Cybercrime

网络犯罪
  • 文章类型: Journal Article
    背景:网络犯罪是一种快速增长的数字犯罪,立法随着技术的快速发展而落后。文献预测打击网络犯罪的一个重要因素是立法。为了打击网络犯罪,网络犯罪立法的作用是一个以前从未明确研究过的挑战。因此,本文旨在概述有关打击网络犯罪的网络犯罪立法的文献。这方面的文献强调了与网络犯罪立法有关的现有研究,以及解决适当和有效对策的重要性,以便有效打击网络犯罪。方法:本文使用基于打击网络犯罪立法的“系统审查和荟萃分析的首选报告项目”方法进行了广泛的文献综述,并对大多数先进国家的技术和法律立法进行了系统分析框架。这项研究是通过选择关键词来完成的,经专家验证,发现网络犯罪立法的研究趋势。然后在七个学术数据库中进行搜索,包括ACM数字图书馆,翡翠,海恩在线,ProQuest,ScienceDirect,Scopus,和Westlaw亚洲。最初,检索到5148篇文章,其中72项研究符合纳入标准,并进行了全面审查。结果:研究结果表明,全面的网络犯罪立法在打击网络犯罪中起着至关重要的作用,增强,并随着技术的飞速发展而发展,以解决网络犯罪数量不断上升的问题。讨论:本系统综述是及时的,并强调了未来的研究方向,以改善全面的法律框架,以有效地打击网络犯罪的上升。为了填补研究空白,这些发现对决策者也有基本的实际意义,通过强调立法在打击网络犯罪中的作用,制定了最新的网络犯罪立法。
    Background: Cybercrime is a fast-growing digital crime and legislation falling behind with the fast-moving advancement of technology. One important factor projected by literature in combating cybercrime is legislation. In order to combat cybercrime, the role of cybercrime legislation is a challenge that has not been clearly studied before. This paper thus aims to recapitulate the literature on cybercrime legislation in combating cybercrime. The literature in this context emphasises on existing studies relating to cybercrime legislation and addressing the importance of adequate and efficient responses in place in order to combat cybercrime efficiently. Methods: This paper finds an extensive literature review using the \"Preferred Reporting Items for Systematic Review and Meta-Analysis\" method based on legislation to combat cybercrime and explains a systematic analysis of the legislation in most advanced countries in both technology and legal framework. The study was done by selecting keywords, validated by the experts to discover research trends of cybercrime legislation. A search was then run across seven academic databases, including the ACM Digital Library, Emerald, Hein Online, ProQuest, ScienceDirect, Scopus, and Westlaw Asia. Initially, five hundred and forty-eight articles were retrieved and out of which seventy-two studies met the inclusion criteria and were fully reviewed. Results: The findings of the study revealed that comprehensive cybercrime legislation plays a vital role in combating cybercrime and cybercrime legislation should be strengthened, enhanced, and made up to date with the rapid advancement of technology in order to address the rising number of cybercrime. Discussion: This systematic review is timely and highlights future research directions to improve a comprehensive legal framework to combat the rising of cybercrime effectively. To fill the research gap, the findings also have fundamental practical implications for the policy makers, in enacting an up to date cybercrime legislation by highlighting the role of legislation in combating cybercrime.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    物联网取证是数字取证中的一个专业领域,专注于识别安全事件,以及收集和分析证据,以防止未来对物联网网络的攻击。由于物联网设备的独特特性,物联网取证与其他数字取证领域不同,例如有限的处理能力和连接性。尽管物联网取证有许多研究,这个领域正在迅速发展,需要进行全面调查以跟上新的发展,新出现的威胁,和不断发展的最佳实践。在这方面,本文旨在回顾物联网取证的最新技术,并讨论当前调查技术的挑战。对物联网取证领域的相关评论进行了定性分析,确定关键问题并评估主要障碍。尽管主题和方法多种多样,常见问题出现。这些问题中的大多数与证据的收集和预处理有关,因为反分析技术和与从设备和云收集数据相关的挑战。我们的分析超出了技术问题;它进一步确定了准备的程序问题,reporting,和演示以及道德问题。特别是,它提供了有关物联网取证中新兴威胁和挑战的见解,提高对物联网取证在预防网络犯罪中的重要性的认识和理解,并确保物联网设备和网络的安全性和隐私性。我们的发现为物联网取证领域做出了重大贡献,因为它们不仅涉及对现有作品中提出的挑战的批判性分析,而且还发现了许多问题。这些见解将极大地帮助研究人员确定未来研究的适当方向。
