4,101
Views
2
CrossRef citations to date
0
Altmetric
Articles

Online victimization risk and self-protective strategies: developing police-led cyber fraud prevention programs

&

References

  • Ambrey, C. L., Fleming, C. M., & Manning, M. (2014). Perception or reality, what matters most when it comes to crime in your neighbourhood? Social Indicators Research, 119, 877–896.
  • Australian Consumer and Competition Commission (ACCC). (2016). Targeting scams: Report of the ACCC on scam activity 2016. Retrieved from https://www.accc.gov.au/publications/targeting-scams-report-on-scam-activity/targeting-scams-report-of-the-accc-on-scam-activity-2016
  • Australian Government Attorney-General’s Department. (2011). Protecting yourself online, what everyone need to know. Retrieved from https://www.ag.gov.au/RightsAndProtections/CyberSecurity/Documents/PDF%20-%20Protecting%20Yourself%20Online%20-%20Second%20Edition%20-%20Booklet.pdf
  • Australian Government Attorney-General’s Department. (2013). National plan to combat cybercrime. Retrieved from http://www.ag.gov.au/CrimeAndCorruption/Cybercrime/Pages/default.aspx
  • Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3(1), 400–420.
  • Broadhurst, R. (2006). Developments in the global law enforcement of cyber-crime. Policing: an International Journal of Police Strategies and Management, 29(2), 408–433.
  • Burns, S., & Roberts, L. (2013). Applying the theory of planned behavior to predicting online safety behavior. Crime Prevention and Community Safety, 15(1), 48–64.
  • Button, M., Lewis, C., & Tapley, J. (2014). Not a victimless crime: The impact of fraud on individual victims and their families. Security Journal, 27(1), 36–54.
  • Clarke, R. V. (1980). “Situational” crime prevention: Theory and practice. British Journal of Criminology, 20(2), 136–147.
  • Clough, J. (2015). Principles of cybercrime (2nd ed.). Cambridge: Cambridge University Press.
  • Cohen, L. E., & Felson, M. (1979). Social change and crime rates trends: A routine activity approach. American Sociological Review, 44(4), 588–608.
  • Council of Europe. (2004). Convention on cybercrime. Retrieved from http://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185
  • Cross, C. (2016). