ABSTRACT
Mass-marketing frauds (MMFs) are on the increase. Given the amount of monies lost and the psychological impact of MMFs there is an urgent need to develop new and effective methods to prevent more of these crimes. This paper reports the early planning of automated methods our interdisciplinary team are developing to prevent and detect MMF. Importantly, the paper presents the ethical and social constraints involved in such a model and suggests concerns others might also consider when developing automated systems.
- T. Buchanan and M. T. Whitty. The online dating romance scam: causes and consequences of victimhood. Psychology, Crime & Law, 20(3):261--283, 2014. Google ScholarCross Ref
- G. Gu, P. A. Porras, V. Yegneswaran, M. W. Fong, and W. Lee. Bothunter: Detecting malware infection through ids-driven dialog correlation. In Usenix Security, volume 7, pages 1--16, 2007. Google ScholarDigital Library
- J. T. Hancock, L. Curry, S. Goorha, and M. Woodworth. Automated linguistic analysis of deceptive and truthful synchronous computer-mediated communication. In System Sciences, 2005. HICSS'05. Proceedings of the 38th Annual Hawaii International Conference on, pages 22c--22c. IEEE, 2005. Google ScholarDigital Library
- J. Huang, G. Stringhini, and P. Yong. Quit playing games with my heart: Understanding online dating scams. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pages 216--236. Springer, 2015. Google ScholarDigital Library
- S. Lea, P. Fischer, and K. M. Evans. The economic psychology of scams. International Association for Research in Economic Psychology and the Society for the Advancement of Behavioral Economics, Nova Scotia, Canada, 2009.Google Scholar
- D. Modic and R. J. Anderson. We will make you like our research: The development of a susceptibility-to persuasion scale. Social Science Research Network, 2014.Google ScholarCross Ref
- A. Rashid, K. Moore, C. May-Chahal, and R. Chitchyan. Managing emergent ethical concerns for software engineering in society. In Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on, volume 2, pages 523--526. IEEE, 2015. Google ScholarDigital Library
- A. Sasse. Scaring and bullying people into security won't work. IEEE Security & Privacy, 13(3):80--83, 2015. Google ScholarCross Ref
- D. Weirich and M. A. Sasse. Persuasive password security. In CHI'01 Extended Abstracts on Human Factors in Computing Systems, pages 139--140. ACM, 2001. Google ScholarDigital Library
- M. T. Whitty. The scammers persuasive techniques model: Development of a stage model to explain the online dating romance scam. British Journal of Criminology, 53(4):665--684, 2013. Google ScholarCross Ref
- M. T. Whitty. Mass-marketing fraud: a growing concern. IEEE Security & Privacy, 13(4):84--87, 2015. Google ScholarCross Ref
- M. T. Whitty and T. Buchanan. The online dating romance scam: The psychological impact on victims{both financial and non-financial. Criminology & Criminal Justice, 16(2):176--194, 2016. Google ScholarCross Ref
- L. Zhou, J. K. Burgoon, J. F. Nunamaker, and D. Twitchell. Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications. Group decision and negotiation, 13(1):81--106, 2004. Google ScholarCross Ref
Index Terms
- Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF)
Recommendations
Scamming the Scammers: Towards Automatic Detection of Persuasion in Advance Fee Frauds
WWW '17 Companion: Proceedings of the 26th International Conference on World Wide Web CompanionAdvance fee fraud is a significant component of online criminal activity. Fraudsters can often make off with significant sums, and victims will usually find themselves plagued by follow-up scams. Previous studies of how fraudsters persuade their victims ...
Employing transaction aggregation strategy to detect credit card fraud
Credit card fraud costs consumers and the financial industry billions of dollars annually. However, there is a dearth of published literature on credit card fraud detection. In this study we employed transaction aggregation strategy to detect credit ...
Anticipating Ethical Challenges: Is There a Coming Era of Nanotechnology?
In this paper I question the claims made for a `coming era of nanotechnology' and the ethical challenges, it is argued, that are entailed by this particular technological revolution. I argue that such futurist claims are sustained by an untenable ...
Comments