Location of Repository

POLICING INTERNET FRAUD: A study of the tensions between private and public models of policing fraudulent activity in cyberspace with particular focus on South Korea and special reference to the United Kingdom and the United States

By Tae Jin Chung

Abstract

As more people obtain online access and the finance sector becomes transformed by networked technology, opportunities for internet fraud grow. In recent years we have seen the maturation of new digital environments in which financial\ud transactions can take place while at the same time we have seen an explosion in incidences of identity theft. This unprecedented rise in internet fraud is depressing growth in e-commerce activities and is creating growing demands by governments, the commercial sector and also the public for an appropriate model of policing. This thesis will explore the policing of internet fraud and it will argue the scope of police work with regard to white collar crime, because the public believe that police forces do not effectively control internet fraud and non-internet fraud.\ud \ud By drawing upon various global sources this thesis analyzes the tensions between the respective interests of the public and the private sectors. Such tensions raise concerns about how public resources are most effectively allocated in the public interest. Although internet fraud is a globalized phenomenon and indeed the UK and the US are notably mentioned, the analysis has specially focused on South\ud Korea.\ud \ud At the core of the thesis is the observation that a major conflict of interests emerges when the private and public models of policing compete for "ownership" over internet fraud, so before exploring the laws, rules and enforcement models for policing internet fraud, it is first necessary to remove the tensions that exist between and within policing bodies.\ud \ud Two significant tensions were examined: firstly, the tension caused by different characteristics and objectives of private and public models of policing. Whereas the\ud public police pursue the public interest thorough a public model of justice, the private sector polices problems in their own private interest along a private/corporate model of justice. Secondly, tensions are also created within the\ud public policing sector by intra-govemmental competition. For example, the South Korean National Police have attempted to obtain independent investigatory powers while the Prosecutors' Office strongly defends its ownership of investigatory powers

Publisher: School of Law (Leeds)
Year: 2008
OAI identifier: oai:etheses.whiterose.ac.uk:1010

