Sort Alphabetically

Fraud Assessment represents three aspects of a constantly fluid and changing crime, that being Prevention, Identification and Mitigation WHEN the fraud takes place.

PEVENTION is a matter of establishing the methodologies and strategies that are required to use best efforts to protect an individual, company, service entity or government agency from fraudulent attacks which can be internally, externally or a combination of both.

From scams, to identity thefts – from schemes to company identity take-overs, fraud is faster, more efficient, learns better, and ultimately can stay one step ahead of those who attempt to stop it – Fraud is human.

With the best automated systems, they are guaranteed to be breached and in many cases utilized to the benefit of the fraud scheme or attack. Fraud cannot be stopped just by automated protection alone. It is a matter of a balance program of manual operations, protocols and methodologies complemented by automated programs and systems.

As you read the various articles and papers, remember that fraud is constantly evolving and adapting to every strategy we come up with to stop it. It cannot be stopped or eliminated; however it can be contained and WHEN the fraud takes place we can IDENTIFY it as efficiently as possible. Identification is critical when assessing the nature and the degree of the fraud breach, so as to MITIGATE the damage and fallout that it has cause. Finally to learn from the mistakes and weaknesses identified and correct those weaknesses along with updating the anti-fraud-post-fraud strategies and protocols. It is a full-time real-time responsibility.

“Fraud tip of the day: Subscription Frauds”

“Fraud tip of the day: Subscription Frauds” Published © 2014 RSI (all rights reserved) We write dozens of mini-articles, usually by request or on relevant issues that don’t need a lengthy explanation. We typically collect perhaps somewhere around several hundred of them (or more) per year (we do get quite More >

“Fraud versus Negligence”

“Fraud versus Negligence” Published – ©2014 Research Solutions, Inc. / Dr. Mark D. Lurie (all rights reserved) Published – ©2010 – 2014 RSI/Dr. Mark D. Lurie (all rights reserved) Time to address a heavily-requested article on a subject that is the most brutally disputed (and litigated) issue where “alleged” fraud” More >

“Identity Theft, Business Identity Theft and Ghost Writing Identity Theft – What’s it All About?”

Over the past two decades there has been a serious growth of businesses and “alleged” institutions that offer a plethora of specialized “certifications”. We see so many abbreviations surfacing that are not identified. As an example, there is the “NARSMONISS” (a ten (10) letter abbreviation!) that was used. I couldn’t More >

“Internet Provider Frauds”

“Internet Provider Frauds”  Published ©2014 Research Solutions, Inc. Published ©2010 – 2014 RSI/Dr. Mark D. Lurie It appears that there are quite a few Internet Provider Service Companies about, especially Satellite-based, that are “deceiving” people into agreements that literally guarantee NO transmission speed (upload or download) at all! Simply explained More >


“Legal Frauds”  Published ©2014 Research Solutions, Inc. / Dr. Mark D. Lurie (all rights reserved)   Isn’t this a great way to start a topic or to present an article to readers and subscribers, with a “conflicting title”? It is an “almost-perfect” example of a “Paradoxical Statement”, yet it DOES More >