Document Type
|
:
|
BL
|
Record Number
|
:
|
842984
|
Main Entry
|
:
|
Button, Mark
|
Title & Author
|
:
|
Cyber frauds, scams and their victims /\ Mark Button and Cassandra Cross.
|
Publication Statement
|
:
|
London ;New York :: Routledge, Taylor & Francis Group,, 2017.
|
Page. NO
|
:
|
xviii, 232 pages ;; 24 cm
|
ISBN
|
:
|
1138931195
|
|
:
|
: 1138931209
|
|
:
|
: 9781138931190
|
|
:
|
: 9781138931206
|
|
:
|
9781315679877
|
|
:
|
9781317395478 (Mobipocket ebook)
|
|
:
|
9781317395485 (ePub ebook)
|
|
:
|
9781317395492 (PDF ebook)
|
Bibliographies/Indexes
|
:
|
Includes bibliographical references and index.
|
Contents
|
:
|
Machine generated contents note: 1.`The dark side of crime': cyber frauds and scams -- Introduction -- Defining fraud and scams -- The extent of cyber fraud and scams -- Crime statistics -- Victimisation surveys -- Central reporting agencies -- Special fraud statistics -- Technology, change and the fraudogenic consequences -- The expansion of the internet -- The growth of social networking -- The growth of online shopping and banking -- Technology and commerce -- The impact of technology on fraud -- Opportunities for fraud -- Globalisation of fraud -- Risk of fraud -- Perpetrators of fraud -- Origin -- Academic studies -- Conclusion -- 2.`It could be you': victims and the diversity of fraud -- Introduction -- The diversity and dynamism of frauds -- Consumer investment fraud -- Consumer products and services fraud -- Employment fraud -- Prize and grant fraud -- Phantom debt collection fraud -- Charity fraud -- Relationship and trust fraud -- Identity fraud
|
|
:
|
Note continued: Applying the five categories to cyber fraud and scams -- Increasing the effort -- Increasing the risks -- Reducing the rewards -- Reducing provocations -- Removing excuses -- The challenge of prevention -- `The Little Black Book of Seams': demonstrating current prevention approaches -- Too much detail -- The differentiation of fraud types is redundant to offenders -- Conclusion -- 9.Conclusion: the future of cyber frauds and scams.
|
|
:
|
Note continued: Hackers -- Corruption and incompetence -- Darkweb/net -- Detection avoidance strategies -- `Rip and tear' -- Operation from regimes with limited police interest/weak sentencing -- Making reporting unlikely -- Fraudster networking and the `darkweb' -- Conclusion -- 4.`Not a victimless crime': the impact of fraud upon victims -- Introduction -- Impact of crime in general -- Psychological impact -- Emotional impact -- Behavioural impact -- Physical impact -- Financial impact -- The `victimless' crime? -- Financial impact -- Little or no impact -- Psychological impacts -- Anger -- Stress -- Upset -- Ridicule and embarrassment -- Impact on relationships -- Physical and mental health impacts -- Suicide (attempts and ideation) -- Damaged reputation -- Fear of violence and other negative consequences -- Change in behaviour -- Conclusion -- 5.Blaming the victim -- Introduction -- An introduction to victimology -- The ideal victim
|
|
:
|
Note continued: Other classification factors -- The most common frauds -- The `mechanics' of fraud -- Existing knowledge of victim profiles -- Conclusion -- 3.`Gullible, greedy or stupid surely?' Falling for cyber frauds and scams: the techniques of the fraudsters -- Introduction -- Falling for frauds and scams -- Diversity of frauds and scams -- Victim selection techniques -- Potential victim lists -- Social networking -- Affinity groups -- Targeted advertising -- Perpetration strategies -- Small amounts of money and mass targeting -- Authority and legitimacy -- Visceral appeals -- Pressure and coercion -- Grooming -- Operating in a legal hinterland -- Good sales techniques -- Fraud at a distance -- Embarrassing and criminal frauds -- Identity fraud perpetration techniques -- Redirection or stealing of mail -- `Jackal' fraud -- Theft of personal information -- `Dumpster diving' -- `Skimming' and `sniffing' -- Social engineering -- Trojans, malware and spyware
|
|
:
|
Note continued: Private policing bodies -- The challenges of plural provision -- Responsibility -- Coordination and cooperation -- Inequity -- Punishment of fraudsters -- Attrition -- What do victims want regarding punishment? -- Sanctions for fraudulent acts -- Criminal penalties -- Alternative punishments -- Disruption -- Conclusion -- 8.Preventing cyber frauds and scams -- Introduction -- Crime prevention in general -- Offline crime versus online crime: the same or different? -- Preventing fraud and cyber fraud using situational crime prevention -- Increasing the effort -- Increasing the risks -- Reducing the rewards -- Reducing provocations -- Removing excuses -- Plural responsibility for prevention -- Victim-led groups -- Not-for-profits -- Commercial bodies -- Using financial intelligence to target online fraud -- Locating a victim-oriented approach within a crime prevention framework -- Preventing revictimisation -- The timing of the intervention -- Summary
|
|
:
|
Note continued: The stereotype of online fraud victims -- The consequences of the victim-blaming attitude -- Conclusion -- 6.`Forgotten victims': supporting those who experience fraud -- Introduction -- Problems with supporting victims: getting support -- The needs of fraud victims -- A Formal Response Through the Criminal Justice System or Other Relevant System -- Getting money back and/or compensation -- Prevention advice and information -- Formal and informal support -- Other needs -- An ideal response to fraud victims' needs -- Best practice examples from across the world -- Action Fraud and Victim Support (UK) -- Senior Support Unit (Canada) -- Face-to-face support groups (Australia) -- Think Jessica (UK) -- TransUnion (USA) -- iDcare (Australia and New Zealand) -- Conclusion -- 7.Policing and punishment for cyber frauds and scams -- Introduction -- Policing, pluralisation and fraud -- State general police dedicated to fraud -- Hybrid policing
|
Abstract
|
:
|
Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are increasingly being transitioned to an online environment. This book takes a case study-based approach to exploring the types, perpetrators and victims of cyber frauds. Topics covered include: An in-depth breakdown of the most common types of cyber fraud and scams. The victim selection techniques and perpetration strategies of fraudsters. An exploration of the impact of fraud upon victims and best practice examples of support systems for victims. Current approaches for policing, punishing and preventing cyber frauds and scams. This book argues for a greater need to understand and respond to cyber fraud and scams in a more effective and victim-centred manner. It explores the victim-blaming discourse, before moving on to examine the structures of support in place to assist victims, noting some of the interesting initiatives from around the world and the emerging strategies to counter this problem. This book is essential reading for students and researchers engaged in cyber crime, victimology and international fraud. Book jacket.
|
Subject
|
:
|
Computer crimes.
|
Subject
|
:
|
Fraud.
|
Subject
|
:
|
Victims of crimes.
|
Subject
|
:
|
71.65 criminality as a social problem.
|
Subject
|
:
|
Computer crimes.
|
Subject
|
:
|
Fraud.
|
Subject
|
:
|
Victims of crimes.
|
Dewey Classification
|
:
|
364.16/302854678
|
LC Classification
|
:
|
HV6773.B87 2017
|
Added Entry
|
:
|
Cross, Cassandra
|