1,075
Views
5
CrossRef citations to date
0
Altmetric
Research Article

Recruiting money mules on instagram: a qualitative examination of the online involvement mechanisms of cybercrime

&
Pages 603-619 | Received 02 Feb 2022, Accepted 27 Apr 2022, Published online: 17 May 2022

References

  • Arevalo, B. C. 2015. “Money Mules: Facilitators of Financial Crime.” Master thesis, Utrecht University.
  • Aston, M., S. McCombie, B. Reardon, and P. Watters. 2009. “A Preliminary Profiling of Internet Money Mules: An Australian Perspective.” Pp. 482–87 in Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, edited by R. Hsu and M. Denko. New Jersey: IEEE. doi:10.1109/UIC-ATC.2009.63.
  • Bekkers, L., J. Schiks, and E. R. Leukfeldt. 2020. “Naar Een Interventie Tegen Geldezels.” Retrieved September 10, 2021. (https://www.dehaagsehogeschool.nl/docs/default-source/documenten-onderzoek/expertisecentra/naar-een-interventie-tegen-geldezels_een-pilot-in-de-gemeente-haarlem.pdf?sfvrsn=930f4c56_2).
  • Benson, M. L. and T. D. Madensen. 2007. “Situational Crime Prevention and White-Collar Crime.” Pp. 609–26 in International Handbook of White-Collar and Corporate Crime, edited by H. Pontell and G. Geis. New York: Springer. doi:10.1007/978-0-387-34111-8_31
  • Braun, V. and V. Clarke. 2006. “Using Thematic Analysis in Psychology.” Qualitative Research in Psychology 3(2):77–101. doi: 10.1191/1478088706qp063oa
  • Calderoni, F., G. M. Campedelli, T. Comunale, M. E. Marchesi, and E. U. Savona. 2020. “Recruitment Into Organised Criminal Groups: A Systematic Review.” Trends and Issues in Crime and Criminal Justice 583:1–28.
  • Clarke, R. V. 1980. “Situational Crime Prevention: Theory and Practice.” British Journal of Criminology 20(2):136–47. doi:10.1093/oxfordjournals.bjc.a047153.
  • Cornish, D. B. and R. V. Clarke. 2003. “Opportunities, Precipitators and Criminal Dispositions: A Reply to Wortley’s Critique of Situational Crime Prevention.” Pp. 41–96 in Theory for Practice in Situational Crime Prevention, edited by M. J. Smith and D. B. Cornish. Monsey: Criminal Justice Press,
  • Custers, B. H. M., J. J. Oerlemans, and R. L. D. Pool. 2020. “Laundering the Profits of Ransomware: Money Laundering Methods for Vouchers and Cryptocurrencies.” European Journal of Crime, Criminal Law and Criminal Justice 28(2):121–52. doi:10.1163/15718174-02802002.
  • Custers, B. H. M., R. L. D. Pool, and R. Cornelisse. 2018. “Banking Malware and the Laundering of Its Profits.” European Journal of Criminology 16(6):728–45. doi:10.1177/1477370818788007.
  • De Boer, H., H. Ferwerda, and J. Kuppens. 2022. “Do or Don’t. Kennissynthese Ingroeimechanismen En Rekruteringsprocessen van Jongeren in de Georganiseerde Criminaliteit.” Retrieved March 10, 2022. (https://repository.wodc.nl/handle/20.500.12832/3154).
  • Dunham, K. 2006. “Money Mules: An Investigative View.” Information Security Journal 15(1):6–10.
  • Europol. 2016. “Europe-Wide Action Targets Money Mule Schemes.” Retrieved February 11,2021. (https://www.europol.europa.eu/newsroom/news/europe-wide-action-targets-money-mule-schemes).
  • Europol. 2021a. “Money Muling: Public Awareness and Prevention.” Retrieved January 25,2022. (https://www.europol.europa.eu/activities-services/public-awareness-and-prevention-guides/money-muling).
  • Europol. 2021b. “European Money Mule Action Leads to 1803 Arrests.” Retrieved January 10,2022. (https://www.europol.europa.eu/media-press/newsroom/news/european-money-mule-action-leads-to-1-803-arrests).
  • Felson, M. 2003. “The Process of Co-offending.” Pp. 149–68 in Theory for Practice in Situational Crime Prevention, edited by M. J. Smith and D. B. Cornish. Monsey: Criminal Justice Press,
  • Florêncio, D. and C. Herley. 2010. “Phishing and Money Mules.” IEEE: International Workshop on Information Forensics and Security, Seattle, USA, 1–5. doi: 10.1109/WIFS.2010.5711465.
  • Galdo, M. C., M. E. Tait, and L. E. Feldman. 2018. “Money Mules: Stopping Older Adults and Others from Participating in International Crime Schemes.” United States Attorneys’ Bulletin 66:79–94.
