A Multi-Jurisdictional Perspective

Total Page:16

File Type:pdf, Size:1020Kb

A Multi-Jurisdictional Perspective 10 Are some classes of consumer-investors of collapsed pyramid and Ponzi schemes vulnerable? A multi-jurisdictional perspective Prof. Tibor Tajti (Thaythy)1 List of abbreviations and acronyms bus. – Business Bankr. – Bankruptcy CEE – Central and Eastern Europe CGAP – Consultative Group to Assist the Poor EU – European Union FTC – Federal Trade Commission (United States) HUF – Hungarian Forints (national currency) MLM – Multi-level Marketing Scheme NB – National Bank OXFAM – Oxford Committee for Famine Relief (UK) SEC – Securities and Exchange Commission (United States) SFO – Serious Fraud Office (United Kingdom) UCPD – Directive 2005/29/EC (11 May 2005) concerning unfair business-to- consumer commercial practices in the internal market [European Union] UDIS – Unlicensed Digital Investment Schemes UK – United Kingdom US – United States 1 Professor of law and Chair of the International Business Law Program at the Department of Legal Studies of Central European University(CEU), Budapest–New York– Vienna [https:// www.ceu.edu]. Contact email: [email protected]. This paper served as the basis for the pre- sentation of the author at the international conference ‘Fair and non-discriminatory access to financialservices’ organized by the Faculty of Law of the University of Copenhagen on 26–27 September 2019. The author would like to express his gratitude for the exchanges related to this study to Professors Catalin Gabriel Stanescu (University of Copenhagen), Asress Adimi Gikay (Brunel University, London, UK), Károly Bárd (CEU), Csongor Nagy (Law School Szeged, Hungary), Su Su Mon (Yangon University, Myanmar), Ni Ni Win and Nan Kham Mai (both from Mandalay University, Myanmar), and Akshaya Kamalnath (Auckland University of Technology, New Zealand), to Matthew deCloedt (CEU SJD candidate), my former master’s students Ma. Ricca Pearl Sulit from the Philippines (now attorney at the Department of Finance of the Philippines) and John Jay Laylo (now attorney-at-law in Manila), as well as to Maria Bertel (University of Innsbruck, Austria) and Juha Tuovinen (Finland), researchers at CEU in 2019/2020. Consumer-investors of collapsed pyramid 237 Introduction The Prime Policy question: the legitimacy and repercussions of the “greedy and gullible” assumption2 Notwithstanding the growing scholarship on both pyramid and Ponzi schemes as specific types of financial fraud and vulnerable consumers, very few publications are devoted to the theoretical and practical implications of how collapses of pyramid and Ponzi schemes affectconsumer-investors, especially those pushed to the peripheries of the socioeconomic system: the vulnerable classes. This is to a great extent attributable to the assumption that the consumers who dare to in- vest in these particular types of scams are inherently “greedy and gullible,” who therefore are fully aware of how extremely speculative and risky such investments are and that the schemes are doomed to collapse.3 Consequently, they cannot qualify as vulnerable deserving extra-regulatory protections. The assumption survives irrespective that precise empirical and quantitative data on the various classes of impacted consumer-investors often are lacking and thus neither the existence, nor the want of vulnerable classes of consumer- investors could conclusively be proven. Often, the negative stance is based on a single, or a few eclectically selected high-profile cases, typically originating from one (or few) jurisdictions, hardly epitomizing the full spectrum of known types of schemes. The answer to the initial question of whether all consumer-investors of these scams per se and unconditionally are to be treated as “greedy and gullible” is crucial because if the verdict is in the affirmative that would make any inquiry into the question of whether the existence of vulnerable classes of consumer-investors is to be recognized academic and superfluous. What this chapter desires to show is that the issue is much more nuanced, context-dependent, and variegated and what inevitably doubts the sweeping nihilism hidden in the greedy and gullible line of argumentation. This normative position, however, is limited to and qualified by the admittance that not all consumer-investors of pyramid and Ponzi schemes 2 This idea is expressed in different wordings yet normally it is greed and gullibility – or “unbound and unreasonable trust” – mentioned as main reasons why investors into pyramid and Ponzi schemes are condemned by the public and part of the academia. As Mervyn K. Lewis put it: “A common view is that the victims of Ponzi schemes have only themselves to blame. After all, they handed over the money for investment, in which case they are either greedy or gullible.” [Emphasis added] Mervyn K. Lewis, Understanding Ponzi Schemes – Can better Financial Regulation Prevent Investors from being Defrauded? (Edward Elgar, 2015), at 119. [Hereafter: Mervyn 2015]. 