Cyber frauds, scams and their victims:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London
Routledge
2017
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xviii, 232 S. Ill. |
ISBN: | 9781138931206 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044454484 | ||
003 | DE-604 | ||
005 | 20190524 | ||
007 | t | ||
008 | 170821s2017 a||| |||| 00||| eng d | ||
020 | |a 9781138931206 |9 978-1-138-93120-6 | ||
035 | |a (OCoLC)1002237565 | ||
035 | |a (DE-599)BVBBV044454484 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-19 | ||
100 | 1 | |a Button, Mark |d 1969- |e Verfasser |0 (DE-588)1034622234 |4 aut | |
245 | 1 | 0 | |a Cyber frauds, scams and their victims |c Mark Button, Cassandra Cross |
264 | 1 | |a London |b Routledge |c 2017 | |
300 | |a xviii, 232 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Betrug |0 (DE-588)4006249-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Verbrechensopfer |0 (DE-588)4078782-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 1 | |a Betrug |0 (DE-588)4006249-1 |D s |
689 | 0 | 2 | |a Verbrechensopfer |0 (DE-588)4078782-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Cross, Cassandra |e Verfasser |0 (DE-588)1139870920 |4 aut | |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029855313&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-029855313 |
Datensatz im Suchindex
_version_ | 1804177772923322368 |
---|---|
adam_text | CONTENTS
LIST OF FIGURES XII
LIST OF TABLES XIII
LIST OF CASES XV
ABOUT THE AUTHORS XVII
ACKNOWLEDGEMENTS XIX
1 THE DARK SIDE OF CRIME : CYBER FRAUDS AND SCAMS 1
INTRODUCTION 1
DEFINING FRAUD AND SCAMS 6
THE EXTENT OF CYBER FRAUD AND SCAMS 12
CRIME STATISTICS 13
VICTIMISATION SURVEYS 13
CENTRAL REPORTING AGENCIES 17
SPECIAL FRAUD STATISTICS 18
TECHNOLOGY, CHANGE AND THE FRAUDOGENK CONSEQUENCES 20
THE EXPANSION OF THE INTERNET 20
THE GROWTH OF SOCIAL NETWORKING 20
THE GROWTH OF ONLINE SHOPPING AND BANKING 21
TECHNOLOGY AND COMMERCE 21
THE IMPACT OF TECHNOLOGY ON FRAUD 22
OPPORTUNITIES FOR FRAUD 22
GLOBALISATION OF FRAUD 25
RISK OF FRAUD 26
PERPETRATORS OF FRAUD 21
ORIGIN 28
ACADEMIC STUDIES 29
CONCLUSION 32
VIII CONTENTS
2 IT COULD BE YOU : VICTIMS AND THE DIVERSITY OF FRAUD 38
INTRODUCTION 38
THE DIVERSITY AND DYNAMISM OF FRAUDS 38
CONSUMER INVESTMENT FRAUD 39
CONSUMER PRODUCTS AND SERVICES FRAUD 39
EMPLOYMENT FRAUD 41
PRIZE AND GRANT FRAUD 42
PHANTOM DEBT COLLECTION FRAUD 43
CHARITY FRAUD 43
RELATIONSHIP AND TRUST FRAUD 43
IDENTITY FRAUD 43
OTHER CLASSIFICATION FACTORS 45
THE MOST COMMON FRAUDS 46
THE MECHANICS OF FRAUD 51
EXISTING KNOWLEDGE OF VICTIM PROFILES 52
CONCLUSION 58
3 GULLIBLE, GREEDY OR STUPID SURELY? FALLING FOR CYBER FRAUDS
AND SCAMS: THE TECHNIQUES OF THE FRAUDSTERS 62
INTRODUCTION 62
FALLING FOR FRAUDS AND SCAMS 63
DIVERSITY OF FRAUDS AND SCAMS 64
VICTIM SELECTION TECHNIQUES 65
POTENTIAL VICTIM LISTS 65
SOCIAL NETWORKING 66
AFFINITY GROUPS 67
TARGETED ADVERTISING 67
PERPETRATION STRATEGIES 68
SMALL AMOUNTS OF MONEY AND MASS TARGETING 68
AUTHORITY AND LEGITIMACY 71
VISCERAL APPEALS 74
PRESSURE AND COERCION 75
GROOMING 76
OPERATING IN A LEGAL HINTERLAND 76
GOOD SALES TECHNIQUES 76
FRAUD AT A DISTANCE 77
EMBARRASSING AND CRIMINAL FRAUDS 78
IDENTITY FRAUD PERPETRATION TECHNIQUES 19
REDIRECTION OR STEALING OF MAIL 80
JACKAL FRAUD 80
THEFT OF PERSONAL INFORMATION 80
DUMPSTER DIVING 80
CONTENTS IX
SKIMMING AND SNIFFING 80
SOCIAL ENGINEERING 81
TROJANS, MALWARE AND SPYWARE 82
HACKERS 82
CORRUPTION AND INCOMPETENCE 83
DARKWEB/NET 84
DETECTION AVOIDANCE STRATEGIES 84
RIP AND TEAR 84
OPERATION FROM REGIMES WITH LIMITED POLICE
INTEREST/WEAK SENTENCING 84
MAKING REPORTING UNLIKELY 85
FRAUDSTER NETWORKING AND THE DARKWEB 85
CONCLUSION 86
