{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T15:32:31Z","timestamp":1759937551784,"version":"3.41.2"},"reference-count":20,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[1999,12,1]],"date-time":"1999-12-01T00:00:00Z","timestamp":944006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999,12,1]]},"abstract":"<jats:p>This paper examines the issue of fraud on the Internet and discusses three areas with significant potential for misleading and fraudulent practices, namely: securities sales and trading; electronic commerce; and the rapid growth of Internet companies. The first section of the paper discusses securities fraud on the Internet. Activities that violate US securities laws are being conducted through the Internet, and the US Securities and Exchange Commission has been taking steps to suppress these activities. The second section of the paper discusses fraud in electronic commerce. The rapid growth of electronic commerce, and the corresponding desire on the part of consumers to feel secure when engaging in electronic commerce, has prompted various organizations to develop mechanisms to reduce concerns about fraudulent misuse of information. It is questionable, however, whether these mechanisms can actually reduce fraud in electronic commerce. The third section of the paper discusses the potential for fraud arising from the rapid growth of Internet companies, often with little economic substance and lacking traditional management and internal controls. The paper examines the three areas of potential Internet fraud mentioned above and suggest ways in which these abuses may be combated.<\/jats:p>","DOI":"10.1108\/10662249910297750","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:09:54Z","timestamp":1027735794000},"page":"348-360","source":"Crossref","is-referenced-by-count":35,"title":["An analysis of fraud on the Internet"],"prefix":"10.1108","volume":"9","author":[{"given":"C. Richard","family":"Baker","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022012319535398300_B1","unstructured":"AICPA News Release (1998), \u201cRocketroger.com and Roger Clemens hit grand slam with CA WebTrust seal of assurance\u201d, press release issued by the American Institute of CPAs, New York, NY, 30 September."},{"key":"key2022012319535398300_B2","unstructured":"BBC (1999), \u201cInternet scam file\u201d, BBC On\u2010line Network, 7 April, news.bbc.co.uk\/hi\/english\/business\/your_money\/newsid_313000\/313051.stm."},{"key":"key2022012319535398300_B3","unstructured":"Cahners Publishing Company (1998), \u201cAuditing the Website\u201d, Electronic News, Vol. 44 No. 2219, p. 48."},{"key":"key2022012319535398300_B4","unstructured":"Department of Commerce (1998), The Emerging Digital Economy, US Department of Commerce, Washington, DC."},{"key":"key2022012319535398300_B5","unstructured":"Forrester Research (1999), www.forrester.com."},{"key":"key2022012319535398300_B6","unstructured":"Gray, G.L. and Debreceny, R.S. (1998), \u201cThe electronic frontier\u201d, Journal of Accountancy, Vol. 185, May, pp. 32\u20107."},{"key":"key2022012319535398300_B7","unstructured":"Hansell, S. (1998), \u201cA quiet year in the Internet industry\u201d, The New York Times, 28 December, p. C1."},{"key":"key2022012319535398300_B8","unstructured":"High, K. (1999), \u201cWhat the holiday Web boom hid\u201d, Fortune & Your Company, 4 January,  cgi.pathfinder.com\/yourco\/briefs\/0,2246,142,00.html."},{"key":"key2022012319535398300_B9","unstructured":"Kedrosky, P. (1998), \u201cThere\u2019s little but fool\u2019s gold in the Internet boomtown\u201d, The Wall Street Journal, 23 November, p. A22."},{"key":"key2022012319535398300_B10","unstructured":"National Consumers League (1999), Internet Fraud Watch, www.nclnet.org\/Internetscamfactsheet.html."},{"key":"key2022012319535398300_B11","unstructured":"Primoff, W.M. (1998), \u201cElectronic commerce and Webtrust\u201d, The CPA Journal, Vol. 68 November, pp. 14\u201023."},{"key":"key2022012319535398300_B12","unstructured":"SEC (1998), Internet Fraud: How to Avoid Internet Investment Scams, US Securities and Exchange Commission, Washington, DC, October,  www.sec.gov\/consumer\/cyberfr.htm."},{"key":"key2022012319535398300_B13","unstructured":"SEC v. John Wesley Savage et al. (1998), www.sec.gov\/enforce\/litigrel\/lr15954.txt."},{"key":"key2022012319535398300_B14","unstructured":"SEC v. The Future Superstock et al. (1998), www.sec.gov\/enforce\/litigrel\/lr15958.txt."},{"key":"key2022012319535398300_B15","unstructured":"SEC v. Tribble (1998),  www.sec.gov\/enforce\/litigrel\/lr15959.txt."},{"key":"key2022012319535398300_B16","unstructured":"Tedeschi, B. (1998), \u201cReal force in e\u2010commerce is business\u2010to\u2010business sales\u201d, New York Times Online, 5 January www.nytimes.com."},{"key":"key2022012319535398300_B17","unstructured":"Garcia, A.M. (1998), \u201cGlobal e\u2010commerce explodes: will you thrive, survive, or die?\u201d, e\u2010Business Advisor, October."},{"key":"key2022012319535398300_B18","unstructured":"Lohr, S. and Markoff, J. (1998), \u201cAOL lays out plan for marriage to Netscape\u201d, New York Times On\u2010line, 28 November, www.nytimes.com."},{"key":"key2022012319535398300_B19","unstructured":"Nagel, K.D. and Gray, G.L. (1998), Guide to Electronic Commerce Assurance Services, Harcourt Brace Professional Publications, Orlando, FL."},{"key":"key2022012319535398300_B20","unstructured":"Schmidt, W. (1998), \u201cWebTrust services: AICPA launches WebTrust for assurance\u201d, The CPA Journal, Vol. 5, p. 70."}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/10662249910297750","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662249910297750\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662249910297750\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:41:02Z","timestamp":1753400462000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/9\/5\/348-360\/178003"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,12,1]]},"references-count":20,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1999,12,1]]}},"alternative-id":["10.1108\/10662249910297750"],"URL":"https:\/\/doi.org\/10.1108\/10662249910297750","relation":{},"ISSN":["1066-2243"],"issn-type":[{"type":"print","value":"1066-2243"}],"subject":[],"published":{"date-parts":[[1999,12,1]]}}}