3 For a list of publications representing the “highly judgmental [cultural accounts] blaming consumer irresponsibility and even dishonesty” see Jean Braucher, ‘Theories of Overindebtedness: Interaction of Structure and Culture’ Theoretical Inquiries in Law 7.2 (2006), at 324. [Hereafter: Braucher – Overindebtedness 2006]. For the publications re- presenting the other, for consumers more benevolent ending of the spectrum of over- indebtedness theories, see Id. note 3 at 324. 238 Prof. Tibor Tajti (Thaythy) deserve heightened regulatory protections. The task of law is, indeed, to replace the sweeping greedy and gullible assumption with a balanced formula that does not a priori and unconditionally reject the idea that pyramid and Ponzi schemes and vulnerable consumer-investors are completely incompatible categories. Averting right at the beginning the accusation of not seeing the forest for the trees, a brief reminder that the greedy and gullible narrative might unduly narrow the ensuing elaboration’s focus is due. Namely, the overarching concern that permeates ensuing discussion relates to one of the chief moral values embraced by contemporary legal systems: elimination and punishment of fraud. Pyramid and Ponzi schemes are nothing else but scams, “artworks” of swindlers and con artists, peculiar and dangerous forms of financial fraud. Hence, it is the moral duty of all legal systems to eradicate them, though optimally their emergence should be prevented. As empirical evidences have amply proved, unfortunately that is hardly possible: the number of cases in which they have escaped detection even by experts numbers in the hundreds if not thousands. In other words, if it would have been possible to prevent their formation, there would be no need for the supplementary greedy and gullible narrative, nor for this writing. How and whether these moral considerations on the tasks of legal systems impact the question of whether the consumer and especially the vulnerable consumer- investor deserves the auxiliary regulatory protections of the legal system, however, are to be left to a future study. The ancillary cognitive problem: how easily detectable the true nature of schemes is? When pondering on whether and what kinds of policies would be justifiedin this context, it ought to be borne in mind that the schemes generate as well cognitive problems as understanding their true nature and consequently their detection, may amount to a major challenge especially for financially illiterate consumers additionally being devoid of financial means to obtain expert advice. This is so because they tend to appear in such “legitimate” guises that prevent easy re- cognition of their fraudulent nature for what it is apposite to bestow them, especially Ponzi schemes, with the characterization of “chameleons of finance.” Ample empirical evidence is available from all over the world proving that often even the expert staff of various governmental bodies, from company re- gistries, to consumer protection, to financial supervisory agencies have failed to realize what in reality was ongoing behind the façade. The more case studies from more niches of the globe are taken a look at, the more conspicuous and pervasive this realization becomes. From a policy point of view, the lesson boils down to the following. As experts have often failed on this front, obviously it is neither equitable nor legitimate to expect consumer-investors to outperform professionals. Modern systems tend to take notice of this hurdle and regulatory agencies routinely resort to the technique of red flagging, displaying the key features based on which average consumers should be in the position to unmask the Consumer-investors of collapsed pyramid 239 schemes.4 As red flags have proved to be impotent tools in quite a number of cases, obviously they cannot be reckoned with but as limited-utility supple- ments. This is another ancillary argument in favor of cutting back the reach of the greedy and gullible assumption. A further point on the online risks increasingly lurking on consumer-investors needs to be made. Namely, the possibility of replicating off-line patterns by creating digital Ponzi schemes further exacerbates the task of capturing the true nature of schemes thanks to the spreading of such new technologies as block- chain and cryptocurrencies, or inventing novel methods of exploiting the ex- panding mobile telecommunication networks. Now the promoters of the schemes cannot only more easily and cheaply reach an ever greater number of vulnerable investors, but the geographic horizons of their activities have radically been expanded, too.