    The Internet of Things forensics is a specialised field within digital forensics that focuses on the identification of security incidents, as well as the collection and analysis of evidence with the aim of preventing future attacks on IoT networks. IoT forensics differs from other digital forensic fields due to the unique characteristics of IoT devices, such as limited processing power and connectivity. Although numerous studies are available on IoT forensics, the field is rapidly evolving, and comprehensive surveys are needed to keep up with new developments, emerging threats, and evolving best practices. In this respect, this paper aims to review the state of the art in IoT forensics and discuss the challenges in current investigation techniques. A qualitative analysis of related reviews in the field of IoT forensics has been conducted, identifying key issues and assessing primary obstacles. Despite the variety of topics and approaches, common issues emerge. The majority of these issues are related to the collection and pre-processing of evidence because of the counter-analysis techniques and challenges associated with gathering data from devices and the cloud. Our analysis extends beyond technological problems; it further identifies the procedural problems with preparedness, reporting, and presentation as well as ethical issues. In particular, it provides insights into emerging threats and challenges in IoT forensics, increases awareness and understanding of the importance of IoT forensics in preventing cybercrimes, and ensures the security and privacy of IoT devices and networks. Our findings make a substantial contribution to the field of IoT forensics, as they not only involve a critical analysis of the challenges presented in existing works but also identify numerous problems. These insights will greatly assist researchers in identifying appropriate directions for their future research.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    近年来,Metaverse平台已在全球范围内普及。这种受欢迎程度的增加也加剧了人们对安全的担忧,因为针对儿童和青少年的虚拟性侵犯正在上升。由于这种虚拟犯罪的不确定后果导致当前监管框架中的空白,隐喻中的性虐待问题正变得越来越有争议。根据对Zepeto女性用户的在线调查(n=343),一个隐喻的社交网络平台,用户与他人互动,同时创建个性化的化身和虚拟空间,这项研究旨在探讨女性用户如何解释Zepeto的性骚扰风险,检查用户进行此类风险评估导致的情绪困扰和行为改变的触发因素。它调查了这些解释和响应如何根据他们在虚拟环境中的存在感和参与度以及对他们的化身的认同而有所不同,以及所有这些过程在青少年和成年女性用户之间有何不同。总的来说,这项研究提供了对虚拟受害的复杂动态的见解。这些发现可以为制定监管框架提供信息,保护用户免受虚拟性侵犯,并为所有用户创造更安全的环境。尤其是最年轻的一代。
    Metaverse platforms have gained worldwide popularity in recent years. This increase in popularity has also heightened safety concerns, as virtual sexual assault against children and the youth is on the rise. The issue of sexual abuse in the metaverse is becoming increasingly controversial due to the gaps in the current regulatory framework that result from the uncertain consequences of such virtual crimes. Drawing on an online survey of female users of Zepeto (n = 343), a metaverse social network platform where users interact with others while creating personalized avatars and virtual spaces, this study aims to explore how female users interpret the risk of sexual harassment in Zepeto, examining the triggers of emotional distress and behavioral change that result from such risk assessments by users. It investigates how these interpretations and responses vary depending on their sense of presence and engagement in the virtual environment and identification with their avatars and how all these processes differ between adolescent and adult female users. Overall, this study provides insights into the complex dynamics of virtual victimization. The findings could inform the development of regulatory frameworks that protect users from virtual sexual assault and create a safer environment for all users, especially the youngest generations.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    作为国家,企业,个人每天都依赖互联网,网络犯罪分子操纵系统以非法获取信息并破坏服务以获取经济利益也是如此。2020年,全球网络犯罪成本超过1万亿美元,非洲损失35亿美元。