  • Gilmour, N. 2016. “Preventing Money Laundering: A Test of Situational Crime Prevention Theory.” Journal of Money Laundering Control 19(4):376–96. doi:10.1108/JMLC-10-2015-0045.
  • Hartel, P., M. Junger, and R. Wieringa. 2010. Cyber-crime Science = Crime Science + Information Security. 10–34. Utrecht: Centre for Telematics and Information Technology.
  • Holt, T. J. and A. M. Bossler. 2014. “An Assessment of the Current State of CybercrimeScholarship.” Deviant Behavior 35(1):20–40. doi:10.1080/01639625.2013.822209.
  • Holt, T. J., R. Brewer, and A. Goldsmith. 2019. “Digital Drift and the ‘Sense of Injustice’: Counter-productive Policing of Youth Cybercrime.” Deviant Behavior 40(9):1144–56. doi:10.1080/01639625.2018.1472927.
  • Holt, T. J. and H. Copes. 2010. “Transferring Subcultural Knowledge on-line: Practices and Beliefs of Persistent Digital Pirates.” Deviant Behavior 31(7):625–54. doi:10.1080/01639620903231548.
  • Instagram. (n.d.) “About Us.” Retrieved November 10, 2021. (https://about.instagram.com/about-us).
  • Kleemans, E. R. and C. J. De Poot. 2008. “Criminal Careers in Organized Crime and Social Opportunity Structure.” European Journal of Criminology 5(1):69–98. doi:10.1177/1477370807084225.
  • Kruisbergen, E. W., E. R. Leukfeldt, E. R. Kleemans, and R. Roks. 2019. “Money Talks: Money Laundering Choices of Organized Crime Offenders in a Digital Age.” Journal of Crime and Justice 42(5):569–81. doi:10.1080/0735648X.2019.1692420.
  • Leukfeldt, E. R. 2014. “Cybercrime and Social Ties.” Trends in Organized Crime 17(4):231–49. doi:10.1007/s12117-014-9229-5.
  • Leukfeldt, E. R. 2015. “Comparing Victims of Phishing and Malware Attacks: Unraveling Risk Factors and Possibilities for Situational Crime Prevention.” International Journal of Advanced Studies in Computer Science and Engineering 5:26–32.
  • Leukfeldt, E. R. 2017. Research Agenda: The Human Factor in Cybercrime and Cybersecurity. Den Haag, The Netherlands: Eleven International Publishing.
  • Leukfeldt, E. R and T. J. Holt. 2019. The Human Factor of Cybercrime. London: Routledge.
  • Leukfeldt, E. R and T. J. Holt. 2022. “Cybercrime on the Menu? Examining Cafeteria-styleOffending among Financially Motivated Cybercriminals.” Computers in Human Behavior 126:106979. doi:10.1016/j.chb.2021.106979.
  • Leukfeldt, E. R. and E. R. Kleemans. 2019. “Cybercrime, Money Mules and Situational Crime Prevention: Recruitment, Motives and Involvement Mechanisms.” Pp. 75–89 in Criminal Networks and Law Enforcement, edited by S. Hufnagel and A. Moiseienko. London: Routledge,
  • Leukfeldt, E. R, E. R. Kleemans, and W. P. Stol. 2017a. “Cybercriminal Networks, Social Ties and Online Forums: Social Ties versus Digital Ties within Phishing and Malware Networks.” The British Journal of Criminology 57(3):704–22. doi:10.1093/bjc/azw009.
  • Leukfeldt, E. R, E. R. Kleemans, and W. P. Stol. 2017b. “A Typology of Cybercriminal Networks: From Low-tech All-rounders to High-tech Specialists.” Crime, Law and Social Change 67(1):21–37. doi:10.1007/s10611-016-9662-2.
  • Leukfeldt, E. R, E. R. Kleemans, and W. P. Stol. 2017c. “Origin, Growth and Criminal Capabilities of Cybercriminal Networks: An International Empirical Analysis.” Crime, Law and Social Change 67(1):39–53. doi:10.1007/s10611-016-9663-1.
  • Leukfeldt, E. R. and R. A. Roks. 2022. “Cybercrimes on the Streets of the Netherlands? an Exploration of the Intersection of Cybercrimes and Street Crimes.” Deviant Behavior 42(11):1458–69. doi:10.1080/01639625.2020.1755587.
