Toll fraud And Prevention

Masters
Essay
Miscellaneous
Pages 2 (502 words)
Download 0
2. Problem Setting - Telephone or mobile is a technology that almost everyone uses in the home, at work or on the move. Traditionally, telephone is a simple one-to-one or one to many communication technology but it is now offered with enhancements that include video, chat, file passing and file sharing where suppliers are attempting to present a complete communication environment over mobile or landline.

Introduction

The intention is therefore is to fool the company and the colleague to satisfy his personal needs rather than the intended use.
4. Real-World Target - Increase the awareness among the employees and other telephone users about the nefarious activity of toll fraud and hence help prevent identity theft occurring and therefore reducing cases of fraud.
6. Speculation - Toll fraud might be combated in several ways: user training, detection schemes, regular monitoring of internal extensions and issuing a personal authorization code for every employee according to the requirement and only then any long distance call be matured. Sending bills regularly to the employee and ensuring payment for the calls made for personal use.
7. Intended Project Outcome - my expected form of outcome will be a set of guidance notes for all the employees and also individuals using the public switched telephone network on effective strategies to use (including examples) in the event of a Toll fraud incident occurring.
8. Design for Collecting Primary Data - Any employee making an outbound call will be tracked by his authorization code and the extension from where he is making an out bound call. With this we can track the person trying to fool the company and the colleagues pass code to make outbound call. ...
Download paper
Not exactly what you need?

Related papers

The Internal Analysis about Toll Group of Asia
This study will also focus on the strength, weakness and the threats to the Toll Asia.…
Computer Fraud
Finally, we present our views on how individual computer users and businesses can help in the successful implementation of various anti-fraud programs.…
Literature Review & Project Specification
To date there are very few routes in the Internet that support fully ATM-based backbone transmission, fast routers, QoS (Quality of Service) services and/or un-congested bandwidth resources. Yet VOIP is already being used. VOIP can be viewed as an opportunistic parasite on the existing telephone system. This view will be further borne out as we examine other opportunities that have been seized by…
Toll Like Receptor
In 1989, Charles Jeneway published it classical paper discussing inate immunity and establishes the fact that recognition of pathogen is done by germline-encoded receptors and not the recombinant antigen receptors (Janeway, 1989) He establishes the role of co stimulatory molecules or signals responsible for T cell activation. After extensive research of almost 20 years we have identified that co-…
The Economic Rationale for Toll Roads
It will analyze the benefits and cost that are associated with tolling which is used widely in the world. But first let us take a close look at road transport system in the world n order to understand the rationale behind tolling.…
internal analysis on Toll Singapore
Supply chain management (SCM) is a developed discipline viewed as the management of a system of interlinked businesses working together in the core goals of providing essential services and products to target clientele or markets within the service provision base and precincts of the participating business entities. Various scholars have had their contributions on the concepts of SCM. There are…
Toll fraud And Prevention
The intention is therefore is to fool the company and the colleague to satisfy his personal needs rather than the intended use.…