LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Whitty, Monica T.; Edwards, Michael; Levi, M.; Peersman, C.; Rashid, A.; Sasse, A.; Sorell, Tom; Stringhini, G.
Publisher: ACM
Languages: English
Types: Conference object
Subjects: BF, ACM proceedings, mass-marketing fraud, online scams, cybercrime, cybersafety, T1, B1
Mass-marketing frauds (MMFs) are on the increase. Given the amount of monies lost and the psychological impact of MMFs there is an urgent need to develop new and effective methods to prevent more of these crimes. This paper reports the early planning of automated methods our interdisciplinary team are developing to prevent and detect MMF. Importantly, the paper presents the ethical and social constraints involved in such a model and suggests concerns others might also consider when developing automated systems.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] T. Buchanan and M. T. Whitty. The online dating romance scam: causes and consequences of victimhood. Psychology, Crime & Law, 20(3):261{283, 2014.
    • [2] G. Gu, P. A. Porras, V. Yegneswaran, M. W. Fong, and W. Lee. Bothunter: Detecting malware infection through ids-driven dialog correlation. In Usenix Security, volume 7, pages 1{16, 2007.
    • [3] J. T. Hancock, L. Curry, S. Goorha, and M. Woodworth. Automated linguistic analysis of deceptive and truthful synchronous computer-mediated communication. In System Sciences, 2005. HICSS'05. Proceedings of the 38th Annual Hawaii International Conference on, pages 22c{22c. IEEE, 2005.
    • [4] J. Huang, G. Stringhini, and P. Yong. Quit playing games with my heart: Understanding online dating scams. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pages 216{236. Springer, 2015.
    • [5] S. Lea, P. Fischer, and K. M. Evans. The economic psychology of scams. International Association for Research in Economic Psychology and the Society for the Advancement of Behavioral Economics, Nova Scotia, Canada, 2009.
    • [6] D. Modic and R. J. Anderson. We will make you like our research: The development of a susceptibility-to-persuasion scale. Social Science Research Network, 2014.
    • [7] A. Rashid, K. Moore, C. May-Chahal, and R. Chitchyan. Managing emergent ethical concerns for software engineering in society. In Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on, volume 2, pages 523{526. IEEE, 2015.
    • [8] A. Sasse. Scaring and bullying people into security won't work. IEEE Security & Privacy, 13(3):80{83, 2015.
    • [9] D. Weirich and M. A. Sasse. Persuasive password security. In CHI'01 Extended Abstracts on Human Factors in Computing Systems, pages 139{140. ACM, 2001.
    • [10] M. T. Whitty. The scammers persuasive techniques model: Development of a stage model to explain the online dating romance scam. British Journal of Criminology, 53(4):665{684, 2013.
    • [11] M. T. Whitty. Mass-marketing fraud: a growing concern. IEEE Security & Privacy, 13(4):84{87, 2015.
    • [12] M. T. Whitty and T. Buchanan. The online dating romance scam: The psychological impact on victims{both nancial and non- nancial. Criminology & Criminal Justice, 16(2):176{194, 2016.
    • [13] L. Zhou, J. K. Burgoon, J. F. Nunamaker, and D. Twitchell. Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications. Group decision and negotiation, 13(1):81{106, 2004.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article