2,245 research outputs found

    The Restrictive Deterrent Effect of Warning Messages Sent to Active Romance Fraudsters: An Experimental Approach

    Get PDF
    Victims of romance fraud experience both a financial and emotional burden. Although multiple studies have offered insight into the correlates of perpetration and victimization, no known study has examined if, and how, romance fraud can be curtailed. The current study uses a randomized experimental design to test the restrictive deterrent effect of warning messages sent to romance fraudsters via email. We find that active romance fraudsters who receive a deterrence message, instead of non-deterrence messages, respond at a lower rate; and, among those who respond, use fewer words and have a lower probability of seeking reply without denying wrongdoing. The results provide support for restrictive deterrence in cyberspace. Theoretical and policy implications are discussed

    Rationalizing Online Romance Fraud: In the Eyes of the Offender

    Get PDF
    This study seeks to understand romance scam from the offenders\u27 perspective and how they rationalize their motivations, opportunities and abilities towards the commission of the crime. To this end, we adopt the Motivation-Opportunity-Ability framework and the Rationalization dimension of the Fraud Triangle Theory. The study employed a qualitative methodological approach to analyze the opportunities presented by emerging technologies to cyber fraudsters amid socio-economic drivers. One is the interplay of various socio-economic factors being a major driving force behind the commission of cybercrime. These include peer recruitment and training, poverty, unemployment, low level of education and low income. The uniqueness of this study stems from the fact that it deviates from previous studies to investigate cybercrime from the perspective of the perpetrators. Again, this study is arguably one of the first to put all three dimensions of the MOA framework and the rationalization dimension of the Fraud Triangle to study romance scammers\u27 behaviors

    An Enhanced Scammer Detection Model for Online Social Network Frauds Using Machine Learning

    Get PDF
    The prevalence of online social networking increase in the risk of social network scams or fraud. Scammers often create fake profiles to trick unsuspecting users into fraudulent activities. Therefore, it is important to be able to identify these scammer profiles and prevent fraud such as dating scams, compromised accounts, and fake profiles. This study proposes an enhanced scammer detection model that utilizes user profile attributes and images to identify scammer profiles in online social networks. The approach involves preprocessing user profile data, extracting features, and machine learning algorithms for classification. The system was tested on a dataset created specifically for this study and was found to have an accuracy rate of 94.50% with low false-positive rates. The proposed approach aims to detect scammer profiles early on to prevent online social network fraud and ensure a safer environment for society and women’s safety

    When love is jeopardized: Governing online love scams in Malaysia

    Get PDF
    In this era of globalization, the way people communicate and build relationships have evolved from the real world to cyberspace. The Internet creates opportunities for users to find romance and have affairs with people anywhere in the world. Due to this, apart from finding true love, many fall prey to the hands of scammers that aims to cheat another for money and even reputation. Last year, it was reported that more than sixty-eight million ringgit was loss due to romantic scams and the most targeted victims are lonely and elderly women. The main objective of this study the typology and the modus operandi of love scams. The paper would also analyze the existing problems in the current legal framework governing love scams and aims identify the loopholes within the current legislation in dealing with the problem. A doctrinal legal research method will be used in this article. The author contends that the scattered legal and regulatory landscape has contributed to the growing cases of love scam and thus, reform is needed to effectively govern the crime. In addition, the governance of cyber security can also be improved with the advancement of analytic tool to combat love scam in Malaysia

    Tainted love:a systematic literature review of online romance scam research

    Get PDF
    Romance scams involve cybercriminals engineering a romantic relationship on online dating platforms for monetary gain. It is a cruel form of cybercrime whereby victims are left heartbroken, often facing financial ruin. We characterize the literary landscape on romance scams, advancing the understanding of researchers and practitioners by systematically reviewing and synthesizing contemporary qualitative and quantitative evidence. The systematic review establishes influencing factors of victimhood and explores countermeasures for mitigating romance scams. We searched 10 scholarly databases and websites using terms related to romance scams. The methodology followed the Preferred Reporting Items for Systematic Reviews and Meta-analyses (PRISMA) guidelines: a total of 279 papers were screened. One hundred seven papers were assessed for eligibility, and 53 were included in the final analysis. Three main contributions were identified: common profile features and techniques used by romance scammers, countermeasures for mitigating romance scams and factors predisposing an individual to become a scammer or a victim. Despite a growing corpus of literature, the total number of empirical or experimental examinations remained limited. The paper concludes with avenues for future research and victimhood intervention strategies for practitioners, law enforcement and the industry