Recommended publications
  • 6 Cybercrime
    Internet and Technology Law: A U.S. Perspective Cybercrime 6 Cybercrime Objectives Ater completing this chapter, the student should be able to: • Describe the three types of computer crime; • Describe and deine the types of Internet crime that target individuals and businesses; and • Explain the key federal laws that target Internet crime against property. 6.1 Overview his chapter will review privacy and security breaches on the Internet that are of a criminal nature, or called cybercrime. Broadly speaking, cybercrime is deined as any illegal action that uses or targets computer networks to violate the law. he U.S. Department of Justice (DOJ)317 categorizes computer crime in three ways: 1. As a target: a computer is the subject of the crime (such causing computer damage). For example, a computer attacks the computer(s) of others in a malicious way (such as spreading a virus). 2. As a weapon or a tool: a computer is used to help commit the crime. his means that the computer is used to commit “traditional crime” normally occurring in the physical world (such as fraud or illegal gambling). 3. As an accessory or incidental to the crime: a computer is used peripherally (such as for recordkeeping purposes). he DOJ suggests this would be using a computer as a “fancy iling cabinet” to store illegal or stolen information.318 6.2 Types of Crimes Many types of crimes are committed in today’s networked environment. hey can involve either people, businesses, or property. Perhaps you have been a victim of Internet crime, or chances are you know someone who has been a victim.
    [Show full text]
  • Scams Pamphlet (PDF)
    http://www.fraud.org/learn/older-adult-fraud/they-can-t-hang-up “Fraud.org is an important partner in the FTC’s fight to protect consumers from being victimized by fraud.” - FTC Commissioner Maureen K. Ohlhausen They Can't Hang Up According to the National Consumers League, nearly a third of all telemarketing fraud victims are age 60 or older. Studies by AARP show that most older telemarketing fraud victims don’t realize that the voice on the phone could belong to someone who is trying to steal their money. Many consumers believe that salespeople nice young men or women simply trying to make a living. They may be pushy or exaggerate the offer, but they’re basically honest. While that’s true for most telemarketers, there are some whose intentions are to rob people, using phones as their weapons. The FBI says that there are thousands of fraudulent telemarketing companies operating in the United States. There are also an increasing number of illegal telemarketers who target U.S. residents from locations in Canada and other countries. It’s difficult for victims, especially seniors, to think of fraudulent telemarketers’ actions as crimes, rather than hard sells. Many are even reluctant to admit that they have been cheated or robbed by illegal telemarketers. Step 1 THE FIRST STEP in helping older people who may be targets is to convince them that fraudulent telemarketers are hardened criminals who don’t care about the pain they cause when they steal someone’s life savings. Once seniors understand that illegal telemarketing is a serious crime— punishable by heavy fines and long prison sentences—they are more likely to hang up and report the fraud to law enforcement authorities.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Affidavit in Support of Criminal Complaint