4 NOT A VICTIMLESS CRIME : THE IMPACT OF FRAUD UPON VICTIMS 91
INTRODUCTION 91
IMPACT OJ CRIME IN GENERAL 91
PSYCHOLOGICAL IMPACT 92
EMOTIONAL IMPACT 92
BEHAVIOURAL IMPACT 92
PHYSICAL IMPACT 93
FINANCIAL IMPACT 93
THE VICTIMLESS CRIME? 93
FINANCIAL IMPACT 95
LITTLE OR NO IMPACT 96
PSYCHOLOGICAL IMPACTS 97
ANGER 98
STRESS 98
UPSET 99
RIDICULE AND EMBARRASSMENT 99
IMPACT ON RELATIONSHIPS 101
PHYSICAL AND MENTAL HEALTH IMPACTS 103
SUICIDE (ATTEMPTS AND IDEATION) 104
DAMAGED REPUTATION 105
FEAR OF VIOLENCE AND OTHER NEGATIVE CONSEQUENCES 108
CHANGE IN BEHAVIOUR 111
CONCLUSION 111
5 BLAMING THE VICTIM 115
INTRODUCTION 115
AN INTRODUCTION TO VICTIMOLOGY 115
THE IDEAL VICTIM 116
X CONTENTS
THE STEREOTYPE OF ONLINE FRAUD VICTIMS 111
THE CONSEQUENCES OF THE VICTIM-BLAMING ATTITUDE 122
CONCLUSION 132
6 FORGOTTEN VICTIMS : SUPPORTING THOSE WHO EXPERIENCE FRAUD 135
INTRODUCTION 135
PROBLEMS WITH SUPPORTING VICTIMS: GETTING SUPPORT 135
THE NEEDS OF FRAUD VICTIMS 139
A FORMAL RESPONSE THROUGH THE CRIMINAL JUSTICE SYSTEM OR OTHER
RELEVANT SYSTEM 141
GETTING MONEY BACK AND/OR COMPENSATION 142
PREVENTION ADVICE AND INFORMATION 142
FORMAL AND INFORMAL SUPPORT 143
OTHER NEEDS 144
AN IDEAL RESPONSE TO FRAUD VICTIMS NEEDS 144
BEST PRACTICE EXAMPLES FROM ACROSS THE WORLD 145
ACTION FRAUD AND VICTIM SUPPORT (UK) 146
SENIOR SUPPORT UNIT (CANADA) 146
FACE-TO-FACE SUPPORT GROUPS (AUSTRALIA) 149
THINK JESSICA (UK) 151
TRANSUNION (USA) 151
IDCARE (AUSTRALIA AND NEW ZEALAND) 151
CONCLUSION 152
1 POLICING AND PUNISHMENT FOR CYBER FRAUDS AND SCAMS 155
INTRODUCTION 155
POLICING, PLURALISATION AND FRAUD 156
STATE GENERAL POLICE DEDICATED TO FRAUD 158
HYBRID POLICING 161
PRIVATE POLICING BODIES 164
THE CHALLENGES OF PLURAL PROVISION 112
RESPONSIBILITY 173
COORDINATION AND COOPERATION 173
INEQUITY 173
PUNISHMENT OF FRAUDSTERS 115
ATTRITION 175
WHAT DO VICTIMS WANT REGARDING PUNISHMENT? 176
SANCTIONS FOR FRAUDULENT ACTS 177
CRIMINAL PENALTIES 177
ALTERNATIVE PUNISHMENTS 179
DISRUPTION 182
CONCLUSION 182
CONTENTS XI
8 PREVENTING CYBER FRAUDS AND SCAMS 187
INTRODUCTION 187
CRIME PREVENTION IN GENERAL 188
OFFLINE CRIME VERSUS ONLINE CRIME: THE SAME OR DIFFERENT? 192
PREVENTING FRAUD AND CYBER FRAUD USING SITUATIONAL CRIME
PREVENTION 194
INCREASING THE EFFORT 194
INCREASING THE RISKS 197
REDUCING THE REWARDS 200
REDUCING PROVOCATIONS 200
REMOVING EXCUSES 200
PLURAL RESPONSIBILITY FOR PREVENTION 202
VICTIM-LED GROUPS 202
NOT-FOR-PROFITS 204
COMMERCIAL BODIES 204
USING FINANCIAL INTELLIGENCE TO TARGET ONLINE FRAUD 205
LOCATING A VICTIM-ORIENTED APPROACH WITHIN A CRIME PREVENTION
FRAMEWORK 207
PREVENTING REVICTIMISATION 208
THE TIMING OF THE INTERVENTION 210
SUMMARY 214
APPLYING THE FIVE CATEGORIES TO CYBER FRAUD AND SCAMS 214
INCREASING THE EFFORT 215
INCREASING THE RISKS 215
REDUCING THE REWARDS 215
REDUCING PROVOCATIONS 215
REMOVING EXCUSES 216
THE CHALLENGE OF PREVENTION 216
THE LITDE BLACK BOOK OF SEAMS : DEMONSTRATING CURRENT
PREVENTION APPROACHES 217
TOO MUCH DETAIL 218
THE DIFFERENTIATION OF FRAUD TYPES IS REDUNDANT TO OFFENDERS 220
CONCLUSION 222
9 CONCLUSION: THE FUTURE OF CYBER FRAUDS AND SCAMS 227
INDEX 231
|
any_adam_object | 1 |
author | Button, Mark 1969- Cross, Cassandra |
author_GND | (DE-588)1034622234 (DE-588)1139870920 |
author_facet | Button, Mark 1969- Cross, Cassandra |
author_role | aut aut |
author_sort | Button, Mark 1969- |
author_variant | m b mb c c cc |
building | Verbundindex |
bvnumber | BV044454484 |