    采用定量研究方法来调查影响津巴布韦金融机构网络犯罪的因素。该研究侧重于网络安全的技术方面。数据收集时间为2022年7月至2022年10月,针对金融服务领域的技术专家。参与者从13个机构中招募来对网络安全结构进行排名,框架,以及与网络安全相关的挑战。使用分发给参与者的问卷收集数据。描述性统计用于从测量平均值和标准偏差的响应中提取含义。
    网络和数据安全是排名最高的网络安全结构。而人身安全是最少的。三大障碍是威胁越来越复杂,有限的技能和新兴技术,而缺乏行政支持是最少的。使用的顶级框架是信息技术基础设施库(ITIL)和信息及相关技术控制目标(COBIT)。而五分之一尚未采用网络犯罪框架。
    该研究建议金融机构建立网络安全文化来打击网络犯罪,解决网络安全障碍并遵循最佳实践。金融机构应该投资网络安全技术,培训安全专家,并聘请首席信息安全官(CISO)。该研究的小样本可能会影响结果的普遍性。金融机构应实施提高认识的战略,并与机构合作培训网络安全专家,以缩小技能差距。
    UNASSIGNED: As nations, businesses, and individuals rely on the Internet for everyday use, so are cybercriminals manipulating systems to access information illegally and disrupting services for financial gain. The global cost of cybercrime eclipsed one trillion US Dollars in 2020, with Africa losing US $3.5 billion.
    UNASSIGNED: A quantitative research methodology was adopted to investigate factors affecting cybercrime in Zimbabwean financial institutions. The study focused on the technical aspects of cybersecurity. Data were collected from July 2022 to October 2022, targeting technology experts in the financial services sector. Participants were recruited from 13 institutions to rank cybersecurity constructs, frameworks, and challenges associated with cybersecurity. Data was collected using a questionnaire distributed to participants. Descriptive statistics were used to extract meanings from the responses that measure mean and standard deviation.
    UNASSIGNED: Network and data security were the most highly ranked cybersecurity constructs, while physical security was the least. The top three barriers are increasing sophistication of threats, limited skills and emerging technologies, while lack of executive support was the least. The top frameworks used are the Information Technology Infrastructure Library (ITIL) and Control Objectives for Information and Related Technologies (COBIT), while a fifth is yet to adopt cybercrime frameworks.
    UNASSIGNED: The study proposes that financial institutions establish a cybersecurity culture to fight cybercrime, addressing cybersecurity barriers and following best practices. Financial institutions should invest in cybersecurity technologies, train security specialists, and employ a Chief Information Security Officer (CISO). The study\'s small sample may affect the generalisability of the results. Financial institutions should implement strategies to raise awareness and collaborate with institutions to train cybersecurity security specialists to close the skills gap.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    背景:由于损伤后的认知和社会心理后果,获得性脑损伤(ABI)患者可能更容易受到诈骗。网络诈骗导致经济损失和令人沮丧的心理影响,如羞耻和不信任,干扰神经康复,减少独立性。尽管有这些重大的后果,没有心理治疗来支持网络诈骗幸存者。关于当前员工如何解决ABI后网络诈骗的证据有限。
    目的:本研究旨在了解临床医生和服务提供商在解决后ABI网络诈骗方面的观点和需求。
    方法:总的来说,通过澳大利亚各地的目的性抽样,招募了20名多学科临床医生和服务提供商。半结构化访谈探讨了后ABI骗局的经验和漏洞,治疗方法及其疗效,以及未来网络安全恢复干预措施的建议。使用自反性主题分析。
    结果:总计,确定了8个主题,涵盖了对骗局漏洞和影响的生物心理社会理解:\“真正缺乏意识:认知执行困难\”;\“无法应对所有损失\”;\“需要信任和联系\”;\“信任他人的强烈反应\”;\“没有什么可做的”;\“财务压力和独立性\”;\“网络能力\”;和\“骗子说服。“每个主题都为临床建议提供了信息,包括需要提供心理和认知支持,提高金融和网络安全技能,促进有意义的社会参与,并促进家庭和临床支持团队之间的合作。
    结论:多方面的诈骗漏洞和影响凸显了个性化的必要性,全面,以及使用生物心理社会方法进行针对性治疗,以使ABI患者的网络诈骗恢复。这些发现将指导共同设计的干预措施的发展。
    BACKGROUND: People with acquired brain injury (ABI) may be more susceptible to scams owing to postinjury cognitive and psychosocial consequences. Cyberscams result in financial loss and debilitating psychological impacts such as shame and mistrust, interference with neurorehabilitation, and reduced independence. Despite these significant consequences, there are no psychological treatments to support cyberscam survivors. There is limited evidence regarding how the current workforce is addressing post-ABI cyberscams.