  • Lipsey, M. W. and F. T. Cullen. 2007. “The Effectiveness of Correctional Rehabilitation: A Review of Systematic Reviews.” Annual Review of Law and Social Science 3(1):297–320. doi:10.1146/annurev.lawsocsci.3.081806.112833
  • Madarie, R. and E. W. Kruisbergen. 2020. Traffickers in Transit: Analysing the Logistics and Involvement Mechanisms of Organised Crime at Logistical Nodes in the Netherlands: Empirical Results of the Dutch Organised Crime Monitor. In Understanding Recruitment to Organized Crime and Terrorism, edited by D. Weisburd, E. U. Savona, B., B. Hasisi, & F. Calderoni. Springer: Cham. 277–308. doi:10.1007/978-3-030-36639-1_12
  • Maimon, D and E. R. Louderback. 2019. “Cyber-dependent Crimes: An Interdisciplinary Review.” Annual Review of Criminology 2(1):191–216. doi:10.1146/annurev-criminol-032317-092057.
  • Maruna, S. and H. Copes. 2005. “What Have We Learned from Five Decades of Neutralization Research?” Crime and Justice 32:221–320. doi:10.1086/655355
  • McGuire, M. and S. Dowling. 2013a. “Cyber-dependent Crimes.” Pp. 4–34 in Cybercrime: A Review of the Evidence. London: Home Office.
  • McGuire, M. and S. Dowling. 2013b. “Cyber-enabled Crimes.” Pp. 4–26 in Cybercrime: A Review of the Evidence. London: Home Office.
  • Moyle, L., A. Childs, R. Coomber, and M. J. Barratt. 2019. “#drugsforsale: An Exploration of the Use of Social Media and Encrypted Messaging Apps to Supply and Access Drugs.” International Journal of Drug Policy 63:101–10. doi:10.1016/j.drugpo.2018.08.005.
  • Odinot, G., M. A. Verhoeven, R. L. D. Pool, and C. J. De Poot. 2017. “Organised Cybercrime in the Netherlands: Empirical Findings and Implications for Law Enforcement.” Retrieved September 5, 2021. (https://repository.wodc.nl/handle/20.500.12832/179?show=full).
  • Pratt, T. C., F. T. Cullen, C. S. Sellers, T. D. Madensen L. Thomas Winfree Jr, L. E. Daigle, N. E. Fearn, J. M. Gau, and J M. Gau. 2010. “The Empirical Status of Social Learning Theory: A Meta‐Analysis.” Justice Quarterly 27(6):765–802. doi:10.1080/07418820903379610.
  • Quinn, J. F. and C. J. Forsyth. 2005. “Describing Sexual Behavior in the Era of the Internet: A Typology for Empirical Research.” Deviant Behavior 26(3):191–207. doi:10.1080/01639620590888285.
  • Reyns, B. W. 2010. “A Situational Crime Prevention Approach to Cyberstalking Victimization: Preventive Tactics for Internet Users and Online Place Managers.” Crime Prevention and Community Safety 12(2):99–118. doi:10.1057/cpcs.2009.22.
  • Roks, R. and J. Hendriksen. 2021. “Laat Je Niet Misleiden Door Afwijkende Prijzen.” Tijdschrift voor Criminologie 63(2):211–35. Do NotLet Aberrant Prices Distract You.
  • Roks, R. A, E. R. Leukfeldt, and J. A. Densley. 2020. “The Hybridization of Street Offending in the Netherlands.” The British Journal of Criminology 61(4):926–45. doi:10.1093/bjc/azaa091.
  • Soudijn, M. and B. Zegers. 2012. “Cybercrime and Virtual Offender Convergence Settings.” Trends in Organized Crime 15(2–3):111–29. doi:10.1007/s12117-012-9159-z.
  • Sykes, G. M and D. Matza. 1957. “Techniques of Neutralization: A Theory of Delinquency.” American Sociological Review 22(6):664–70. doi:10.2307/2089195
  • Van der Veer, N., S. Boekee, and H. Hoekstra. 2021. “Nationale Social Media Onderzoek 2021.” Retrieved November 5, 2021. (https://www.upstream.nl/wp-content/uploads/2018/05/2021-NSMO-Basis-Rapportage-2021-x4rve5.pdf).
  • Wormith, J. S., R. Althouse, M. Simpson, L. R. Reitzel, T. J. Fagan, and R. D. Morgan. 2007. “The Rehabilitation and Reintegration of Offenders: The Current Landscape and Some Future Directions for Correctional Psychology.” Criminal Justice and Behavior 34(7):879–92. doi:10.1177/0093854807301552.
  • Wortley, R. 2001. “A Classification of Techniques for Controlling Situational Precipitators of Crime.” Security Journal 14(4):63–82. doi:10.1057/palgrave.sj.8340098.
  • Wortley, R. 2012. “Situational Prevention of Child Abuse in the New Technologies.” Pp. 188–203 in Understanding and Preventing Online Exploitation of Children, edited by K. Ribisl and E. Quayle. London: Routledge.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.