-
1
The Frames of Romance Scamming
Published 2024-12-01Subjects: “…romance scamming…”
Get full text
Article -
2
Phishing scams on social media: An evaluation of cyber awareness education on impact and effectiveness
Published 2025-03-01“…The threat of phishing scams is rising, with increasingly deceptive techniques targeting social media platforms such as Instagram. …”
Get full text
Article -
3
-
4
Examination of Historical Advancement of Corporate Governance in India– Contemporary Issues and Way Forward
Published 2021-06-01Subjects: Get full text
Article -
5
-
6
-
7
Strategic business movements? The migration of online romance fraudsters from Nigeria to Ghana
Published 2025-03-01Subjects: “…Institutionalisation of scams…”
Get full text
Article -
8
Se jouer des cadres de l’expérience : arnaques et prises de tête dans un jeu vidéo
Published 2020-05-01Subjects: Get full text
Article -
9
Bibliometric Mapping of Scientific Production and Conceptual Structure of Cyber Sextortion in Cybersecurity
Published 2024-12-01Subjects: Get full text
Article -
10
Survey on Ethereum phishing detection technology
Published 2023-04-01“…With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high degree of deception and concealment, causing significant losses to both users and businesses.Ethereum platform, with its smart contract functionality, has attracted many crypto currency investors.However, this widespread popularity has also attracted an influx of criminals, leading to the rise of cybercrime activities.Among them, phishing scams are one of the main forms of fraud on the Ethereum platform.To tackle this issue, researchers have developed Ethereum network phishing identification technology, achieving significant progress in this field.However, there has been relatively little systematic analysis and summary of these research results.The current state of phishing fraud on the Ethereum network was analyzed.Moreover, a comprehensive summary of existing phishing detection datasets and evaluation metrics were provided.On this basis, methods for detecting phishing on Ethereum were reviewed, including those based on transaction information, graph embedding and graph neural networks.Transaction information-based methods are the most common, analyzing information such as input and output addresses and amounts in transaction data to determine whether a transaction is abnormal.Methods based on graph embedding and graph neural networks place more emphasis on analyzing the entire transaction network, constructing a graph structure to analyze the relationships between nodes, and more accurately identifying phishing attacks.In addition, a comparative analysis of the advantages and disadvantages of various methods was conducted, explaining the applicability and limitations of each method.Finally, the challenges facing Ethereum phishing detection were pointed out, and the future research trends for Ethereum phishing detection were predicted.…”
Get full text
Article -
11
Research of phishing detection technology
Published 2017-07-01“…The current status of phishing scams were analyzed and the data sets and evaluation indicators commonly used in phishing detection were summaried.On this basis,a detailed overview of the typical methods of phishing detection was given,which included blacklist strategies,heuristic methods,visual matching methods,and methods based on machine learning and natural language processing.The comparison and analysis of those methods were given,and furtherly,the challenges and future trends of phishing detection were discussed.…”
Get full text
Article -
12
Deceptive Self-Presentation: The Role of Social Media User Motivation and the Dark Triad Personality
Published 2023-12-01“…Online identity frauds such as love scams, catfishing, and fake content are associated with the freedom of personalization offered by social media platforms which can lead to deceptive self-presentation behavior and impressions. …”
Get full text
Article -
13
Role of digital socialisation of the elderly in protecting against telephone fraud
Published 2025-01-01“…The following has been revealed: there is a dynamic growth in the number of calls and messages received by the elderly people from telephone scammers; older people mostly count that they have a low probability of becoming a victim of phone scams; the main role of digital socialisation of the elderly in protecting against telephone fraud is to learn the rules and norms of communication in the digital environment and gain experience in remote communications. …”
Get full text
Article -
14
Determination of fetal thymic morphometric dimensions in relation to gestational age.
Published 2010-07-01“…The sample consisted of 147 scams dead fetuses from 17 weeks gestational age until the end, who met the inclusion criteria. …”
Get full text
Article -
15
Metaverse crimes in virtual (Un)reality: Fraud and sexual offences under English law
Published 2025-03-01“…As this virtual space became intertwined with financial transactions, especially through cryptocurrencies, the Metaverse evolved into a medium for perpetrating scams. Within this context, the article addresses the challenges associated with criminal activity in the Metaverse. …”
Get full text
Article -
16
Understanding Cybercrime in Developing Economies: Insights from Agona Swedru, Ghana
Published 2024-11-01“…The findings highlight that a significant proportion of the population engages in cybercrime, with online romance scams and financial fraud being the common forms of cybercrime being practiced. …”
Get full text
Article -
17
Reinforced Cost-Sensitive Graph Network for Detecting Fraud Leaders in Telecom Fraud
Published 2024-01-01“…These leaders orchestrate scams through intermediaries rather than directly engaging in fraudulent activities. …”
Get full text
Article -
18
Validation of a scale based on the DigComp framework on internet navigation and cybersecurity in older adults
Published 2025-01-01“…The need to use technologies in order to communicate, remain informed and have contact with society, along with the need to perform online transactions, led to increased susceptibility, given the potential for scams and cyberattacks. This was a cause of concern amongst the general population, and especially amongst the elderly. …”
Get full text
Article -
19
Intersectional Analysis of Urban Land Corruption in Harare, Zimbabwe
Published 2025-01-01“…By applying an intersectional lens, the study aims to uncover how these overlapping identities amplify vulnerability to corrupt practices like sextortion and land scams. Methodology: A desk research approach was employed, synthesizing data from academic literature, policy reports, and case studies. …”
Get full text
Article -
20
Personal, environmental and behavioral predictors associated with online fraud victimization among adults.
Published 2025-01-01“…<h4>Background</h4>Online malicious attempts such as scamming continue to proliferate across the globe, aided by the ubiquitous nature of technology that makes it increasingly easy to dupe individuals. …”
Get full text
Article