Matches in SemOpenAlex for { <https://semopenalex.org/work/W2468752483> ?p ?o ?g. }
- W2468752483 abstract "Many online media have recently been focusing on the topic of Internet fraud. Business leaders, computer security experts, and lawyers, however, do not fully understand the kinds of frauds that can be conducted through or with the aid of the Internet, or the ramifications of such frauds for the future of e-commerce. This paper has three principal goals. First, it will identify the principal types of Internet frauds that law enforcement and regulatory authorities are observing. Second, it will explain the major psychological influence techniques that criminals use in conducting such frauds (including the similarities between those techniques and engineering techniques of hackers). Third, it will propose some responses to the problem involving both government and the private sector. The paper will begin by presenting a typology of the major forms of Internet fraud, referring not only to the type of crime each form involves but also to the nature of the deception -- whether deception of computer systems (e.g., packet sniffing and data harvesting) or of individuals (e.g., securities and other investment schemes) -- and the manner in which the criminal can obtain the victim's funds. It will then explore the principal psychological features of Internet fraud, particularly the commonalities between various types of fraud, through both the academic literature of social psychology and real-world examples. It will explore the attitudes and beliefs of criminal and victim about each other and about the medium of the Internet, to clarify the broader context in which fraud can occur. It will also discuss the principal social psychological influences that the criminal brings to bear on the victim (i.e., authority, commitment and consistency, liking and similarity, reciprocity, scarcity, and social proof), and why those influences operate so powerfully to persuade the victim to part with something of value. It will also note the typical types of hardware and software that are meant to provide online consumers with security, while noting those aspects of online behavior that limit the effectiveness of those measures. Finally, it will propose new methods for addressing the psychology of online fraud in prevention and education methods as well as government enforcement measures, as part of a comprehensive approach to increasing consumer confidence in e commerce. This paper is likely to make two significant contributions to INET'99. First, it will expose business leaders, security professionals, policy makers, and lawyers to an aspect of e -commerce and to relevant bodies of knowledge and experience with which they are certain to be unfamiliar. Second, it can help industry professionals to understand the limitations of hardware and software in providing a truly secure environment for e -commerce, and to begin to think with greater clarity and precision about what else can be done to develop truly comprehensive means of fostering that environment." @default.
- W2468752483 created "2016-07-22" @default.
- W2468752483 creator A5012974855 @default.
- W2468752483 date "2003-01-01" @default.
- W2468752483 modified "2023-09-23" @default.
- W2468752483 title "The Social Engineering of Internet Fraud" @default.
- W2468752483 cites W1970484967 @default.
- W2468752483 cites W2004026387 @default.
- W2468752483 cites W2031473829 @default.
- W2468752483 cites W2037694567 @default.
- W2468752483 cites W2044633650 @default.
- W2468752483 cites W2056166734 @default.
- W2468752483 cites W2085126443 @default.
- W2468752483 cites W2138536306 @default.
- W2468752483 cites W2147364633 @default.
- W2468752483 cites W2798788768 @default.
- W2468752483 hasPublicationYear "2003" @default.
- W2468752483 type Work @default.
- W2468752483 sameAs 2468752483 @default.
- W2468752483 citedByCount "14" @default.
- W2468752483 countsByYear W24687524832012 @default.
- W2468752483 countsByYear W24687524832014 @default.
- W2468752483 countsByYear W24687524832016 @default.
- W2468752483 countsByYear W24687524832018 @default.
- W2468752483 crossrefType "journal-article" @default.
- W2468752483 hasAuthorship W2468752483A5012974855 @default.
- W2468752483 hasConcept C108827166 @default.
- W2468752483 hasConcept C110875604 @default.
- W2468752483 hasConcept C136764020 @default.
- W2468752483 hasConcept C138885662 @default.
- W2468752483 hasConcept C144024400 @default.
- W2468752483 hasConcept C144133560 @default.
- W2468752483 hasConcept C144559511 @default.
- W2468752483 hasConcept C151730666 @default.
- W2468752483 hasConcept C17744445 @default.
- W2468752483 hasConcept C19165224 @default.