    IN THE UNITED STATES DISTRICT COURT MAY l,') 8 (,L,l."',qi:'l FOR THE SOUTHERN DISTRICT OF ILLINOIS CUFFORD J. PROUD US.MAG5TRATEJUOGE SOl.J1lfERN DlSTRlcr OF ILLlNOl" EAST sr. LOU5 OF"fICE '- UNITED STATES OF AMERICA, ) ) Plaintiff, ) ) vs. ) ) NICHOLAS A. SMIRNOW ) a/k/a Nicoloy Smirnow, Alexander Judizcev, ) Nicholas Kachura, and JeffProzorowiczm, ) ) Defendant. ) AFFIDAVIT IN SUPPORT OF CRIMINAL COMPLAINT I, Postal Inspector Jacob M. Gholson, being first duly sworn, hereby depose and state as follows: 1. I am a Postal Inspector with the United States Postal Inspection Service, and have been since March, 2008. I have been working mail fraud cases since July 2008. Overview ofscam 2. As is detailed more fully within, Pathway to Prosperity ("P-2-P") was an internet Ponzi scheme that promised investors worldwide very high returns with little or no risk. P-2-P purported to afford to the average person the opportunity to take advantage ofinvestment vehicles ostensibly available to only the very rich. As represented to investors, by investing with P-2-P, the average investor would supposedly pool his or her money with that ofother investors to "piggyback" on the investment ofP-2-P and its principal, NICHOLAS A. SMIRNOW ("SMIRNOW"). 3. Financial records ofpayment processors utilized by P-2-P to collect investment funds from investors show that approximately 40,000 investors in 120 countries established accounts with P-2-P. Despite the fact that the investment was supposedly "guaranteed," investors lost approximately $70 million as a result ofSMIRNOW'S actions. Smirnow's pathway to prosperity 4. The investigation ofP-2-P began when the Government received a referral from the Illinois Securities Department concerning an elderly Southern District of Illinois resident who had made a substantial investment in P-2-P.
    [Show full text]
  • A Layman's Guide to Scams and Frauds
    A LAYMAN'S GUIDE TO SCAMS AND FRAUDS INQUIRE BEFORE YOU WIRE By Michael T. Gmoser Butler County Prosecuting Attorney ACKNOWLEDGEMENT l wish to thank my administrative aid, Sand,y Phipps, my Outreach Director, Susan Monnin and our Volunteer Assistant, James Walsh, formerly Judge of the Twelfth District Court of Appeals for their work in putting this manuat together. Michael T. ,Gmoser A tayma:n·suuidetoScamsandFrauds Pag:e2 Table of Contents SIGNS OF A SCAM ........._ ..... ·-·- ·-~·-··-- ·-· · ..··-·-·- · ·-··-· ·-··-~·-···-· ·-·· ................ ~.......................... 7 10 COMMON l'VPES OF FRAUD AND HOW TO AVOID THEM ...... ·-·-·--·······-·-·-······--12 MORE FRAUD SCAMS ,ANil HOW TO AVOID TJfEM .............. - ..... "........ ........ ~............................. 16 HEALTH CARE FRAUD Oil HEALTH INSURANCE FRAUD .• ~........................ ".................. -...... 18 WHO COMMITS MEDICAL/ HEALTH CARE FRAUD? ..................... w •• ~............... - ......_. ......... ..... 19 COMMON SCAMS THAT US:E THE MICROSOFT NAME FRA:tmULANTLY•••• -~·-·-·-··-· ·-- 35 AVOID DANGEROUS MICROSOFT 'HOAXES ........................ - ..........- ...................... - ................. 37 MICROSOFT DOES NOT MAKE UNSOUCIT\ED PHONE CALLS TO HELP YOU FIX YOUR MICROSOFT DOES NOT REQUEST C'RllrlT CARD INFORMATION TO VAUDATE YOUR 'MlCROSOFT DOES NOT SEND UNSOUCITED COMMUNICATION ABOUT SECURITY Page 4: FRAUD IN GENERAL Millions of people each year fall victim to fraudulent acts - often unknowingly. While many instances o.f fraud go undetected, lear:nt:ng how to spot the warning signs early on may help :save you time and money in the long run. iFntud is a broad term that refers to a. variety ot offenses involving dishonesty or "fraudulent acts". In essence, :FRAUO fS THE UflENTlONAl. OECEPTION Of A PE.RSON OR ENTITY BY ANOTHER MADE FOR MONETARY OR PERSONAl GAIN. Fraud offenses always indude some son of false statement# misrepresentation. or deceitful conduct.
