This page provides links to useful resources relating to the DAPM project (Detecting and Preventing Mass-Marketing Fraud (MMF).
- Action Fraud: www.actionfraud.com (you can report fraud to Action Fraud)
- Victim Support: www.victimsupport.org.uk Free support for anyone who has been a victim of fraud or any other crime
- RISCS: https://www.riscs.org.uk Useful resource on cybersecurity
- Western Union refund request where money has been lost due to scams: Federal Trade Commission (until 12/02/2018)
- Hampshire Constabulary YouTube channel: Romance Fraud and other advice and prevention videos on online crime
- Discover Magazine: Neuroskeptic- 'Do criminals read psychology papers?'
Romance Scam Papers
Huang, J., Stringhini, G., & Yong, P. (2015, July). Quite playing games with my heart: Understanding online dating romance scams. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 216-236). Springer International Publishing.
Re-shipping Mule Scams
Hao, S., Borgolte, K., Nikiforakis, N., Stringhini, G., Egele, M., Eubanks, M. & Vigna, G. (2015, October). Drops for stuff: An analysis of reshipping mule scams. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (pp. 1081-1092). ACM.
Whitty, M. T. (2015). Mass-marketing fraud: A growing concern. IEEE Security & Privacy, 13(4), 84-87.
Scamming the scammers: towards automatic detection of persuasion in advance fee frauds
Edwards, M.J., Peersman, C., Rashid, A. 7/02/2017 In: Second International Workshop on Computational Methods for CyberSafety (CyberSafety 2017) co-located with International Conference on World Wide Web (WWW). ACM
Stringhini, G., & Thonnard, O. (2015, July). That ain't you: Blocking spearphising through behavioral modelling. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 78-97). Springer International Publishing.
Stolen gmail accounts
Detecting deception/personhood/online behaviour
Whitty, M., Doodson, J., Creese, S. and Hodges, D., (2014). Image choice to represent the self in different online environments. In Proceedings of 6th International Conference of Social Computing and Social Media ((part of HCI International), 528-537.
Carrick, T., Rashid, A., & Taylor, P. J. (2016, November). Mimicry in online conversations: An exploratory study of linguistic analysis techniques. In Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM International Conference on (pp. 732-736).
Peersman, C., Schulze, C., Rashid, A., Brennan, M., & Fischer, C. (2014, May). Automatically identifying new child abuse media in P2P Networks. In Security and Privacy Workshops (SPW), 2014 IEEE (pp. 124-131).
Edwards, M. J., Rashid, A., & Rayson, P. (2014, September). A service-independent model for linking online user profile information. In Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint (pp. 280-283).
May-Chahal, C., Mason, C., Rashid, A., Walkerdine, J., Rayson, P., & Greenwood, P. (2014). Safeguarding cyborg childhoods: Incorporating the on/offline behaviour of children into everyday social work practices. British Journal of Social Work, 44(3), 596-614.
Stringhini, G., Wang, G., Egele, M., Kruegel, C., Vigna, G., Zheng, H., & Zhao, B. Y. (2013, October). Follow the green: Growth and dynamics in twitter follower markets. In Proceedings of the 2013 conference on Internet measurement conference (pp. 163-176). ACM.
Peersman, C., Daelemans, W., & Van Vaerenbergh, L. (2011, October). Predicting Age and Gender in Online Social Networks. In Proceedings of the 3rd international workshop on Search and mining user-generated contents (pp. 37-44). ACM.