout- ledge, 2014). Anderson, Anne-Marie and Myers, David H, ‘The Cost of Being Good’ (2007) 28 Review of Business 5. Ando, Albert and Modigliani, Franco, ‘The “Life Cycle” Hypothesis of Saving: Aggregate Implications and Tests’ (1963) 53 The American Economic Review 55. Andonov, Aleksandar, Bauer, Rob and Cremers, Martijn, ‘Pension Fund Asset Allocation and Liability Discount Rates’ (2014) at http://ssrn. com/abstract=2070054. Ang, Andrew, ‘The Four Benchmarks of Sovereign Wealth Funds’ (2010) at http://ssrn.com/abstract=1680485. Appel, Ian R, Gormley, Todd R and Keim, Donald B, ‘Passive Investors not Passive Owners’ (2014) at http://www.stern.nyu.edu/sites/default/ files/assets/documents/1%20Gormley%20Passive%20Investors%20Not %20Passive%20Owners.pdf. Arcot, Sridhar, Fluck Zsuzsanna, Gaspar, José-Miguel and Hege, Ulrich, ‘Fund Managers under Pressure: Rationale and Determinants of Sec- ondary Buyouts’ (2014) at http://ssrn.com/abstract_id= 2332801. Argenti, John, ‘Stakeholders: The Case Against’ (1997) 30 (3) Long Range Planning 442. Armour, John and Cheffins, Brian, ‘The Rise and Fall (?) of Shareholder Activism by Hedge Funds’ (2012) 14 Journal of Alternative Invest- ments 17. Armour, John and Cheffins, Brian, ‘The Rise and Fall (?) of Shareholder Activism by Hedge Funds’ (2009) at http://papers.ssrn.com/sol3/ papers.cfm?abstract_id=1489336. Armour, John and Payne, Jennifer (eds), Rationality in Company Law: Essays in Honour of DD Prentice (Oxford: Hart Publishing, 2009). Armour, John and Skeel, David Jnr, ‘Who Writes the Rules for Hostile Takeovers, and Why-The Peculiar Divergence of US and UK Takeover Regulation’ (2006) 95 Georgetown Law Journal 1727. Roger M. Barker and Iris H.-Y. Chiu - 9781784713522 Downloaded from Elgar Online at 09/27/2021 05:11:36PM via free access Columns Design XML Ltd / Job: Barker-Corporate_governance_and_investment_management / Division: 10-bibliography /Pg. Position: 3 / Date: 13/10 JOBNAME: Barker PAGE: 4 SESS: 5 OUTPUT: Fri Nov 17 12:14:20 2017 450 Corporate governance and investment management Armour, John and Whincop, Michael, ‘The Proprietary Foundations of Corporate Law’ (2007) Oxford Journal of Legal Studies 429. Armour, John, Black, Bernard, Cheffins, Brian and Nolan, Richard, ‘Private Enforcement of Corporate Law: An Empirical Comparison of the UK and US’ (2009) 6 Journal of Empirical Legal Studies 687. Arrow, Kenneth J, Social Choice and Individual Values (Conn: Yale University Press 1970, 2nd edn). Arup, Christopher, ‘The Global Financial Crisis: Learning from Regula- tory and Governance Studies’ (2010) 32 Law and Policy 363. Aspen Institute, Overcoming Short-termism: A Call for a More Respons- ible Approach to Investment and Business Management (2009) at http://www.aspeninstitute.org/publications/overcoming-short-termism- call-more-responsible-approach-investment-business-management. Assa, Jacob, ‘Financialization and its Consequences: The OECD Experi- ence’ (2012) 1 Finance Research 35. Association of British Insurers, Improving Corporate Governance and Shareholder Engagement (July 2013). Association of Member Nominated Trustees (AMNT), Red Lines Voting (2016) at http://amnt.org/red-line-voting/. Asthana, Sharad and Lipka, Roland, ‘Management of Defined-Benefit Pension Funds and Shareholder Value’ (2003) 41 Quarterly Journal of Business and Economics 49. Atanosova, Christina V and Gatev, Evan, ‘Risk-taking of Institutional Investors: Evidence from US Defined Benefit Pension Plans’ (2010) at http://ssrn.com/abstract=1570925. Australian Securities and Investments Commission, Regulatory Guide 128: Collective Action by Investors (June 2015) at http://download. asic.gov.au/media/3273670/rg128-published-23-june-2015.pdf?_ga=1.4 889715.1711037398.1455118322. Avgouleas, Emilios, ‘The Global Financial Crisis, Behavioural
Recommended publications
  • Scams and Frauds Targeting Residents and Businesses
    May 2015 SCAMBOOK SCAMS AND FRAUDS TARGETING RESIDENTS AND BUSINESSES Tamworth Neighbourhood Watch Don Palmer Community Engagement Co-ordinator. May 2015 Page 1 ‘A CONFIDENCE TRICK or SCAM is an attempt to defraud a person or group after first gaining their confidence’ - Wikipedia While conventional crime is falling, there is an increasing likelihood of becoming a victim of a scam. The offenders range from single individuals to international organised crime groups. Some are very obvious, including spelling mistakes and grammatical errors; others can be extremely convincing. The proceeds are huge. The victims can be anyone, whether elderly, vulnerable, someone caught off guard or short of money, or someone simply responding to a request for help. Keep one step ahead, and don’t be taken in. For further advice and to report any such scams and frauds, contact Action Fraud at; www.actionfraud.police.uk or on 101. For regular alerts and updates from Neighbourhood Watch about scams such as these, and crimes in your area, register your details at; www.owl.co.uk, or via 101. May 2015 Page 2 1. ‘CHINESE INVESTMENT’ SCAM You receive a letter, supposedly from someone working for an investment bank in China or Hong Kong, dealing with the estate of a deceased person with the same surname as you. He wants to use your bank account to pay in the funds (usually millions) and will split 50/50. He urges you to keep it confidential. He needs your bank details, and payments in advance. 2. ‘LOTTERY WINNER’ SCAM You receive a letter or email, suggesting you have won a large amount in a lottery.
    [Show full text]
  • File Complaint About Internet Money Fraud
    File Complaint About Internet Money Fraud Inscrutable and napping Rourke always buds matrimonially and democratizing his tranquilization. Christie remains nonbelligerent after Ike cold-chisel episodically or organized any picker. Sometimes plastics Nevin devitalizing her fledgeling usward, but surreal Averil gip spinelessly or desilverize haphazardly. You may file a complaint online with the Michigan Attorney General's Consumer. If we can be compensated, product at atms and emails may take to exploit vulnerabilities with cybercrime case fake profile for assistance where appropriate. You amend a product online on an auction site having similar level receive an offer it another user of repair site. Emails might sometimes people about fraud complaint with complaints filed in your computer systems, filing fraudulent loans or username or which helps international certified financial frauds? Scam artists in the United States and strain the world defraud millions of people even year. Do business with companies you know or that come recommended by those you trust. You can provide a phone number where creditors can reach you to verify your identity before they proceed. Investment fraud can involve stocks bonds notes commodities currency or. Please enter your comment! In 2019 650570 or 20 percent of all complaints were related to identity theft. Protect business and Medicare against row by reviewing your Medicare claims for errors and reporting anything suspicious. Finally, be sure to probe what services will and provided, you can the one to consult is free transfer a lot fee through each county with state Bar Association. The credit reporting company you contact will automatically report the fraud alert to the other credit reporting companies.