    LAUNDERING LOVE: A MULTI-CASE ANALYSIS OF THE EVOLUTION OF ROMANCE SCAM VICTIMS INTO CO-OFFENDING MONEY MULES

    Get PDF
    This thesis addresses the problems of rapidly rising cyber-enabled fraud and concomitant money laundering by focusing on romance scam victims who evolve into willing partners in money laundering schemes, known as “witting money mules.” This thesis explores how and why individuals become money mules after victimization in online romance scams. The thesis employs a grounded theory approach and investigates data from over 134,000 historical text messages between three offenders and 22 victims, as well as three participant interviews with romance scam victims. The data resulted in a grounded theory that a romantically lonely victim who persistently engages online with an offender that strategically repeats scheme-relevant premises in the guise of a romantic partner can result in the victim acceding to the offender’s exploitative requests and the eventual decision to co-offend. This theory also explains how a person can simultaneously be a victim and offender and why they would intentionally choose to help the romance scammer launder money. The literature and data similarly support a suggested definition for “grooming” in the context of romance scams. As a whole, this thesis provides insight into romance scams and money mules as a strategic pivot point that, if disrupted, can simultaneously impact a criminal organization’s ability to profit from romance scams and launder the proceeds of cyber-enabled fraud.Outstanding ThesisCivilian, Minnesota Commerce Fraud BureauApproved for public release. Distribution is unlimited

    The role of information systems in the prevention and detection of transnational and international crime

    Get PDF
    © Cambridge University Press 2014. All around the world criminal activity remains at the forefront of governmental concerns, not only as a problem that distorts the very fabric of society within the confines of national jurisdictions, but also as a problem that cuts across national borders to exhibit a global dimension. The international dimension of criminal activity remains critical and is generally characterized by a complexity that is unique and requires action on many different levels. Criminals set out to mask their illegal activities and deliberately generate complexity as a means of concealment. In doing so, they exploit new developments in technology that assist them in achieving their ends. This criminality exhibits forms of innovation that stretch far beyond traditional criminal activity (e.g., drug and human trafficking) and manages to attach itself within the broader fabric of society by exploiting the very latest developments. This evolution is necessary as criminals seek not only to escape arrest, prosecution and conviction, but also to enjoy the fruits of their criminality (mostly financial gains). Thus, they seek to develop ways of exploiting the various diffuse norms of social interaction (e.g., trust), financial modes of conduct (e.g., cash-based economies), technological and communication developments (e.g., Internet), and thereby minimize the possibility for detection. By limiting the resources that can be made available for prevention (or making them obsolete when developing new criminal behaviour), they participate in this co-evolution actively; and this they achieve by generating complexity

    Essays on the Rationality of Online Romance Scammers

    Get PDF
    The rapid development of the internet has served an essential role in providing communication platforms for people to choose to have personal interactions. One manifestation is using social media platforms and dating services to establish social relationships. The use of online platforms has also provided unscrupulous individuals with malicious intent the ability to target vulnerable victims using bogus romantic intent to obtain money from them. This type of newly evolved cybercrime is called an online romance scamming. To date, online romance scams have spread to every part of the world (i.e., mainly in the United States, China, Canada, Australia, and the UK) and caused considerable financial and emotional damage to victims. Prior research on online romance fraudsters provides a preliminary understanding of the operational features (stages and persuasive techniques) and their modus operandi. However, the objectivity and relevance of the victimization data in explaining offenders\u27 behaviors may render those studies may represent significant drawbacks. To overcome the limitations, it is important to use actual offender data to generate meaningful analyses of romance fraudsters\u27 behaviors. Consequently, this dissertation aims to use experimental data similar to that applied in my previous work (Wang et al., 2021), combined with existing criminological and communication theories, to promote a better understanding of romance fraudsters\u27 behaviors in the online world. This dissertation begins with a scoping review of the current online romance scam literature, intending to use a scientific strategy to address the existing scholarly gap in this field of research. Derived from rational choice theory, the criminal events perspective, interpersonal deception theory, and neutralization theory, the second and third paper uses an experimental approach to assess the influence of rewards on romance fraudsters\u27 behaviors. The three papers\u27 results demonstrate the rationality of online romance fraudsters when facing rewards. Moreover, such rationality can be explicitly seen from their uses of different linguistic cues. Finally, the outcomes provided in the current project also provide policymakers the information about the rationality and modus operandi of fraudsters which can be used to identify the behavioral patterns at an early phase to prevent significant harm to the victim

    Unfair and Deceptive Robots

    Get PDF
    Robots, like household helpers, personal digital assistants, automated cars, and personal drones are or will soon be available to consumers. These robots raise common consumer protection issues, such as fraud, privacy, data security, and risks to health, physical safety and finances. Robots also raise new consumer protection issues, or at least call into question how existing consumer protection regimes might be applied to such emerging technologies. Yet it is unclear which legal regimes should govern these robots and what consumer protection rules for robots should look like. The thesis of the Article is that the FTC’s grant of authority and existing jurisprudence make it the preferable regulatory agency for protecting consumers who buy and interact with robots. The FTC has proven to be a capable regulator of communications, organizational procedures, and design, which are the three crucial concepts for safe consumer robots. Additionally, the structure and history of the FTC shows that the agency is capable of fostering new technologies as it did with the Internet. The agency generally defers to industry standards, avoids dramatic regulatory lurches, and cooperates with other agencies. Consumer robotics is an expansive field with great potential. A light but steady response by the FTC will allow the consumer robotics industry to thrive while preserving consumer trust and keeping consumers safe from harm
    • …
    corecore