Scamming the Scammers: Towards Automatic Detection of Persuasion in Advance Fee Frauds

@article{Edwards2017ScammingTS,
  title={Scamming the Scammers: Towards Automatic Detection of Persuasion in Advance Fee Frauds},
  author={Matthew John Edwards and Claudia Peersman and Awais Rashid},
  journal={Proceedings of the 26th International Conference on World Wide Web Companion},
  year={2017}
}
Advance fee fraud is a significant component of online criminal activity. Fraudsters can often make off with significant sums, and victims will usually find themselves plagued by follow-up scams. Previous studies of how fraudsters persuade their victims have been limited to the initial solicitation emails sent to a broad population of email users. In this paper, we use the lens of scam-baiting -- a vigilante activity whereby members of the public intentionally waste the time of fraudsters -- to… Expand
Detecting Advance Fee Fraud Using NLP Bag of Word Model
Advance Fee Fraud (AFF) is a form of Internet fraud prevalent within the Cybercrimes domain in literature. Evidence shows that huge financial assets are stolen from the global economy as a result ofExpand
Building and Evaluating an Annotated Corpus for Automated Recognition of Chat-Based Social Engineering Attacks
Chat-based Social Engineering (CSE) is widely recognized as a key factor to successful cyber-attacks, especially in small and medium-sized enterprise (SME) environments. Despite the interest inExpand
Refining the PoinTER "human firewall" pentesting framework
TLDR
The authors propose the refined GDPR-compliant and privacy respecting PoinTER framework, a human pentesting framework, tailored to the needs of SMEs, based on a derived set of ethical principles that have been subjected to ethical scrutiny. Expand
A Villain's Guide to Social Media and Interactive Digital Storytelling
TLDR
The familiar perils of fiction and deceit can now be augmented by mass customization, allowing powerful malefactors to shape perceived reality to suit their preferences. Expand
A Villain's Guide To Social Media And Web Science
If we have not yet achieved planetary super-villainy on the desktop, it may be feasible to fit it into a suburban office suite. Social media and Web science permit the modern villain to deployExpand

References

SHOWING 1-10 OF 14 REFERENCES
Towards a Categorization of Scambaiting Strategies against Online Advance Fee Fraud
TLDR
Seven categories of scambaiting techniques are presented to give a wider understanding of the scope of existing Internet scams as well as answering questions of why and how individuals or communities of scambaiters take action against Internet scammers. Expand
The Language of Scam Spams: Linguistic Features of "Nigerian Fraud" E-Mails
This article examines the general nature, history, and language features of one type of fraudulent e-mail spam, the ubiquitous Nigerian fraud (4-1-9) letter. Patterns in content include similarExpand
Principles of Persuasion in Social Engineering and Their Use in Phishing
TLDR
This work proposes a way to connect principles of persuasion and presents a merged and reviewed list for them, then analyses various phishing emails and shows that their principles are used therein in specific combinations. Expand
Spamalytics: an empirical analysis of spam marketing conversion
TLDR
The best way to measure spam is to be a spammer, and this study makes use of an existing spamming botnet, by infiltrating the botnet parasitically and convincing it to modify a subset of the spam it already sends, thereby directing any interested recipients to Web sites under the authors' control. Expand
Understanding Social Engineering Based Scams
  • M. Jakobsson
  • Engineering, Computer Science
  • Springer New York
  • 2016
TLDR
This chapter overviews how to estimate the yield of attacks, and how to identify scams that are likely to become more common, and explains why the authors see an increasing number of targeted attacks today. Expand
An analysis of advance fee fraud on the internet
Purpose – Advance fee fraud on the internet is a current epidemic that rakes in hundreds of millions of dollars per year. The advent of the internet and proliferation of its use in the 1990s makes itExpand
Introducing the Enron Corpus
TLDR
The goal in this paper is to analyze the suitability of this corpus for exploring how to classify messages as organized by a human, so these folders would have likely been misleading. Expand
Text Mining: Predictive Methods for Analyzing Unstructured Information
TLDR
This book introduces the new world of text mining and examines proven methods for various critical text-mining tasks, such as automated document indexing and information retrieval and search, as well as new research areas that rely on evolving text- mining techniques. Expand
Influence: The Psychology of Persuasion
"Influence", the classic book on persuasion, explains the psychology of why people say "yes" - and how to apply these understandings. Dr. Robert Cialdini is the seminal expert in the rapidlyExpand
Virtual Unreality: Just Because the Internet Told You, How Do You Know It's True?
TLDR
In Virtual Unreality, Charles Seife uses the skepticism, wit, and sharp facility for analysis that captivated readers in Proofiness and Zero to take us deep into the Internet information jungle and cut a path through the trickery, fakery, and cyber skullduggery that the online world enables. Expand
...
1
2
...