    [Show full text]
  • Chapter 2: Nature, Prevalence and Economic Impact of Cyber Crime
    2 Nature, Prevalence and Economic Impact of Cyber Crime Introduction 2.1 This chapter addresses the nature, prevalence and economic impact of cyber crime. 2.2 The problem of cyber crime crosses many traditional technical, conceptual and institutional boundaries, and, due to its prevalence, has real and increasing social and economic impacts on all Australians. The chapter concludes that because of the inter-related nature of the different aspects of cyber crime, a more holistic and strategic approach must be taken to its prevention. Nature of cyber crime 2.3 This section demonstrates that cyber crime is highly complex, self- reinforcing, technologically advanced, geographically widespread and indiscriminate by examining the history, tools, industrial nature, perpetrators and victims of cyber crime. 10 HACKERS, FRAUDSTERS AND BOTNETS: TACKLING THE PROBLEM OF CYBER CRIME Cyber crime and the Internet 2.4 Mr Peter Watson, Microsoft Pty Ltd, told the Committee that the Internet, by its very design, is an inherently vulnerable network which has enabled cyber crime to flourish in a new virtual ‘Wild West’ environment.1 2.5 The Internet originated from a relatively basic network set up to share information between trusted people and organisations for military and academic purposes, with no view to the security of the computers attached to these networks, nor the information stored on these computers.2 2.6 Today, this open and insecure system has evolved into a world wide network, directly connecting in excess of one billion users, and is employed
    [Show full text]
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]
  • The Fashion Industry As a Slippery Discursive Site: Tracing the Lines of Flight Between Problem and Intervention
    THE FASHION INDUSTRY AS A SLIPPERY DISCURSIVE SITE: TRACING THE LINES OF FLIGHT BETWEEN PROBLEM AND INTERVENTION Nadia K. Dawisha A dissertation submitted to the faculty of the University of North Carolina at Chapel Hill in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Communication in the College of Arts and Sciences. Chapel Hill 2016 Approved by: Patricia Parker Sarah Dempsey Steve May Michael Palm Neringa Klumbyte © 2016 Nadia K. Dawisha ALL RIGHTS RESERVED ii ABSTRACT Nadia K. Dawisha: The Fashion Industry as a Slippery Discursive Site: Tracing the Lines of Flight Between Problem and Intervention (Under the direction of Dr. Patricia Parker) At the intersection of the glamorous façade of designer runway shows, such as those in Paris, Milan and New York, and the cheap prices at the local Walmart and Target, is the complicated, somewhat insidious “business” of the fashion industry. It is complicated because it both exploits and empowers, sometimes through the very same practices; it is insidious because its most exploitative practices are often hidden, reproduced, and sustained through a consumer culture in which we are all in some ways complicit. Since fashion’s inception, people and institutions have employed a myriad of discursive strategies to ignore and even justify their complicity in exploitative labor, environmental degradation, and neo-colonial practices. This dissertation identifies and analyzes five predicaments of fashion while locating the multiple interventions that engage various discursive spaces in the fashion industry. Ultimately, the analysis of discursive strategies by creatives, workers, organizers, and bloggers reveals the existence of agile interventions that are as nuanced as the problem, and that can engage with disciplinary power in all these complicated places.
    [Show full text]
  • Cyber Frauds, Scams and Their Victims 1St Edition Pdf, Epub, Ebook
    CYBER FRAUDS, SCAMS AND THEIR VICTIMS 1ST EDITION PDF, EPUB, EBOOK Mark Button | 9781138931206 | | | | | Cyber Frauds, Scams and their Victims 1st edition PDF Book Defamation Invasion of privacy Intrusion on Seclusion False light Breach of confidence Abuse of process Malicious prosecution Alienation of affections Criminal conversation Seduction Breach of promise. Big Data Saswat Sarangi author Apart from fraud, there are several related categories of intentional deceptions that may or may not include the elements of personal gain or damage to another individual:. While the precise definitions and requirements of proof vary among jurisdictions, the requisite elements of fraud as a tort generally are the intentional misrepresentation or concealment of an important fact upon which the victim is meant to rely, and in fact does rely, to the harm of the victim. Given the international nature of the web and ease with which users can hide their location, obstacles to checking identity and legitimacy online, and the variety of hacker techniques available to gain access to PII have all contributed to the very rapid growth of Internet fraud. April Cyber security officials in the UK begin to worry as the BBC demonstrates how easy it is to purchase fraudulent rail tickets via the dark web. A year-old-boy was arrested in Northern Ireland for attempting to purchase a Soviet era submachine gun on the dark web. Retrieved 18 September Compounding Malfeasance in office Miscarriage of justice Misprision Obstruction Perjury Perverting the course of justice. Beyond laws that aim at prevention of fraud, there are also governmental and non-governmental organizations that aim to fight fraud.