- W2468752483 hasConcept C199539241 @default.
- W2468752483 hasConcept C2778137410 @default.
- W2468752483 hasConcept C2779267917 @default.
- W2468752483 hasConcept C2779343474 @default.
- W2468752483 hasConcept C2779390178 @default.
- W2468752483 hasConcept C2780262971 @default.
- W2468752483 hasConcept C38652104 @default.
- W2468752483 hasConcept C39549134 @default.
- W2468752483 hasConcept C41008148 @default.
- W2468752483 hasConcept C41895202 @default.
- W2468752483 hasConcept C70118762 @default.
- W2468752483 hasConcept C75795011 @default.
- W2468752483 hasConcept C86803240 @default.
- W2468752483 hasConcept C86844869 @default.
- W2468752483 hasConceptScore W2468752483C108827166 @default.
- W2468752483 hasConceptScore W2468752483C110875604 @default.
- W2468752483 hasConceptScore W2468752483C136764020 @default.
- W2468752483 hasConceptScore W2468752483C138885662 @default.
- W2468752483 hasConceptScore W2468752483C144024400 @default.
- W2468752483 hasConceptScore W2468752483C144133560 @default.
- W2468752483 hasConceptScore W2468752483C144559511 @default.
- W2468752483 hasConceptScore W2468752483C151730666 @default.
- W2468752483 hasConceptScore W2468752483C17744445 @default.
- W2468752483 hasConceptScore W2468752483C19165224 @default.
- W2468752483 hasConceptScore W2468752483C199539241 @default.
- W2468752483 hasConceptScore W2468752483C2778137410 @default.
- W2468752483 hasConceptScore W2468752483C2779267917 @default.
- W2468752483 hasConceptScore W2468752483C2779343474 @default.
- W2468752483 hasConceptScore W2468752483C2779390178 @default.
- W2468752483 hasConceptScore W2468752483C2780262971 @default.
- W2468752483 hasConceptScore W2468752483C38652104 @default.
- W2468752483 hasConceptScore W2468752483C39549134 @default.
- W2468752483 hasConceptScore W2468752483C41008148 @default.
- W2468752483 hasConceptScore W2468752483C41895202 @default.
- W2468752483 hasConceptScore W2468752483C70118762 @default.
- W2468752483 hasConceptScore W2468752483C75795011 @default.
- W2468752483 hasConceptScore W2468752483C86803240 @default.
- W2468752483 hasConceptScore W2468752483C86844869 @default.
- W2468752483 hasLocation W24687524831 @default.
- W2468752483 hasOpenAccess W2468752483 @default.
- W2468752483 hasPrimaryLocation W24687524831 @default.
- W2468752483 hasRelatedWork W1506738637 @default.
- W2468752483 hasRelatedWork W1511039991 @default.
- W2468752483 hasRelatedWork W1512366833 @default.
- W2468752483 hasRelatedWork W1518175257 @default.
- W2468752483 hasRelatedWork W1524431082 @default.
- W2468752483 hasRelatedWork W1596683552 @default.
- W2468752483 hasRelatedWork W1983208818 @default.
- W2468752483 hasRelatedWork W2006397401 @default.
- W2468752483 hasRelatedWork W2026285994 @default.
- W2468752483 hasRelatedWork W2040993216 @default.
- W2468752483 hasRelatedWork W2083112004 @default.
- W2468752483 hasRelatedWork W2104334568 @default.
- W2468752483 hasRelatedWork W2161161936 @default.
- W2468752483 hasRelatedWork W2256939083 @default.
- W2468752483 hasRelatedWork W2335888457 @default.
- W2468752483 hasRelatedWork W2497389278 @default.
- W2468752483 hasRelatedWork W2600939773 @default.
- W2468752483 hasRelatedWork W2949574054 @default.
- W2468752483 hasRelatedWork W3023204724 @default.
- W2468752483 hasRelatedWork W2084196869 @default.
- W2468752483 isParatext "false" @default.
- W2468752483 isRetracted "false" @default.
- W2468752483 magId "2468752483" @default.