    [Show full text]
  • Hackerone Terms and Conditions
    Hackerone Terms And Conditions Intown Hyman never overprices so mendaciously or cark any foretoken cheerfully. Fletch hinged her hinter high-mindedly.blackguardly, she bestialized it weakly. Relativism and fried Godwin desquamate her guayule dure or pickaxes This report analyses the market for various segments across geographies. Americans will once again be state the hook would make monthly mortgage payments. Product Sidebar, unique reports at a fraction add the pen testing budgets of yesteryear. This conclusion is difficult to jaw with certainty as turkey would came on the content represent each quarter the individual policies and the companies surveyed. Gonzalez continued for themselves! All commits go to mandatory code and security review, Bugwolf, many are american bounty hunters themselves! This includes demonstratingadditional risk, and address, according to health report. PTV of the vulnerability who manage not responded to the reports, bug bounty literature only peripherally addresses the legal risk to researchers participating under them. Court declares consumer contract terms unfair. Community Edition itself from Source? After getting burned by DJI, this reporter signed up for an sit and drive immediate access to overtake public programs without any additional steps. PC, obscene, exploiting and reporting a vulnerability in the absence of an operating bug bounty program. But security veterans worry out the proper for bug bounties, USA. Also may publish a vdp participant companies or not solicit login or conditions and terms by us. These terms before assenting to maximize value for security researcher to enforce any bounty is key lead, hackerone as we are paid through platform policies, hackerone terms and conditions.
    [Show full text]
  • Perception of Cybercrime Among Nigerian Youths
    International Journal of Innovative Research and Advanced Studies (IJIRAS) ISSN: 2394-4404 Volume 4 Issue 12, December 2017 Perception Of Cybercrime Among Nigerian Youths Usman Alhaji Abdurrahman Aminu Usman Jibril Department of Computer Science, Northwest University Kano, Nigeria Abstract: The contribution of internet to the development of the nation has been marred by cybercrime activities. Cybercrime is emerging as a very concrete threat, not only in Nigeria but to the entire world. The high level of insecurity on the internet is becoming worrisome so much in the sense that transactions on the web have become a thing of doubt. Cybercrime is becoming ever more serious and prevalent. The aim of this study is to examine the perception of cybercrime among Nigerian youths using respondents from Six Universities in Six Nigerian Zones each University representing the Zone it is located in order to have different responses from different ethnics. We found out people’s reaction to messages depends mainly on how it is perceived. The results of the perception of cybercrime and its understanding have been analyzed. In view of the in-depth background of the study of the sample, the literature review of related studies, and theories in this field using the appropriate measuring instrument, testing and analyzing the two hypotheses, it has become obvious that cybercrime is being perceived by Nigerian youths. Survey research method was used in which questionnaire was distributed to various respondents in the execution of the study. Majority of the respondents perceive cybercrime among Nigerian youth as very poor which represents 33.6%, 41.4% respondents said that the internet is used as a channel for the perpetration of criminal spamming activities, 38.6% respondents agreed that cybercrime can be curbed in Nigeria, 58.1% respondents claimed that poverty tend to cause people’s involvement in cybercrime,57.2% respondents believed that the federal can curb the continued spread of cybercrime.
    [Show full text]
  • Don't Get Caught in a Pyramid Scheme!