    [Show full text]
  • Genres of Financial Capitalism in Gilded Age America
    Reading the Market Peter Knight Published by Johns Hopkins University Press Knight, Peter. Reading the Market: Genres of Financial Capitalism in Gilded Age America. Johns Hopkins University Press, 2016. Project MUSE. doi:10.1353/book.47478. https://muse.jhu.edu/. For additional information about this book https://muse.jhu.edu/book/47478 [ Access provided at 28 Sep 2021 08:25 GMT with no institutional affiliation ] This work is licensed under a Creative Commons Attribution 4.0 International License. Reading the Market new studies in american intellectual and cultural history Jeffrey Sklansky, Series Editor Reading the Market Genres of Financial Capitalism in Gilded Age America PETER KNIGHT Johns Hopkins University Press Baltimore Open access edition supported by The University of Manchester Library. © 2016, 2021 Johns Hopkins University Press All rights reserved. Published 2021 Printed in the United States of America on acid-free paper Johns Hopkins Paperback edition, 2018 2 4 6 8 9 7 5 3 1 Johns Hopkins University Press 2715 North Charles Street Baltimore, Maryland 21218-4363 www.press.jhu.edu The Library of Congress has cataloged the hardcover edition of this book as folllows: Names: Knight, Peter, 1968– author Title: Reading the market : genres of financial capitalism in gilded age America / Peter Knight. Description: Baltimore : Johns Hopkins University Press, [2016] | Series: New studies in American intellectual and cultural history | Includes bibliographical references and index. Identifiers: LCCN 2015047643 | ISBN 9781421420608 (hardcover : alk. paper) | ISBN 9781421420615 (electronic) | ISBN 1421420600 [hardcover : alk. paper) | ISBN 1421420619 (electronic) Subjects: LCSH: Finance—United States—History—19th century | Finance— United States—History—20th century.
    [Show full text]
  • TBJ Internet Scam Article Ellen Pitluk+Clean
    Is The Confidence Man Your Client? Con artists excel on the internet at making lawyers their marks. The conditions of anonymity, confusion and an increase in movable wealth (paper currency) during the antebellum decades (1815-1860) of New York City fostered an opportunity for the likes of one genteel gentleman named William Thompson to approach complete strangers on the streets, engage them in pleasant conversation, and then walk away with their watches, which they voluntarily “loaned” him while mistaking Mr. Thompson for a trustworthy acquaintance.1 The New York Herald announced the “Arrest of the Confidence Man” in the Police Intelligence section of its July 8, 1849 newspaper.2 Hence the moniker, “con man” (or “con artist” for any gender) was coined. At the time, New York City was a growing urban society in some ways similar to today’s growing global society. What once was possible for Mr. Thompson among the pedestrians on the streets of New York is now possible among sophisticated con artists in the traffic on the internet. Both provide anonymity, confusion and moveable currency. The confidence game (also known more colorfully as the con, bamboozle, flim flam, swindle, grift, hustle, gaffle and scam) involves the con artist and his or her accomplices, known as shills.3 Its marks (or victims) are from all walks of life, including educated professionals.4 Lawyers have become victims of increasingly sophisticated fake clients, who sometimes use shills, fake websites, and identity theft to legitimize their scams.5 At the heart of the scam is an unsolicited e-mail from a prospective, and typically, foreign client who needs what appears to be legitimate legal help, such as paying or collecting a debt, settling a contract dispute, or obtaining a divorce.6 The lawyer and fake client enter into an agreement for legal services and attorney’s fees.
    [Show full text]
  • Human Hacking As Social Engineering Carina Franca Posted on April 25, 2013 08:00
    Human Hacking as Social Engineering Carina Franca posted on April 25, 2013 08:00 Knowledge is power. This is especially true when you are trying to keep personal information safe in a cyber-world where human hacking and social engineering have become the norm. Social engineering as an act of psychological manipulation had previously been associated with the social sciences, but its usage has caught on among computer professionals.1 In the context of security, social engineering is understood to be the art of manipulating people into performing actions or divulging confidential information.2 While it is similar to a confidence trick or simple fraud, it is typically trickery or deception for the purpose of information gathering, fraud, or computer system access. In most cases the attacker never comes face-to-face with the victims. For the most part, people are trusting and tend to give others the benefit of the doubt before they make judgments of people they meet but do not know. Because of their trusting nature, cyber-criminals take advantage of individuals. Cyber-attacks can come from a variety of methods, such as in person, through an email system, and over the phone. As an example, imagine a hacker has targeted your business. His reason could be for financial gain, data extraction, or something else. Since the hacker cannot gain physical access into your facility, he chooses to download a virus onto a USB flash drive. He then puts dozens of them in your company parking lot. He patiently waits for one employee, with a curious mind, to pick up the USB drive, take it inside, and insert it into a computer.