Suggested articles

Preview

Citations

  1. (2001). [Accessed I 7th January] Available from World Wide Web :
  2. (2005). [online]. [Accessed 10' , doi
  3. (2005). [online]. [Accessed 17'h Februarý
  4. (2008). [online]. [Accessed 21't
  5. (2002). [online]. [Accessed I Oth Mmch 2005]. Available from World Wide Web < http: //www.
  6. 1). An overview of corporate computer user policy. 27 December [online].
  7. (2007). 76: 841, [Accessed 30'h
  8. (2002). A multi-level defence against social engineering.
  9. (2000). A web of crime. Sydney morning herald II
  10. (1996). Accidents on the Information Superhighway: on-line liability and regulation.
  11. (2004). Assessin-a IaNN enforcement preparedness to address Internet fraud.
  12. (2007). Available from 'vVorld Wide Web: < http: //www.
  13. (2005). Available from \Vorld Wide Web //www.
  14. (2008). Available from \Vorld Wide Web: //www. apwg. org/> Confederation of Asian and Pacific Accountants
  15. (2001). Available from World \A'ide Nkeb: < http: //www. essex. ac. uk/chimera/contentJPubs/wps/C \VP-2006-10%20eBay-User-Experience-Insights. pdf>
  16. (2005). Available from World \Vide Web: //www. britsoccri m. org/ethics. htm> British Sociological Association
  17. (2006). Available from World \Vide Web: < http: //citeseerx. ist-psu. edu/viewdoc/summary? doi=1 0.1 . 1.19.1957>
  18. (2008). Available from World NN&quot;ide Web: < http: //www. hightechcrimecops. org/HTCC-m
  19. Available from World Wide //www. sans.
  20. (2005). Available from World Wide \\&quot;eb: < http: //www.
  21. (2007). Available from World Wide \\eb: < http: //www. euractiv. com/en/infosociety/cybercrime/article-I 17465> EURIM (2006). Information Society Alliance. [online]. [Accessed II th
  22. (2005). Available from World Wide \N'eb:
  23. (2005). Available from World Wide \Veb:
  24. (2006). Available from World Wide Wcb: 264 //www. consumeraction. org/news/articIes/2000_credit_card_survey4Topic_ 1 2> Canadian Better Business Bureau
  25. (2003). Available from World Wide We b: < http: //www. attomeygeneral-gov. uk/Fraudý/ý20Reý'ieý\, Fraudý/`2OReý iexN%20Final%2OReport%2OJuly%202006. pdf>
  26. (2005). Available from World Wide Web http: //www. doi
  27. (2007). Available from World Wide Web:
  28. (2006). Available from World Wide Web: //packetstorm. decepticons. org/docs/socialengineering/soc_eng2. html>
  29. (2005). Available from World Wide Web: //wareham. eci. gsu. edu/Resume/Papers/wici s5 bib pdf>
  30. (2007). Available from World Wide Web: //ww\%. dhs.
  31. (2008). Available from World Wide Web: //www.
  32. (2005). Available from World Wide Web: //www. bccard. com>
  33. (2005). Available from World Wide Web: //www. consumeraffairs. com/news04/2005/ar_sweepstakes. htm 1>
  34. (2008). Available from World Wide Web: //www. consumerdirect. gov. uk/>
  35. (2006). Available from World Wide Web: //www. ftc. gov/bcp/conline/pubs/tmarkg)loans. htm> Ferret,
  36. (2008). Available from World Wide Web: //www. ibas. co. uk/> Intenet Crime Complaint Center
  37. (2004). Available from World Wide Web: //www. longtail. com/the_long-tail/2008/1 1/the-miraculous. html> APACS
  38. (2006). Available from World Wide Web: < http: //news.
  39. (2007). Available from World Wide Web: < http: //vý,
  40. (2008). Available from World Wide Web: < http: //www. crimestoppers-uk. org/media-centre/crime-in-thenews/october-2008--crime-in-the-news/card-fraud-losses-up-bý -I 4-percent>
  41. (2003). Available from World Wide Web: < http: //www. ftc. gov/reports/fraud97/index. shtml> Federal Trade Commission
  42. (2005). Available from World Wide Web: < http: //www. sans. org/rr/whitepapers/threats/4 82. php> Friedrichs,
  43. (2006). Available from World Wide Web: < http: //www. sfgate. com
  44. (2007). Available from World Wide Web: < www. econsultancy. com>
  45. (2008). Available from World Wide Web: apacs. org.
  46. (2005). Available from World Wide Web: cnet. com> Bureau of Justice Assistance
  47. (1997). Available from World Wide Web: epic. org/free_speech/intl/hrw_report-5_96. htmi
  48. (1998). Available from World Wide Web: fbi. gov/cyberinvest/cyberhome. htm> Federal Trade Commission
  49. (2006). Available from World Wide Web: H www. doi
  50. (1990). Available from World Wide Web: richmond. edu/-jolt/v2il/caden_lucas. html Calorniris,
  51. (2005). Available from World Wide ýVeb: //www. fraud-org/intemet/intset. htm IOP
  52. (2000). Available from ýý orld Wide Web: //www. iwar. org. uk/comsec/resources, /sa-tools/socialengineering. pdf> 275
  53. (2005). Aýailable from World Wide Web: //www. consumer. gov/sentineI/pubs/Top I OFraud2OO4. pdf> Federal Trade Commission
  54. (2008). Aýailable from World Wide Web: //www. usachatrooms.
  55. (2001). Biometric Security-Practical and Affordable!
  56. (1994). Black and Blue. - Policing in South Aftica. doi
  57. (1990). Business Crime: Its Nature and Control.
  58. (2008). Card Fraud losses up b% 14 percent. I
  59. (2002). Computer fraud scenarios-Robbing the rich to feed the poor.
  60. (2005). Conceptualizing the Private Police. Utah Law Review.
  61. (2003). Consumer and Business Deception on the Internet: Content Analysis of Documentary Evidence.
  62. (2007). Consumer Goods, Public Sector.
  63. (2003). Contractual governance of deN iant behaviour.
  64. (2001). Corporate Information Security Strategy - how to avoid giving free information to attackers. [online]. [Accessed II th
  65. (2001). Corporate Security Intelligence: An Oxymoron? doi
  66. (2005). CountrY Report: Ken. \ a. The Globalisation of Private Security. [online]. [Accessed 12th Noý ember 2006]. Available from World Wide \\'eb: < http:
  67. (2007). Crime risk waming to users of social networking sites.
  68. (2006). Cyber Crime High on FBI priority list. help ýýanted.
  69. (2004). Cyber crime.