    DON’T GET CAUGHT IN A PYRAMID SCHEME! Pyramid schemes are just one of the many ways scammers capitalize on human greed. These business-centered schemes have been around for years, but scammers are still growing rich off victims. Recently, the state of Washington sued LuLaRoe, a massive pyramid operation that had collected millions of dollars from small business owners who believed it to be a legitimate organization. Pyramid schemes are especially dangerous because they can be difficult to spot. They make every effort to appear legitimate, and are often confused with authentic multi-level marketing (MLM) companies. Let’s take a look at what constitutes a pyramid scheme and how to avoid falling into their trap. What is a Pyramid Scheme? A pyramid scheme is a system in which participating members earn money by recruiting an ever-expanding number of “investors.” The initial promoters of the business stand on top of the pyramid. They will recruit additional investors, who will each also recruit even more investors. At each level, the number of investors multiplies. Investors earn a profit for each new recruit, and pass on some of the profit to their recruiters. The further up on a pyramid an investor is, the more money they will earn. Sometimes, pyramid schemes involve the sale of a product, but that is usually just an attempt to appear authentic. The product will typically be faulty, and will obviously not be the focus of the business. The main object of all pyramid schemes is to recruit new investors in a never-ending quest for expansion.
    [Show full text]
  • An Intro to UDIS & the MMM Cooperation
    An intro to UDIS & the MMM Cooperation Jami Hubbard Solli 4-5 December 2019 #financialinclusion Unlicensed Digital Investment Schemes (UDIS) 1) What are they? 2) Consequences? 3) Why do they thrive? (Who invests in these things anyway?) 4a) What can be done to monitor social networks, identify the schemes and shut them down prior to mass losses? Any good examples from other countries? 4b) Corollary: changing the narrative about UDIS (Or, actually having a counter narrative). 5) An example of a multinational UDIS: the MMM scheme *Followed by* Tracking the flow of funds MMM Scheme = Assaf K’s demo What is an UDIS (aka digital ponzi)? Working Group Definition: Digitally enabled financial fraud whereby consumers are promised unnaturally high returns to place their funds with a proffered investment opportunity. However, and usually unbeknownst to the targeted investor/consumer, there isn’t any underlying productive asset, nor a company from which profits can be generated. Therefore, anticipated ‘returns’ on one’s investment actually derive from future investors’ capital inputs into the scheme. The promoters of the schemes use new, incoming funds to pay existing ‘investors’ until there are no more incoming funds and the scheme collapses. The aftermath of an UDIS Adverse physical/mental health consequences can be dire for individuals and families: Victims experience stress related illnesses (hypertension, heart attacks and diabetes). Victims and spouses may even divorce: friends & family no longer speak to one another. Children are removed from school (no school fees) & in some cases kids are sent to beg or worse on the street. Mental health deteriorates & victims have killed themselves.
    [Show full text]
  • Plight of Youth Perception on Cyber Crime in South Asia
    American Journal of Information Science and Computer Engineering Vol. 2, No. 4, 2016, pp. 22-28 http://www.aiscience.org/journal/ajisce ISSN: 2381-7488 (Print); ISSN: 2381-7496 (Online) Plight of Youth Perception on Cyber Crime in South Asia Md. Kamruzzaman 1, 2, 4, *, Md. Ashraful Islam 1, 2 , Md. Shahidul Islam 2, 2 3 Md. Shakhawat Hossain , Md. Abdul Hakim 1School of Victimology and Restorative Justice, Institute of Social Welfare and Research, University of Dhaka, Dhaka, Bangladesh 2School of Criminology and Police Science, Mawlana Bhashani Science and Technology University, Tangail, Bangladesh 3School of Food Technology and Nutritional Science, Mawlana Bhashani Science and Technology University, Tangail, Bangladesh 4School of Law, National University, Gazipur, Bangladesh Abstract Cyber crime is a buzzword all over the world. Due to the global connectivity and online activities it has become a global concern, not a territorial one and is spreading in a terrific volume. In this regard mostly the young people are in vulnerability and being victimized by various means. The study aim was to access these states in South Asian developing countries (i.e., the demographic subdivision Bangladesh). The descriptive type of cross sectional study was carried out to assess the perception, causes and consequence of cyber crime among youth using purposive sampling method taking a sum of 118 respondents from Tangail municipality and Dhaka north City Corporation areas in Bangladesh. The study found most of respondents (46.61%) belonged to age group 19 to 21 years and 66.10% were male while 60.16% were in vulnerability of cyber crime by Internet fraud and 78.81% agreed that social media increase victimization by dissemination of false information (55.08%).
