Voice phishing fraud and its modus operandi

@article{Choi2017VoicePF,
  title={Voice phishing fraud and its modus operandi},
  author={kwansig Choi and Julak Lee and Yong-tae Chun},
  journal={Security Journal},
  year={2017},
  volume={30},
  pages={454-466}
}
Voice Phishing is an emergent crime in which victims are deceived during the course of a phone conversation. According to the crime statistics released by the Korean National Police Agency, over 4000 cases of voice phishing are committed per year and the cost per victim is over US$1000. However, because of its unique characteristics when compared with traditional fraud, few studies have been conducted on this subject. This is the first study assessing the modus operandi of voice phishing using… 
Orienting the Development of Crime Analysis Processes in Police Organisations Covering the Digital Transformations of Fraud Mechanisms
TLDR
This work takes, as an example, how a generic script expressing the anatomy of an existing type of fraud can be used to interpret their new digital forms, which provides new insight into specific frauds and highlights relevant dimensions that are useful in orienting the development of crime analysis systems.
"We Even Borrowed Money From Our Neighbor"
TLDR
A qualitative analysis of the dynamics of mobile-based fraud in Pakistan, including addressing the vulnerabilities discovered in the ecosystem, utilizing existing actors to mitigate the consequences of these attacks, and realigning the design of fraud reporting mechanisms with the sociocultural practices is presented.
Citizen participation in crime prevention: a study in Kuching, Sarawak, Malaysia
Purpose The purpose of this paper is to discuss citizen participation in crime prevention in Kuching, Malaysia. This is a study of how citizen participated in crime prevention has helped in crime
A New Email Phishing Training Website
TLDR
The results show that the presented idea on how to familiarize people to user domain senders using an interactive website is an effective solution to tackle phishing emails.
An Examination of Subway Sex Offense Modus Operandi: A Case of Seoul, South Korea
TLDR
The authors assessed the reasoning behind the steps taken to prepare for, carry out, and complete harassment and surreptitious recording of the most common subway sex offenses in Seoul, South Korea.
Generalizing the phishing principle: analyzing user behavior in response to controlled stimuli for IT security awareness assessment
TLDR
A field study among 259 users shows, that the expected effect of a well-established IT security awareness intervention can be demonstrated using arbitrary artifacts and that this intervention may impair the probability of a user reporting the sighting of an artifact and therefore impair an organization's capability to detect such events and possibly decrease overall security.
HearMeOut
...
...

References

SHOWING 1-10 OF 13 REFERENCES
Self-Reported Cyber Crime: An Analysis on the Effects of Anonymity and Pre-Employment Integrity
A key issue facing today’s society is the increase in cyber crimes. Cyber crimes pose threats to nations, organizations and individuals across the globe. Much of the research in cyber crime has risen
Situational Prevention of Organised Crimes
Situational crime prevention is the art and science of reducing opportunities for crime. Despite accumulating evidence of its value in reducing many different kinds of crime - such as burglary,
The Value of Crime Scripting: Deconstructing Internal Child Sex Trafficking
This article demonstrates how Crime Scripting is a viable and cost-effective tool in supporting strategic policing without requiring additional data, software, or training. This study shows how a
Crime Script Analysis of Drug Manufacturing In Clandestine Laboratories Implications for Prevention
Despite the growing problem of clandestine drug laboratories, there is currently little evidence of systematic knowledge regarding the crime-commission process involved in this criminal enterprise.
Body Switching and Related Adaptations in the Resale of Stolen Vehicles. Script Elaborations and Aggregate Crime Learning Curves
The paper provides a case study of a sustained crime expansion. The case study is offence-specific (motor vehicles stolen for resale purposes) and restricted to a particular time frame (1974-92) and
BROKERAGE QUALIFICATIONS IN RINGING OPERATIONS
TLDR
This study analyzes two stolen-vehicle exportation operations within a framework that merges crime-script analysis and social-network analysis and assesses how diverse degrees of brokerage are distributed across the ringing operations and how the removal of key brokers would have had a disruptive impact by reducing the scope of alternatives for crime- script permutation and flexibility.
Profiling Illegal Waste Activity: Using Crime Scripts as a Data Collection and Analytical Strategy
The illegal treatment and trade of waste is an international problem which is widely assumed to be both evolving and growing. Emergent forms of criminality such as this often have the problem of data
An Application of the Rational Choice Approach to the Offending Process of Sex Offenders: A Closer Look at the Decision-making
TLDR
Investigating the decision-making involved in the offending process of 69 serial sexual offenders who have committed their crimes against stranger victims shows that sex offenders, even if traditionally described as “irrational” and impulsive individuals, are capable of an analysis of the costs/ benefits related to their actions.
Gearing Up Against Crime: a Dynamic Framework to Help Designers Keep up with the Adaptive Criminal in a Changing World
This paper is a first, exploratory, attempt at providing some background, and a framework, to help designers more systematically incorporate crime prevention in their remit. The scope includes design
Target selection patterns in rape
Both theoretical and empirical studies of decision making in target selection have shown that this process is highly dependent on the physical environment. However, research specifically
...
...