[PDF][PDF] Framing dependencies introduced by underground commoditization

K Huang, DWEBC GrierD, TJ Holt, C Kruegel… - Workshop on the …, 2015 - imchris.org
Internet crime has become increasingly dependent on the underground economy: a loose
federation of specialists selling capabilities, services, and resources explicitly tailored to the …

Reviewing estimates of cybercrime victimisation and cyber risk likelihood

DW Woods, L Walter - 2022 IEEE European Symposium on …, 2022 - ieeexplore.ieee.org
Across both the public and private sector, cyberse-curity decisions could be informed by
estimates of the likelihood of different types of exploitation and the corresponding harms …

Argument for Improved Security in Local Governments Within the Economic Community of West African States

M Dawson, D Walker - Cybersecurity Measures for E-Government …, 2022 - igi-global.com
Abstract The Economic Community of West African States is an economic region located in
West Africa. This region has a population of over 349 million and representation for …

COVID‐19 frauds: An exploratory study of victimization during a global crisis

JP Kennedy, M Rorie… - Criminology & Public Policy, 2021 - Wiley Online Library
Abstract Research Summary The COVID‐19 pandemic threated public health and safety
and led to a number of virus‐related fraud schemes. We surveyed over 2,200 American …

Sok: Fraud in telephony networks

M Sahin, A Francillon, P Gupta… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
Telephone networks first appeared more than a hundred years ago, long before transistors
were invented. They, therefore, form the oldest large scale network that has grown to touch …

Towards a cybercontextual transmission model for online scamming

AC Tambe Ebot, M Siponen… - European Journal of …, 2024 - Taylor & Francis
This study focuses on advance fee fraud (AFF) scamming, a specific form of online
deception in which scammers rely on social engineering techniques to deceive individuals …

[PDF][PDF] Phoneypot: Data-driven understanding of telephony threats.

P Gupta, B Srinivasan, V Balasubramaniyan… - NDSS, 2015 - ndss-symposium.org
Cyber criminals are increasingly using robocalling, voice phishing and caller ID spoofing to
craft attacks that are being used to scam unsuspecting users who have traditionally trusted …

Quit playing games with my heart: Understanding online dating scams

JM Huang, G Stringhini, P Yong - … , DIMVA 2015, Milan, Italy, July 9-10 …, 2015 - Springer
Online dating sites are experiencing a rise in popularity, with one in five relationships in the
United States starting on one of these sites. Online dating sites provide a valuable platform …

[PDF][PDF] Scambaiter: Understanding targeted nigerian scams on craigslist

Y Park, J Jones, D McCoy, E Shi, M Jakobsson - system, 2014 - elaineshi.com
Advance fee fraud scams, also known as Nigerian scams have evolved from simple
untargeted email messages to more sophisticated scams targeted at users of classifieds …

You can trust me: A multimethod analysis of the Nigerian email scam

T Rich - Security Journal, 2018 - Springer
How do scammers invoke trust within the Nigerian email scam and how do recipients
interpret such trust-laden offers? Rather than view the email content as static, this article …