995 resultados para online fraud victimisation
Resumo:
People manage a spectrum of identities in cyber domains. Profiling individuals and assigning them to distinct groups or classes have potential applications in targeted services, online fraud detection, extensive social sorting, and cyber-security. This paper presents the Uncertainty of Identity Toolset, a framework for the identification and profiling of users from their social media accounts and e-mail addresses. More specifically, in this paper we discuss the design and implementation of two tools of the framework. The Twitter Geographic Profiler tool builds a map of the ethno-cultural communities of a person's friends on Twitter social media service. The E-mail Address Profiler tool identifies the probable identities of individuals from their e-mail addresses and maps their geographical distribution across the UK. To this end, this paper presents a framework for profiling the digital traces of individuals.
Resumo:
Online victimisation of children is concerned with sexual abuse caused with the help of online technologies. Digital forensics is a powerful methodology to discover, prevent and bring criminals to justice. Digital forensics is dependent on tools and access to information from a variety of sources in digital government. This paper reports from a knowledge enhancement project to gain new insights into offender investigations in law enforcement.
Resumo:
It is well recognised that there are serious correlates for victims of traditional bullying. These have been shown to include increased levels of depression, anxiety and psychosomatic symptoms, in addition to often severe physical harm and even suicide. Bullied students also feel more socially ineffective; have greater interpersonal difficulties, together with higher absenteeism from school and lower academic competence. In the emerging field of cyberbullying many researchers have hypothesised a greater impact and more severe consequences for victims because of the 24/7 nature and the possibility of the wider audience with this form of bullying. However, to date there is scarce empirical evidence to support this. This study sought to compare victims’ perceptions of the harshness and impact of bullying by traditional and cyber means. The major findings showed that although students who had been victimised by traditional bullying reported that they felt their bullying was harsher, crueller and had more impact on their lives than those students who had been cyberbullied, the correlates of their mental health revealed that cyber victims reported significantly more social difficulties, higher anxiety levels and depression than traditional victims. The implications for school counsellors and mental health workers are discussed.
Resumo:
Purpose – In 2012, the European food industry was hit by a food fraud: horsemeat was found in
pre-prepared foods, without any declaration on the package. This is commonly referred to as the
“horsemeat scandal”. The purpose of this paper is to investigate consumers’ preferences across
Europe for a selected ready meal, ready to heat (RTH) fresh lasagne, to consider whether the effects of
potential food frauds on consumers’ choices can be mitigated by introducing enhanced standards of
RTH products.
Design/methodology/approach – An online survey was administered to 4,598 consumers of RTH
lasagne in six European countries (Republic of Ireland, France, Italy, Spain, Germany and Norway),
applying discrete choice experiments to estimate consumers’ willingness to pay for enhanced food
safety standards and highlight differences between countries.
Findings – Many similarities across countries emerged, as well as some differences. Consumers in
Europe are highly concerned with the authenticity of the meat in ready meals and strongly prefer to
know that ingredients are nationally sourced. Strong regional differences in price premiums exist for
enhanced food safety standards.
Originality/value – This research adds relevant insights in the analysis of consumers’ reaction to
food fraud, providing practical guidelines on the most appropriate practices that producers should
adopt and on the information to reduce food risk perception among consumers. This would prove
beneficial for the food processing industry and the European Union. The survey is based on a
representative sample of European consumers making this the largest cross-country study of this kind.
Resumo:
This paper examined the psychological impact of the online dating romance scam. Unlike other mass-marketing fraud victims, these victims experienced a ‘double hit’ of the scam: a financial loss and the loss of a relationship. For most, the loss of the relationship was more upsetting than their financial losses (many described the loss of the relationship as a ‘death’). Some described their experience as traumatic and all were affected negatively by the crime. Most victims had not found ways to cope given the lack of understanding from family and friends. Denial (e.g., not accepting the scam was real or not being able to separate the fake identity with the criminal) was identified as an ineffective means of coping, leaving the victim vulnerable to a second wave of the scam. Suggestions are made as to how to change policy with regards to law enforcement deal with this crime.