    OBJECTIVE: This study aims to understand the perspectives and needs of clinicians and service providers in addressing post-ABI cyberscams.
    METHODS: Overall, 20 multidisciplinary clinicians and service providers were recruited through purposive sampling across Australia. Semistructured interviews explored post-ABI scam experiences and vulnerabilities, treatments and their efficacy, and recommendations for future cybersafety recovery interventions. Reflexive thematic analysis was used.
    RESULTS: In total, 8 themes encompassing a biopsychosocial understanding of scam vulnerabilities and impacts were identified: \"genuine lack of awareness: cognitive-executive difficulties\"; \"not coping with the loss of it all\"; \"needing trust and connection\"; \"strong reactions of trusted others\"; \"nothing structured to do\"; \"financial stress and independence\"; \"cyberability\"; and \"scammer persuasion.\" Each theme informed clinical recommendations including the need to provide psychological and cognitive support, enhance financial and cybersafety skills, promote meaningful social engagement, and foster collaboration between families and clinical support teams.
    CONCLUSIONS: The multifaceted range of scam vulnerabilities and impacts highlighted the need for individualized, comprehensive, and targeted treatments using a biopsychosocial approach to enable cyberscam recovery among people with ABI. These findings will guide the development of a co-designed intervention.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    很少有研究对暗网市场上被盗账户凭证的销售进行过研究。在这项研究中,我们测试了广告特征如何影响提供帐户凭据的非法在线广告的受欢迎程度。与以往的犯罪学研究不同,我们采用一种新颖的方法,通过评估知识对常规消费者行为的适用性,而不是理论解释罪犯行为。
    我们在暗网市场上抓取了1,565个提供凭证的独特广告。我们使用这个面板数据集来预测要价的同时影响,通过估计几个混合面板数据模型,确定广告受欢迎程度的代言线索和标题元素。
    我们的大多数研究结果都不同意我们的假设。询问价格并不影响广告的受欢迎程度。背书提示,包括供应商声誉和累积销售和视图,有混合和消极的关系,分别,随着广告的普及。
    我们的结果可能表明帐户凭证不仅仅是普通产品,但是高风险商品,矛盾的是,随着他们的受欢迎程度变得不那么有吸引力。这项研究强调了对非法在线市场动态有更深入了解的必要性,以改善有关非法消费者行为的理论,并协助网络安全专家更有效地破坏犯罪商业模式。我们为未来的实验研究提出了几种途径,以进一步了解这些非法过程。
    UNASSIGNED: Few studies have examined the sales of stolen account credentials on darkweb markets. In this study, we tested how advertisement characteristics affect the popularity of illicit online advertisements offering account credentials. Unlike previous criminological research, we take a novel approach by assessing the applicability of knowledge on regular consumer behaviours instead of theories explaining offender behaviour.
    UNASSIGNED: We scraped 1,565 unique advertisements offering credentials on a darkweb market. We used this panel data set to predict the simultaneous effects of the asking price, endorsement cues and title elements on advertisement popularity by estimating several hybrid panel data models.
    UNASSIGNED: Most of our findings disconfirm our hypotheses. Asking price did not affect advertisement popularity. Endorsement cues, including vendor reputation and cumulative sales and views, had mixed and negative relationships, respectively, with advertisement popularity.
