Showing 1 - 20 results of 23 for search '"scams"', query time: 0.04s Refine Results
  1. 1

    The Frames of Romance Scamming by Pamela Faber

    Published 2024-12-01
    Subjects: “…romance scamming…”
    Get full text
    Article
  2. 2

    Phishing scams on social media: An evaluation of cyber awareness education on impact and effectiveness by Emma Mouncey, Simona Ciobotaru

    Published 2025-03-01
    “…The threat of phishing scams is rising, with increasingly deceptive techniques targeting social media platforms such as Instagram. …”
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Survey on Ethereum phishing detection technology by Zhao CAI, Tao JING, Shuang REN

    Published 2023-04-01
    “…With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high degree of deception and concealment, causing significant losses to both users and businesses.Ethereum platform, with its smart contract functionality, has attracted many crypto currency investors.However, this widespread popularity has also attracted an influx of criminals, leading to the rise of cybercrime activities.Among them, phishing scams are one of the main forms of fraud on the Ethereum platform.To tackle this issue, researchers have developed Ethereum network phishing identification technology, achieving significant progress in this field.However, there has been relatively little systematic analysis and summary of these research results.The current state of phishing fraud on the Ethereum network was analyzed.Moreover, a comprehensive summary of existing phishing detection datasets and evaluation metrics were provided.On this basis, methods for detecting phishing on Ethereum were reviewed, including those based on transaction information, graph embedding and graph neural networks.Transaction information-based methods are the most common, analyzing information such as input and output addresses and amounts in transaction data to determine whether a transaction is abnormal.Methods based on graph embedding and graph neural networks place more emphasis on analyzing the entire transaction network, constructing a graph structure to analyze the relationships between nodes, and more accurately identifying phishing attacks.In addition, a comparative analysis of the advantages and disadvantages of various methods was conducted, explaining the applicability and limitations of each method.Finally, the challenges facing Ethereum phishing detection were pointed out, and the future research trends for Ethereum phishing detection were predicted.…”
    Get full text
    Article
  11. 11

    Research of phishing detection technology by Xi ZHANG, Zhi-wei YAN, Hong-tao LI, Guang-gang GENG

    Published 2017-07-01
    “…The current status of phishing scams were analyzed and the data sets and evaluation indicators commonly used in phishing detection were summaried.On this basis,a detailed overview of the typical methods of phishing detection was given,which included blacklist strategies,heuristic methods,visual matching methods,and methods based on machine learning and natural language processing.The comparison and analysis of those methods were given,and furtherly,the challenges and future trends of phishing detection were discussed.…”
    Get full text
    Article
  12. 12

    Deceptive Self-Presentation: The Role of Social Media User Motivation and the Dark Triad Personality by Ujam Jaenudin, Elis Anisah Fitriah, Mirna Devi

    Published 2023-12-01
    “…Online identity frauds such as love scams, catfishing, and fake content are associated with the freedom of personalization offered by social media platforms which can lead to deceptive self-presentation behavior and impressions. …”
    Get full text
    Article
  13. 13

    Role of digital socialisation of the elderly in protecting against telephone fraud by P. I. Аnanchenkova, I. А. Turin, K. K. Makarova

    Published 2025-01-01
    “…The following has been revealed: there is a dynamic growth in the number of calls and messages received by the elderly people from telephone scammers; older people mostly count that they have a low probability of becoming a victim of phone scams; the main role of digital socialisation of the elderly in protecting against telephone fraud is to learn the rules and norms of communication in the digital environment and gain experience in remote communications. …”
    Get full text
    Article
  14. 14

    Determination of fetal thymic morphometric dimensions in relation to gestational age. by Carmen Niurka Piña Loyola, Marta Rosa González Debén, Alfredo Quiñonez Ceballo

    Published 2010-07-01
    “…The sample consisted of 147 scams dead fetuses from 17 weeks gestational age until the end, who met the inclusion criteria. …”
    Get full text
    Article
  15. 15

    Metaverse crimes in virtual (Un)reality: Fraud and sexual offences under English law by Andreas Karapatakis

    Published 2025-03-01
    “…As this virtual space became intertwined with financial transactions, especially through cryptocurrencies, the Metaverse evolved into a medium for perpetrating scams. Within this context, the article addresses the challenges associated with criminal activity in the Metaverse. …”
    Get full text
    Article
  16. 16

    Understanding Cybercrime in Developing Economies: Insights from Agona Swedru, Ghana by Charles Obeng, Paul Kwasi Kumah, Hubert Bimpeh Asiedu, Felix Awuah Obeng Senior

    Published 2024-11-01
    “…The findings highlight that a significant proportion of the population engages in cybercrime, with online romance scams and financial fraud being the common forms of cybercrime being practiced. …”
    Get full text
    Article
  17. 17

    Reinforced Cost-Sensitive Graph Network for Detecting Fraud Leaders in Telecom Fraud by Peiwen Gao, Zhihua Li, Dibin Zhou, Liang Zhang

    Published 2024-01-01
    “…These leaders orchestrate scams through intermediaries rather than directly engaging in fraudulent activities. …”
    Get full text
    Article
  18. 18

    Validation of a scale based on the DigComp framework on internet navigation and cybersecurity in older adults by Francisco de Paula Rodríguez-Miranda, Rocio Illanes-Segura, Yolanda Ceada-Garrido, Juan Carlos Infante-Moro

    Published 2025-01-01
    “…The need to use technologies in order to communicate, remain informed and have contact with society, along with the need to perform online transactions, led to increased susceptibility, given the potential for scams and cyberattacks. This was a cause of concern amongst the general population, and especially amongst the elderly. …”
    Get full text
    Article
  19. 19

    Intersectional Analysis of Urban Land Corruption in Harare, Zimbabwe by Manase Kudzai, Praise Karuma, Tanaka Mutume, Primrose Hove

    Published 2025-01-01
    “…By applying an intersectional lens, the study aims to uncover how these overlapping identities amplify vulnerability to corrupt practices like sextortion and land scams. Methodology: A desk research approach was employed, synthesizing data from academic literature, policy reports, and case studies. …”
    Get full text
    Article
  20. 20

    Personal, environmental and behavioral predictors associated with online fraud victimization among adults. by Vimala Balakrishnan, Umayma Ahhmed, Faris Basheer

    Published 2025-01-01
    “…<h4>Background</h4>Online malicious attempts such as scamming continue to proliferate across the globe, aided by the ubiquitous nature of technology that makes it increasingly easy to dupe individuals. …”
    Get full text
    Article