[PDF][PDF] Framing dependencies introduced by underground commoditization
Internet crime has become increasingly dependent on the underground economy: a loose
federation of specialists selling capabilities, services, and resources explicitly tailored to the …
federation of specialists selling capabilities, services, and resources explicitly tailored to the …
Reviewing estimates of cybercrime victimisation and cyber risk likelihood
DW Woods, L Walter - 2022 IEEE European Symposium on …, 2022 - ieeexplore.ieee.org
Across both the public and private sector, cyberse-curity decisions could be informed by
estimates of the likelihood of different types of exploitation and the corresponding harms …
estimates of the likelihood of different types of exploitation and the corresponding harms …
Argument for Improved Security in Local Governments Within the Economic Community of West African States
Abstract The Economic Community of West African States is an economic region located in
West Africa. This region has a population of over 349 million and representation for …
West Africa. This region has a population of over 349 million and representation for …
COVID‐19 frauds: An exploratory study of victimization during a global crisis
JP Kennedy, M Rorie… - Criminology & Public Policy, 2021 - Wiley Online Library
Abstract Research Summary The COVID‐19 pandemic threated public health and safety
and led to a number of virus‐related fraud schemes. We surveyed over 2,200 American …
and led to a number of virus‐related fraud schemes. We surveyed over 2,200 American …
Sok: Fraud in telephony networks
Telephone networks first appeared more than a hundred years ago, long before transistors
were invented. They, therefore, form the oldest large scale network that has grown to touch …
were invented. They, therefore, form the oldest large scale network that has grown to touch …
Towards a cybercontextual transmission model for online scamming
This study focuses on advance fee fraud (AFF) scamming, a specific form of online
deception in which scammers rely on social engineering techniques to deceive individuals …
deception in which scammers rely on social engineering techniques to deceive individuals …
[PDF][PDF] Phoneypot: Data-driven understanding of telephony threats.
Cyber criminals are increasingly using robocalling, voice phishing and caller ID spoofing to
craft attacks that are being used to scam unsuspecting users who have traditionally trusted …
craft attacks that are being used to scam unsuspecting users who have traditionally trusted …
Quit playing games with my heart: Understanding online dating scams
Online dating sites are experiencing a rise in popularity, with one in five relationships in the
United States starting on one of these sites. Online dating sites provide a valuable platform …
United States starting on one of these sites. Online dating sites provide a valuable platform …
[PDF][PDF] Scambaiter: Understanding targeted nigerian scams on craigslist
Advance fee fraud scams, also known as Nigerian scams have evolved from simple
untargeted email messages to more sophisticated scams targeted at users of classifieds …
untargeted email messages to more sophisticated scams targeted at users of classifieds …
You can trust me: A multimethod analysis of the Nigerian email scam
T Rich - Security Journal, 2018 - Springer
How do scammers invoke trust within the Nigerian email scam and how do recipients
interpret such trust-laden offers? Rather than view the email content as static, this article …
interpret such trust-laden offers? Rather than view the email content as static, this article …