    UNASSIGNED: Our results might suggest that account credentials are not simply regular products, but high-risk commodities that, paradoxically, become less attractive as they gain popularity. This study highlights the necessity of a deeper understanding of illicit online market dynamics to improve theories on illicit consumer behaviours and assist cybersecurity experts in disrupting criminal business models more effectively. We propose several avenues for future experimental research to gain further insights into these illicit processes.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    Cyberscams,比如浪漫骗局,在一般社区中普遍存在且代价高昂的在线危害。获得性脑损伤(ABI)的人可能特别脆弱,并且很难从由此产生的情感和经济困难中恢复过来。为了建立神经康复部门的能力,有必要确定临床医生目前是否遇到这个问题,以及发现哪些预防和干预方法是有效的.这项范围研究旨在探索临床医生对ABI成年客户的网络诈骗的接触和经验。
    方法:参与者是从澳大利亚和新西兰的多学科网络招募的临床医生。符合条件的参与者(n=101)完成了在线定制调查。
    结果:超过一半(53.46%)的参与者有一个或多个客户受到网络诈骗的影响,主要是浪漫骗局。据报道,认知障碍和孤独感与脆弱性增加有关。Cyberscams影响了治疗的提供,对参与者来说是情感上的挑战。没有确定高度有效的干预措施。
    结论:这些发现表明,网络诈骗是与神经康复提供者相关的临床问题,现在需要进行患病率研究。缺乏有效的干预措施强调了开发基于证据的预防和治疗方法的必要性,以最终帮助ABI患者安全地参与在线生活。
    Cyberscams, such as romance scams, are prevalent and costly online hazards in the general community. People with Acquired Brain Injury (ABI) may be particularly vulnerable and have greater difficulty recovering from the resultant emotional and financial hardships. In order to build capacity in the neurorehabilitation sector, it is necessary to determine whether clinicians currently encounter this issue and what prevention and intervention approaches have been found effective. This scoping study aimed to explore clinicians\' exposure to and experiences with cyberscams in their adult clients with ABI.
    Participants were clinicians recruited from multidisciplinary networks across Australia and New Zealand. Eligible participants (n = 101) completed an online customised survey.
    More than half (53.46%) the participants had one or more clients affected by cyberscams, predominantly romance scams. Cognitive impairments and loneliness were reportedly associated with increased vulnerability. Cyberscams impacted treatment provision and were emotionally challenging for participants. No highly effective interventions were identified.
    These findings indicate that cyberscams are a clinical issue relevant to neurorehabilitation providers, with prevalence studies now required. The lack of effective interventions identified underscores the need for the development of evidence-based prevention and treatment approaches to ultimately help people with ABI safely participate in online life.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    暗网,深网的一部分,只能通过专门的计算机软件访问,并用于网络犯罪等非法活动,贩毒,和剥削。像Tor这样的技术进步,比特币,加密货币允许犯罪分子匿名进行这些活动,导致暗网的使用增加。同时,电脑已经成为我们日常生活中不可或缺的一部分,塑造我们的行为,并影响我们如何与彼此和世界互动。这项工作对过去十年在Darkweb上进行的研究进行了文献计量学研究。研究结果表明,大多数关于Darkweb的研究可以基于关键词共现分析分为四个方面:(一)网络安全,恶意软件,和网络攻击,(ii)网络犯罪,数据隐私,和密码学,(三)机器学习,社交媒体,和人工智能,和(四)贩毒,加密市场。来自美国的国家科学基金会是最大的资助者。暗网活动干扰了联合国为促进今世后代的和平与可持续性而制定的可持续发展目标。SDG16(和平,正义,和StrongInstitutions)的出版物和引文数量最多,但与Darkweb呈反比关系,因为后者破坏了前者。这项研究强调了对比特币进行进一步研究的必要性,区块链,IoT,NLP,加密货币,网络钓鱼和网络犯罪,僵尸网络和恶意软件,数字取证,暗网的电子犯罪对策。该研究进一步阐明了Darkweb的多维性质,强调技术之间错综复杂的关系,心理学,和地缘政治。这种全面的理解是发展有效对策的基石,并呼吁采用跨学科研究方法。该研究还深入研究了驱使个人在Darkweb上进行非法活动的心理动机,强调了有针对性的干预措施以促进亲社会在线行为的紧迫性。