    [Show full text]
  • Secureworks State of Cybercrime Report 2017
    REPORT State2017 of Cybercrime Exposing the threats, techniques and markets that fuel the economy of cybercriminals Contents Foreword 3 Introduction 4 Key Findings 5 Cybercrime 1. Business Email Compromise 7 2. Ransomware 9 3. Banking Malware 12 4. Mobile Malware 20 Criminal Landscape 5. Organized Cybercrime 22 6. Diverse Roles 23 7. Gap Between Criminality and Nation-States 25 8. Money Muling 27 Online Crime — A Market Economy 9. Commodities 30 10. Spam Botnet Usage 34 11. Exploit Kit Activity Decline 37 Conclusion 39 Glossary of Terms 40 About Secureworks 41 2 © 2017 Secureworks, Inc. All rights reserved. Foreword Foreword Secureworks has been tracking cybercrime activity for more than 10 years and, as we monitor this activity to protect our clients, we collect a large amount of data on both the criminals and their infrastructure and systems. This annual report presents an overview of the cybercrime landscape and trends we observed primarily from the period of mid-2016 to May 2017, in addition to a handful of other trends ranging from 2015 to 2016. The unique and valuable intelligence shared in this report stems from the visibility gained from our thousands of clients, the machine learning and automation from our industry-leading Counter Threat Platform™, and the actionable insights from our team of elite Counter Threat Unit™ (CTU) researchers, analysts and consultants. We call this the Network Effect, and it is the unparalleled power and protection of this Network Effect which enables us to prevent security breaches, detect malicious activity in real time, respond rapidly and predict emerging threats. Secureworks’ goal in publicly sharing this report’s findings is to help all organizations better protect themselves from current and emerging cyber threats; to help make them become Collectively Smarter.
    [Show full text]
  • Wire Fraud in Real Estate Transactions
    Wire Fraud in Real Estate Transactions Craig Goldenberg Senior Division President Craig Goldenberg Senior Division President – Direct Operations in ME, NH, NY, NJ, MD, DC, VA Division President of New York Direct Operations CIO of Stewart Title Insurance Company Email: [email protected] Phone: 212.922.0050 Why are we talking about it? Maryland, August 2017: The FBI says fraudsters used fake emails to fool a settlement company into wiring them the proceeds of the sale of a couple’s home. Amount lost: $411,548 New York, June 2017: A judge trying to sell her apartment received an email she thought was from her real estate lawyer telling her to wire money to an account. Amount lost: $1 million. Washington, D.C., May 2017: The homebuyers sued the title company for the lost money, but also close to $5 million for an alleged violation of the RICO Act. The title company, which denies it had anything to do with the money going missing, said that it immediately contacted the FBI when the attack was discovered. Amount lost: $1.57 million. Why are we talking about it? Colorado, March 2017: A couple, who lost their life savings while trying to buy their dream retirement home, has filed suit alleging that none of the companies involved in the transaction—including a title company—did enough to protect sensitive financial information. Amount lost: $272,000 Minneapolis, September 2016: A retired couple hoping to buy a townhouse to be closer to their grandchildren received an email that looked like it came from the title company with instructions to wire money before the closing.
    [Show full text]
  • ICC Fraudnet GLOBAL REPORT 2021
    GLOBAL REPORT 2021 International Developments and Perspectives in the field of Fraud, Financial Crime and Asset Recovery Acknowledgments Many individuals and organisations have been of great assistance in the writing, editing and production of the inaugural FraudNet Global Report. The Editor first wishes to thank FraudNet’s Members and Strategic Partners who have authored and co-authored articles for inclusion in this publication, as well as their colleagues and staff who have assisted them. FraudNet’s unparalleled international reach and subject expertise in fraud and asset recovery are well captured in this Report, and it is testament to the collective energy of the group that such wide-ranging insights were provided for this Report from so many countries, particularly in these unprecedented times. The Editor secondly wishes to thank Mr Peter Lowe, Executive Secretary of FraudNet for his support from the inception of this project right through to publication. His operational assistance, and acute understanding of the expertise and resources available within FraudNet has been greatly valued during the collation of papers. Further thanks are owed to Mr Michele Caratsch and Mr Babajide Ogundipe for their help throughout the strategic stages, and work in convening and being part of, along with Mr Peter Lowe, a very supportive Editorial Board. The Editor wishes to thank all members of the Editorial Board – Mr Bobby Banson, Mr Shaun Reardon-John, Mr Rodrigo Callejas, Mr Waseem Azzam, Mr Christopher Redmond and Mr John Greenfield – for their time, guidance and energy for this project. Gratitude is also extended to Mr Bruce Horowitz, whose support as an Assistant Editor has been significantly valued during the review and editorial stages, and also Mr Andrew Witts for his guidance.
    [Show full text]