  70. (2003). Cyberspace security. Computer 1cm, and sccurlV
  71. (2006). Detecting Fraudulent Personalities in Networks of Online Auctioneers. doi
  72. (2008). Deterring Online Advertising Fraud through Optimal Payment in Arrears. doi
  73. (2006). Developments in the global laN\ enforcement of cyber-crime. doi
  74. (2004). Distributes Security: Moving Away from Reactive Law Enforcement.
  75. (2000). eBay motors breakdown? Auction Watch.
  76. (2002). Electronic Payment Systems Obervatory (ePSO).
  77. (2004). Electronic Sccurity., Risk Mitigation in Financial Transactions Public Policy Issues. doi
  78. (2005). European Network and Information Security Agency
  79. (2002). Extremism in the defence of liberty? The Foreign Intelligence Surveillance Act and the significance of the U.
  80. (2004). Fraud in E-Governinew Transactions: Risks and Remedies. [online]. [Accessed
  81. (2000). Global Business Regulatioti. Cambridge:
  82. (2005). Governance, risk and dataveilance in the war on terror.
  83. (2003). Governing securi . ty. - explorations in policing andjustice.
  84. (1978). Handbook of Future Research. Connecticut: Greenwood Press. 272 Fraud Review
  85. (2002). Identifying and responding to electronic fraud risks.
  86. (1989). Insurance Fraud. doi
  87. (2004). Internet Fraud: A Global Perspective.
  88. (2002). Internet fraud: LaNý enforcement resources, collaboration, control and prevention. Report Submitted to the National White Collar Crime Center Research Contract Program.
  89. (1997). Internet fraud. doi
  90. (1999). Internet privacy concerns confirm the case for intervention. doi
  91. (2008). Internet Shopping Mail Fraud.
  92. (2001). Investigating and prosecuting Nigerian fraud. United States Attorneys'
  93. (2000). Its buyer beware in cyberspace: 1999-2000 Credit Card Survey. Consumer Action News. I
  94. (1997). Jurisdiction of cyberspace: applying real \\orld precedent to the virtual community. Wake Forest Review. '50,
  95. (1995). Le controle social: Privatisation et technocratie. doi
  96. (1995). Merging public and private security for collective benefit. doi
  97. (2002). Money laundering: has the Financial Action Task Force made a difference? doi
  98. (2001). Mouse clicks and dirty tricks. Plat. ipus magazine.
  99. (2001). National Information Infrastructure and the realization of Singapore IT
  100. (2007). New direction in policing fraud: The emergence of the counter fraud specialist in the United Kingdom. doi
  101. (2006). Online Auctions: User Experience Insightsfrom
  102. (2006). Phishers catch on to the Net's long tail.
  103. (2004). Phishing Attack Trends Report 2004. [online]. [Accessed Olst
  104. (2004). Phishing Attack Victims Likely Targets for Identity Theft.
  105. (1994). Police for the Future. doi
  106. (2004). Policing Communal Space.
  107. (2004). Policing Cybercrime. In:
  108. (1996). Policing diversity the impact of the publicý-pj-ivafe complex in policing.
  109. (2005). pp. I- 12. Available form World &quot;'Ide \\'eb: < http: //ieeexplore. ieee. org/Xplore/loginjsp? url=/ie15/10377/32979/01545 622. pdrtp=&isnumber=&arnumber--I 545622>
  110. (1987). Private Justice and the Policing of Labor: The Dialectics of Industrial Discipline'
  111. (1983). Private Justice: Towards Integrated Theorizing in the SociologY of law. doi
  112. (1999). Private policing in context. doi
  113. (2002). Private Policing. doi
  114. (2003). Private security and the policing of quasi-public space. doi
  115. (1977). Private Security Standards and Goals (The Report of the Official Private Security Task Force). Cincinatti OH:
  116. (2008). Provides clear, practical consurner advice
  117. (2005). Public Order Policing: A tough act to follo\\. doi
  118. (2004). Public-Private Partnerships for Police Reform. Crime and Justice.
  119. (1999). Reflections on the evolving concept of priNate policing.
  120. (2001). Regulating health care: From self-regulation to self regulation? doi
  121. (2005). Role and Responsibilities of the Serious Fraud Office
  122. (2004). Security in the age of networks. doi
  123. (2000). Six Month Data Trends Report . -May-Noven7ber
  124. (2001). Social Engineering Fundamentals, Part I Hacker Tactics.
  125. (2006). Social Engineering: A means to violate a computer system.
  126. (2006). The challenge of partnership policing and security network. Sydney:
  127. (1994). The Division of Expert Knowledge in Policing and Security. doi
  128. (1994). The economy of ideas: a framework for rethinking patents and copyrights in the digital age (Everything you know about intellectual property is wrong).
  129. (1996). The English Police: A political and Social History (2nd eds).
  130. (1992). The Foreign Intelligence Surveillance Act and Standards of probable cause: An alternative analysis.
  131. (2006). The Impact of Security Concerns on C) ber Liberties. The Information Society Emerging Landscapes. doi
  132. (2007). The independent on Sunday,
  133. (2005). The mixed economy of visible patrols in England and Wales. doi
  134. (2008). The Online Identity Experts. [online]. [Accessed 24'h Julý 2008]. Available from World Wide Web: //www. garlik. com/press/garlik_uk_cybercrime_report. pdf/ý Gartner.
  135. (2004). The Paradox of Private Policing. doi
  136. (2008). the Protection of National Infrastructure doi
  137. (2000). The Relationship between Theory and Research
  138. (2005). The Skeptic's Dictionary. - Pyramid schemes, chain letters and ponzi schemes.
  139. (2000). The surveillant assemblage. doi
  140. (1996). Trusted criminals.
  141. (1999). Urban Change and Policing: Mass Private Property Re-considered.
  142. (2008). Will the burden of the long tail kill Internet commerce? ZDNet news. 22 March. Tom Foremski: Blog [online].

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.