Skip to main content

DAPM Project: Useful Resources

This page provides links to useful resources relating to the DAPM project (Detecting and Preventing Mass-Marketing Fraud (MMF).

Useful websites

Blogs

Relevant Papers

Romance Scam Papers

Whitty, M. T. (2015). Anatomy of the online dating romance scam. Security Journal, 28(4), 443-455.

Buchanan, T., & Whitty, M. T. (2014). The online dating romance scam: Causes and consequences of victimhood. Psychology, Crime & Law, 20(3), 261-283.

Whitty, M. T. (2013). The scammers persuasive techniques model: Development of a stage model to explain the online dating romance scam. British Journal of Criminology, 53(4), 665-684. (find pdf here)

Whitty, M. T., & Buchanan, T. (2012). The online dating romance scam: A serious cybercrime. CyberPsychology, Behavior, and Social Networking, 15(3), 181-183.

Whitty, M. T. , & Buchanan, T. (2012). The psychology of the online dating romance scam. Report.

Huang, J., Stringhini, G., & Yong, P. (2015, July). Quite playing games with my heart: Understanding online dating romance scams. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 216-236). Springer International Publishing.


Re-shipping Mule Scams

Hao, S., Borgolte, K., Nikiforakis, N., Stringhini, G., Egele, M., Eubanks, M. & Vigna, G. (2015, October). Drops for stuff: An analysis of reshipping mule scams. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (pp. 1081-1092). ACM.


MMF Papers
Whitty, M. T. (2015). Mass-marketing fraud: A growing concern. IEEE Security & Privacy, 13(4), 84-87.

Scamming the scammers: towards automatic detection of persuasion in advance fee frauds
Edwards, M.J., Peersman, C., Rashid, A. 7/02/2017 In: Second International Workshop on Computational Methods for CyberSafety (CyberSafety 2017) co-located with International Conference on World Wide Web (WWW). ACM
Conference contribution

Edwards, M. J., Wattam, S., Rayson, P. & Rashid, A. Sampling labelled profile data for identity resolution 07/12/2016 IEEE International Conference on Big Data, At Washington, DC


Phishing/ Spearphising

Stringhini, G., & Thonnard, O. (2015, July). That ain't you: Blocking spearphising through behavioral modelling. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 78-97). Springer International Publishing.

Stolen gmail accounts

Detecting deception/personhood/online behaviour

Whitty, M., Doodson, J., Creese, S. and Hodges, D., (2014). Image choice to represent the self in different online environments. In Proceedings of 6th International Conference of Social Computing and Social Media ((part of HCI International), 528-537.

Criado, N., Rashid, A., & Leite, L. (2016). Flash mobs, arab spring and protest movements: Can we analyse group identities in online conversations? Expert Systems with Applications, 62, 212-224.

Carrick, T., Rashid, A., & Taylor, P. J. (2016, November). Mimicry in online conversations: An exploratory study of linguistic analysis techniques. In Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM International Conference on (pp. 732-736).

Peersman, C., Schulze, C., Rashid, A., Brennan, M., & Fischer, C. (2016). iCOP: Live forensics to reveal previously unknown criminal media on P2P networks. Digital Investigation, 18, 50-64.

Peersman, C., Schulze, C., Rashid, A., Brennan, M., & Fischer, C. (2014, May). Automatically identifying new child abuse media in P2P Networks. In Security and Privacy Workshops (SPW), 2014 IEEE (pp. 124-131).

Edwards, M., Rashid, A., & Rayson, P. (2015). A systematic survey of online data mining technology intended for law enforcement. ACM Computing Surveys (CSUR), 48(1), 15.

Edwards, M. J., Rashid, A., & Rayson, P. (2014, September). A service-independent model for linking online user profile information. In Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint (pp. 280-283).

May-Chahal, C., Mason, C., Rashid, A., Walkerdine, J., Rayson, P., & Greenwood, P. (2014). Safeguarding cyborg childhoods: Incorporating the on/offline behaviour of children into everyday social work practices. British Journal of Social Work, 44(3), 596-614.

Rashid, A., Baron, A., Rayson, P., May-Chahal, C., Greenwood, P., & Walkerdine, J. (2013). Who am I? Analysing digital personas in cybercrime investigations. Computer, (4), 54-61.

Stringhini, G., Wang, G., Egele, M., Kruegel, C., Vigna, G., Zheng, H., & Zhao, B. Y. (2013, October). Follow the green: Growth and dynamics in twitter follower markets. In Proceedings of the 2013 conference on Internet measurement conference (pp. 163-176). ACM.

Egele, M., Stringhini, G., Kruegel, C., & Vigna, G. (2013, February). COMPA: Detecting compromised accounts on social networks. In NDSS.

Peersman, C., Daelemans, W., & Van Vaerenbergh, L. (2011, October). Predicting Age and Gender in Online Social Networks. In Proceedings of the 3rd international workshop on Search and mining user-generated contents (pp. 37-44). ACM.

Peersman, C., Vaassen, F., Van Asch, V., & Daelemans, W. (2012). Conversation Level Constraints on Pedophile Detection in Chat Rooms. In CLEF (Online Working Notes/Labs/Workshop).