ctrlnum | (OCoLC)1002237565 (DE-599)BVBBV044454484 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01433nam a2200361 c 4500</leader><controlfield tag="001">BV044454484</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190524 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">170821s2017 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781138931206</subfield><subfield code="9">978-1-138-93120-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1002237565</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044454484</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-19</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Button, Mark</subfield><subfield code="d">1969-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1034622234</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber frauds, scams and their victims</subfield><subfield code="c">Mark Button, Cassandra Cross</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Routledge</subfield><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xviii, 232 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betrug</subfield><subfield code="0">(DE-588)4006249-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verbrechensopfer</subfield><subfield code="0">(DE-588)4078782-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Betrug</subfield><subfield code="0">(DE-588)4006249-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Verbrechensopfer</subfield><subfield code="0">(DE-588)4078782-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cross, Cassandra</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1139870920</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029855313&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029855313</subfield></datafield></record></collection> |
id | DE-604.BV044454484 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:53:24Z |
institution | BVB |
isbn | 9781138931206 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029855313 |
oclc_num | 1002237565 |
open_access_boolean | |
owner | DE-19 DE-BY-UBM |
owner_facet | DE-19 DE-BY-UBM |
physical | xviii, 232 S. Ill. |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Routledge |
record_format | marc |
spelling | Button, Mark 1969- Verfasser (DE-588)1034622234 aut Cyber frauds, scams and their victims Mark Button, Cassandra Cross London Routledge 2017 xviii, 232 S. Ill. txt rdacontent n rdamedia nc rdacarrier Betrug (DE-588)4006249-1 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Verbrechensopfer (DE-588)4078782-5 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 s Betrug (DE-588)4006249-1 s Verbrechensopfer (DE-588)4078782-5 s DE-604 Cross, Cassandra Verfasser (DE-588)1139870920 aut SWB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029855313&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Button, Mark 1969- Cross, Cassandra Cyber frauds, scams and their victims Betrug (DE-588)4006249-1 gnd Internetkriminalität (DE-588)7864395-8 gnd Verbrechensopfer (DE-588)4078782-5 gnd |
subject_GND | (DE-588)4006249-1 (DE-588)7864395-8 (DE-588)4078782-5 |
title | Cyber frauds, scams and their victims |
title_auth | Cyber frauds, scams and their victims |
title_exact_search | Cyber frauds, scams and their victims |
title_full | Cyber frauds, scams and their victims Mark Button, Cassandra Cross |
title_fullStr | Cyber frauds, scams and their victims Mark Button, Cassandra Cross |
title_full_unstemmed | Cyber frauds, scams and their victims Mark Button, Cassandra Cross |
title_short | Cyber frauds, scams and their victims |
title_sort | cyber frauds scams and their victims |
topic | Betrug (DE-588)4006249-1 gnd Internetkriminalität (DE-588)7864395-8 gnd Verbrechensopfer (DE-588)4078782-5 gnd |
topic_facet | Betrug Internetkriminalität Verbrechensopfer |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029855313&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT buttonmark cyberfraudsscamsandtheirvictims AT crosscassandra cyberfraudsscamsandtheirvictims |