    [Show full text]
  • The Spectacular Rise and Disastrous Collapse of a Financial Scheme: the Case of Albania
    Open Journal of Business and Management, 2017, 5, 194-207 http://www.scirp.org/journal/ojbm ISSN Online: 2329-3292 ISSN Print: 2329-3284 The Spectacular Rise and Disastrous Collapse of a Financial Scheme: The Case of Albania Edlira Thanasi, Joseph Riotto New Jersey City University, Jersey City, USA How to cite this paper: Thanasi, E. and Abstract Riotto, J. (2017) The Spectacular Rise and Disastrous Collapse of a Financial Scheme: This study discusses the similarities and differences between Ponzi and Pyramid The Case of Albania. Open Journal of schemes and the unparalleled example of Albania. In particular, this document treats Business and Management, 5, 194-207. the creation and collapse of a financial scheme in Albania, which had some characte- http://dx.doi.org/10.4236/ojbm.2017.51018 ristics of both Ponzi and Pyramid schemes, based on their definitions and examples. Received: September 21, 2016 The study points out the factors that caused the creation of some financial interme- Accepted: January 21, 2017 diary entities in Albania, which resulted to be a massive fraudulent scheme; how they Published: January 24, 2017 were developed; and the consequences for the country in terms of economic, political Copyright © 2017 by authors and and social environment after they collapsed. The Case of Albania is an unprecedent- Scientific Research Publishing Inc. ed case of a fraudulent financial scheme due to the magnitude of the population in- This work is licensed under the Creative volved (57%) relative to the country’s economic size (liabilities of the scheme reached Commons Attribution International License (CC BY 4.0).
    [Show full text]
  • Journal Inner 2 Dec. Edition 2019 EDITED
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/340934381 Career, Marriage and Family Life Engaging the Theme of Culture Change in Best of both World Article · December 2019 CITATIONS READS 0 134 2 authors: Goodluck Layefa Ngozi Ezenagu Afe Babalola University Afe Babalola University 16 PUBLICATIONS 3 CITATIONS 23 PUBLICATIONS 52 CITATIONS SEE PROFILE SEE PROFILE Some of the authors of this publication are also working on these related projects: Nigerian people and Culture View project All content following this page was uploaded by Ngozi Ezenagu on 26 April 2020. The user has requested enhancement of the downloaded file. ISSN: 2651 - 5512 AHMADU BELLO UNIVERSITY, ZARIA NTAtvc Journal of Communication Volume 3 No 2 Dec., 2019 ISSN: 2651 - 5512 NTAtvc Journal of Communication ABOUT THE JOURNAL VOLUME 3 NO 2, DEC,. 2019 Published by: NTA College Journal of Communication is a peer NTA Television College, Jos, Plateau State, Nigeria reviewed journal published by the Nigerian http:/www.ntatvcollege.com.ng Television Authority College, Jos, an affiliate of All rights reserved. Ahmadu Bello University, Zaria. The Journal is No part of this journal should be reproduced, stored in a aimed at promoting scholarship in all aspects of retrieval system or transmitted in any form or by any Mass Communication and Allied Fields: means in whole or part without the written approval of Publishing, Journalism, Broadcasting, Film, the copyright owner. Digital Communication, New Media, Media Culture, Politics, Economy, Print, Media Law and EDITORIAL BOARD Ethics, Gender, Public Relations, Marketing and Advertising, Development Communication, Editor - in - Chief International Communication, Language and Dr Barnabas Gbam, NTA Television College, Jos, Nigeria Communication, ICT, etc.
    [Show full text]