Resumo:
Contexte et objectifs. Ce mémoire propose un modèle conceptuel écologique afin de mieux comprendre la violence dans les écoles. Les objectifs de cette recherche sont de ; 1) estimer l’effet des facteurs individuels, contextuels et environnementaux sur le risque de victimisation, 2) vérifier la présence d’interactions entre les différents facteurs. Méthodologie. Les élèves de 16 écoles primaires de la grande région métropolitaine de Montréal ont pris part à un sondage auto-révélé en lien avec différentes dimensions liées à la victimisation en milieu scolaire. Des analyses descriptives ont été menées, dans un premier temps, pour dresser le portrait de la violence en milieu scolaire. Dans un second temps, l’emploi d’un modèle linéaire hiérarchique généralisé (MLHG) a permis d’estimer les effets de variables propres à l’individu, au contexte et à l’environnement sur le risque de victimisation. Résultats. Les résultats aux analyses multiniveaux montrent que des variables individuelles, contextuelles et environnementales influent sur la probabilité d’être victime de violence verbale, physique et dans les médias sociaux. Ainsi, les élèves les plus délinquants sont aussi ceux qui rapportent le plus d’antécédents de victimisation. Toutefois, ces résultats ne sont pas entièrement imputables aux caractéristiques des individus. Le risque de victimisation est atténué lorsque les « gardiens » interviennent pour mettre un terme au conflit et que les victimes se défendent. Enfin, le risque de victimisation est moins élevé dans les écoles où il y a un grand nombre d’élèves. Interprétation. Les résultats suggèrent que plusieurs facteurs qui ne sont pas liés aux victimes et aux délinquants permettent de mieux comprendre le processus de victimisation en milieu scolaire. Le rôle des gardiens de même que la taille des écoles sont des éléments centraux à la compréhension du passage à l’acte.
Resumo:
The Online Romance Scam is a relatively new form of fraud that became apparent in about 2008. In this crime, criminals pretend to initiate a relationship through online dating sites then defraud their victims of large sums of money. This paper presents some descriptive statistics about knowledge and victimization of the online dating romance scam in Great Britain. Our study found that despite its newness, an estimated 230,000 British citizens may have fallen victim to this crime. We conclude that there needs to be some rethinking about providing avenues for victims to report the crime or at least making them more comfortable when doing so.
Resumo:
In this article we explore the interplay between the law of copyright, contract, and statutory fraud within the digital environment, and in particular with respect to the business of commercial image licensing within the UK.
Resumo:
Nigerian scam, also known as advance fee fraud or 419 scam, is a prevalent form of online fraudulent activity that causes financial loss to individuals and businesses. Nigerian scam has evolved from simple non-targeted email messages to more sophisticated scams targeted at users of classifieds, dating and other websites. Even though such scams are observed and reported by users frequently, the community’s understanding of Nigerian scams is limited since the scammers operate “underground”. To better understand the underground Nigerian scam ecosystem and seek effective methods to deter Nigerian scam and cybercrime in general, we conduct a series of active and passive measurement studies. Relying upon the analysis and insight gained from the measurement studies, we make four contributions: (1) we analyze the taxonomy of Nigerian scam and derive long-term trends in scams; (2) we provide an insight on Nigerian scam and cybercrime ecosystems and their underground operation; (3) we propose a payment intervention as a potential deterrent to cybercrime operation in general and evaluate its effectiveness; and (4) we offer active and passive measurement tools and techniques that enable in-depth analysis of cybercrime ecosystems and deterrence on them. We first created and analyze a repository of more than two hundred thousand user-reported scam emails, stretching from 2006 to 2014, from four major scam reporting websites. We select ten most commonly observed scam categories and tag 2,000 scam emails randomly selected from our repository. Based upon the manually tagged dataset, we train a machine learning classifier and cluster all scam emails in the repository. From the clustering result, we find a strong and sustained upward trend for targeted scams and downward trend for non-targeted scams. We then focus on two types of targeted scams: sales scams and rental scams targeted users on Craigslist. We built an automated scam data collection system and gathered large-scale sales scam emails. Using the system we posted honeypot ads on Craigslist and conversed automatically with the scammers. Through the email conversation, the system obtained additional confirmation of likely scam activities and collected additional information such as IP addresses and shipping addresses. Our analysis revealed that around 10 groups were responsible for nearly half of the over 13,000 total scam attempts we received. These groups used IP addresses and shipping addresses in both Nigeria and the U.S. We also crawled rental ads on Craigslist, identified rental scam ads amongst the large number of benign ads and conversed with the potential scammers. Through in-depth analysis of the rental scams, we found seven major scam campaigns employing various operations and monetization methods. We also found that unlike sales scammers, most rental scammers were in the U.S. The large-scale scam data and in-depth analysis provide useful insights on how to design effective deterrence techniques against cybercrime in general. We study underground DDoS-for-hire services, also known as booters, and measure the effectiveness of undermining a payment system of DDoS Services. Our analysis shows that the payment intervention can have the desired effect of limiting cybercriminals’ ability and increasing the risk of accepting payments.
Resumo:
This paper traces the evolutions of a new generation of students who are predominantly the ‘online generation’; explores the emerging impact of this generation on industry; identifies the changing role of education from traditional classroom to an online environment; and explores the contribution related to integrated marketing communications (IMC). Educational requirements from a business perspective must incorporate global business demands; virtual learning environments progress the online generation towards a post-modern learning state. The central proposition of this paper is that the emergence of IMC in evolving industry practices is influenced by student generations who are producing a new paradigm of alignment between education and industry. This is purely a conceptual exploration using limited examples to provide some context and illustrate the questions raised for consideration.