Tainted Love: A Systematic Review of Online Romance Fraud
- URL: http://arxiv.org/abs/2303.00070v1
- Date: Tue, 28 Feb 2023 20:34:07 GMT
- Title: Tainted Love: A Systematic Review of Online Romance Fraud
- Authors: Alexander Bilz, Lynsay A. Shepherd, Graham I. Johnson
- Abstract summary: Romance fraud involves cybercriminals engineering a romantic relationship on online dating platforms.
We characterise the literary landscape on romance fraud, advancing the understanding of researchers and practitioners.
Three main contributions were identified: profiles of romance scams, countermeasures for mitigating romance scams, and factors that predispose an individual to become a scammer or a victim.
- Score: 68.8204255655161
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Romance fraud involves cybercriminals engineering a romantic relationship on
online dating platforms. It is a cruel form of cybercrime whereby victims are
left heartbroken, often facing financial ruin. We characterise the literary
landscape on romance fraud, advancing the understanding of researchers and
practitioners by systematically reviewing and synthesising contemporary
qualitative and quantitative evidence. The systematic review provides an
overview of the field by establishing influencing factors of victimhood and
exploring countermeasures for mitigating romance scams. We searched ten
scholarly databases and websites using terms related to romance fraud. Studies
identified were screened, and high-level metadata and findings were extracted,
synthesised, and contrasted. The methodology followed the PRISMA guidelines: a
total of 232 papers were screened. Eighty-two papers were assessed for
eligibility, and 44 were included in the final analysis. Three main
contributions were identified: profiles of romance scams, countermeasures for
mitigating romance scams, and factors that predispose an individual to become a
scammer or a victim. Despite a growing corpus of literature, the total number
of empirical or experimental examinations remained limited. The paper concludes
with avenues for future research and victimhood intervention strategies for
practitioners, law enforcement, and industry.
Related papers
- "Kelly is a Warm Person, Joseph is a Role Model": Gender Biases in
LLM-Generated Reference Letters [97.11173801187816]
Large Language Models (LLMs) have recently emerged as an effective tool to assist individuals in writing various types of content.
This paper critically examines gender biases in LLM-generated reference letters.
arXiv Detail & Related papers (2023-10-13T16:12:57Z) - The Anatomy of Deception: Technical and Human Perspectives on a Large-scale Phishing Campaign [4.369550829556578]
This study takes an unprecedented deep dive into large-scale phishing campaigns aimed at Meta's users.
Analysing data from over 25,000 victims worldwide, we highlight the nuances of these campaigns.
Through the application of advanced computational techniques, including natural language processing and machine learning, this work unveils critical insights into the psyche of victims.
arXiv Detail & Related papers (2023-10-05T12:24:24Z) - Fraud Analytics: A Decade of Research -- Organizing Challenges and
Solutions in the Field [2.823175044954797]
The literature on fraud analytics and fraud detection has seen a substantial increase in output in the past decade.
The focus of academics ranges from identifying fraudulent credit card payments to spotting illegitimate insurance claims.
This paper aims to provide an overview of fraud analytics in research and aims to more narrowly organize the discipline and its many subfields.
arXiv Detail & Related papers (2022-12-07T10:34:19Z) - Robust Quantification of Gender Disparity in Pre-Modern English
Literature using Natural Language Processing [8.185725740857594]
We demonstrate the significant discrepancy between the prevalence of female characters and male characters in pre-modern literature.
The discrepancy seems to be relatively stable as we plot data over the decades in this century-long period.
We aim to carefully describe both the limitations and ethical caveats associated with this study, and others like it.
arXiv Detail & Related papers (2022-04-12T15:11:22Z) - Survey of Cyber Violence Against Women in Malawi [0.0]
The purpose of this study was to investigate the prevalence of cyber violence against women in Karonga district of Malawi.
The study noted that women experienced various forms of cyber violence such as cyber bullying, cyber harassment, online defamation, cyberstalking, sexual exploitation, online hate speech, and revenge pornography.
It was found that women never bothered to report the incidences to the police or community to seek for support due to lack of awareness, cultural and patriarchal factors.
arXiv Detail & Related papers (2021-08-22T18:02:06Z) - Fragments of the Past: Curating Peer Support with Perpetrators of
Domestic Violence [88.37416552778178]
We report on a ten-month study where we worked with six support workers and eighteen perpetrators in the design and deployment of Fragments of the Past.
We share how crafting digitally-augmented artefacts - 'fragments' - of experiences of desisting from violence can translate messages for motivation and rapport between peers.
These insights provide the basis for practical considerations for future network design with challenging populations.
arXiv Detail & Related papers (2021-07-09T22:57:43Z) - Profiling the Cybercriminal: A Systematic Review of Research [2.66512000865131]
There is lack of a common definition of profiling for cyber-offenders.
One of the primary types of cybercriminals that studies have focused on is hackers.
This article produces an up-to-date characterisation of the field.
arXiv Detail & Related papers (2021-05-06T19:56:55Z) - DFraud3- Multi-Component Fraud Detection freeof Cold-start [50.779498955162644]
The Cold-start is a significant problem referring to the failure of a detection system to recognize the authenticity of a new user.
In this paper, we model a review system as a Heterogeneous InformationNetwork (HIN) which enables a unique representation to every component.
HIN with graph induction helps to address the camouflage issue (fraudsterswith genuine reviews) which has shown to be more severe when it is coupled with cold-start, i.e., new fraudsters with genuine first reviews.
arXiv Detail & Related papers (2020-06-10T08:20:13Z) - Cross-ethnicity Face Anti-spoofing Recognition Challenge: A Review [79.49390241265337]
Chalearn Face Anti-spoofing Attack Detection Challenge consists of single-modal (e.g., RGB) and multi-modal (e.g., RGB, Depth, Infrared (IR)) tracks.
This paper presents an overview of the challenge, including its design, evaluation protocol and a summary of results.
arXiv Detail & Related papers (2020-04-23T06:43:08Z) - Mining Disinformation and Fake News: Concepts, Methods, and Recent
Advancements [55.33496599723126]
disinformation including fake news has become a global phenomenon due to its explosive growth.
Despite the recent progress in detecting disinformation and fake news, it is still non-trivial due to its complexity, diversity, multi-modality, and costs of fact-checking or annotation.
arXiv Detail & Related papers (2020-01-02T21:01:02Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.