    The Darkweb, part of the deep web, can be accessed only through specialized computer software and used for illegal activities such as cybercrime, drug trafficking, and exploitation. Technological advancements like Tor, bitcoin, and cryptocurrencies allow criminals to carry out these activities anonymously, leading to increased use of the Darkweb. At the same time, computers have become an integral part of our daily lives, shaping our behavior, and influencing how we interact with each other and the world. This work carries out the bibliometric study on the research conducted on Darkweb over the last decade. The findings illustrate that most research on Darkweb can be clustered into four areas based on keyword co-occurrence analysis: (i) network security, malware, and cyber-attacks, (ii) cybercrime, data privacy, and cryptography, (iii) machine learning, social media, and artificial intelligence, and (iv) drug trafficking, cryptomarket. National Science Foundation from the United States is the top funder. Darkweb activities interfere with the Sustainable Development Goals (SDG) laid forth by the United Nations to promote peace and sustainability for current and future generations. SDG 16 (Peace, Justice, and Strong Institutions) has the highest number of publications and citations but has an inverse relationship with Darkweb, as the latter undermines the former. This study highlights the need for further research in bitcoin, blockchain, IoT, NLP, cryptocurrencies, phishing and cybercrime, botnets and malware, digital forensics, and electronic crime countermeasures about the Darkweb. The study further elucidates the multi-dimensional nature of the Darkweb, emphasizing the intricate relationship between technology, psychology, and geopolitics. This comprehensive understanding serves as a cornerstone for evolving effective countermeasures and calls for an interdisciplinary research approach. The study also delves into the psychological motivations driving individuals towards illegal activities on the Darkweb, highlighting the urgency for targeted interventions to promote pro-social online behavior.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    这篇评论的目的是总结有关父母生产的现有实证研究,并探讨父母犯罪者在儿童性虐待材料(CSAM)奖学金中的话语定位。使用相关术语的组合搜索学术数据库,随着新术语的确定,审查范围扩大。这篇评论确定了66篇学术文章,文件,或自1970年以来出版的涉及父母生产CSAM的书籍。为了探索父母罪犯是如何随着时间的推移在这篇文献中定位的,审查是根据时间顺序总结提出的,提出关键主题和经验见解。审查表明,父母CSAM生产是常见的,更有可能涉及青春期前的受害者,更严重的虐待,女性和男性犯罪者,并产生具有严重长期后遗症的高需求非法内容。然而,审查发现,贩运儿童和性剥削奖学金对“商业”和利润驱动的虐待的重点已经边缘化和掩盖了父母CSAM生产作为一个严重的政策挑战。这些发现保证了研究的重新定位,政策,和实践技术促进儿童性剥削的方法,以及对研究人员和政策制定者抵制承认基于家庭的性剥削问题的反思。
    The aim of this review is to summarize the available empirical research on parental production and to explore the discursive positioning of parental perpetrators within scholarship on child sexual abuse material (CSAM). Academic databases were searched using a combination of relevant terms, and the review was expanded as new terms were identified. The review identified 66 scholarly articles, papers, or books that referred to parental production of CSAM published since 1970. To explore how parental offenders have been positioned within this literature over time, the review is presented according to a chronological summary, drawing out key themes and empirical insights. The review showed that parental CSAM production is common, more likely to involve pre-pubescent victims, more severe abuse, female as well as male perpetrators, and produces high-demand illegal content with serious long-term sequelae. However, the review found that the focus of child trafficking and sexual exploitation scholarship on \"commercial\" and profit-driven abuse has marginalized and obscured parental CSAM production as a serious policy challenge. These findings warrant a reorientation of research, policy, and practice approaches to technology-facilitated child sexual exploitation, as well as a reflection on the resistance of researchers and policymakers to acknowledging the problem of family-based sexual exploitation.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    关于欺骗检测的研究通常是在实验室的实验设置中进行的。相比之下,本研究调查了欺诈的实际受害者和附近受害者的欺骗检测,用他们自己的话报道。
    我们的研究基于对11种(大部分)在线欺诈受害的全国代表性调查(N=2,864)。我们使用了来自实际受害者和附近受害者的定性信息,说明他们为什么不被欺诈所骗,或者如何,事后看来,本来是可以避免的.
    附近的受害者(N=958)提到的主要检测策略是1)欺诈知识(69%):这些附近的受害者清楚地认识到欺诈。与欺诈知识相关的其他策略是:注意错误(27.9%),关于安全行为的规则和原则(11.7%),和个人知识(7.1%)。第二种策略是不信任(26.1%)。第三种策略是“明智的经验”(1.6%)。最后,数量有限的受访者(7.8%)搜索了其他信息:他们联系了其他人(5.5%),在网上寻求信息(4%),联系欺诈者(2.9%),联系他们的银行或信用卡公司(2.2%),或联系警方(0.2%)。使用知识作为策略将受害概率降低了0.43倍。相比之下,所有其他策略都将受害的可能性增加了1.6倍或更多。策略通常是不相关的,几种策略因欺诈类型而异。大约40%的实际受害者(N=243)认为他们的受害可能是通过以下方式防止的:1)寻求信息(25.2%),2)更加关注(18.9%),3)第三方做某事(16.2%),4)遵循安全规则或原则,比如使用更安全的支付或交易方式(14.4%),或5)“根本不同意”(10.8%)。这些策略中的大多数与更高的,不更低,受害的可能性。
    显然,了解欺诈是避免欺诈受害的最佳策略。因此,需要一种更积极主动的方法来告知公众欺诈和攻击者的作案手法,这样潜在的受害者在遇到欺诈时就已经知道了。仅仅在线提供信息不足以保护在线用户。
    UNASSIGNED: Research on deception detection has usually been executed in experimental settings in the laboratory. In contrast, the present research investigates deception detection by actual victims and near victims of fraud, as reported in their own words.
    UNASSIGNED: Our study is based on a nationally representative survey of 11 types of (mostly) online fraud victimization (N = 2,864). We used qualitative information from actual victims and near victims on why they didn\'t fall for the fraud, or how, in hindsight, it could have been prevented.
    UNASSIGNED: The main detection strategies mentioned by near victims (N = 958) were 1) fraud knowledge (69%): these near victims clearly recognized fraud. Other strategies related to fraud knowledge were: noticing mistakes (27.9%), rules and principles about safe conduct (11.7%), and personal knowledge (7.1%). A second type of strategy was distrust (26.1%). A third strategy was \'wise through experience\' (1.6%). Finally, a limited number of respondents (7.8%) searched for additional information: they contacted other people (5.5%), sought information online (4%), contacted the fraudster (2.9%), contacted their bank or credit card company (2.2%), or contacted the police (0.2%). Using knowledge as a strategy decreases the probability of victimization by a factor of 0.43. In contrast, all other strategies increased the likelihood of victimization by a factor of 1.6 or more. Strategies generally were uncorrelated, several strategies differed by type of fraud. About 40% of the actual victims (N = 243) believed that their victimization might have been prevented by: 1) seeking information (25.2%), 2) paying more attention (18.9%), 3) a third party doing something (16.2%), 4) following safety rules or principles, like using a safer way of paying or trading (14.4%), or by 5) \'simply not going along with it\' (10.8%). Most of these strategies were associated with a higher, not lower, likelihood of victimization.
    UNASSIGNED: Clearly, knowledge of fraud is the best strategy to avoid fraud victimization. Therefore, a more proactive approach is needed to inform the public about fraud and attackers\' modus operandi, so that potential victims already have knowledge of fraud upon encountering it. Just providing information online will not suffice to protect online users.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

公众号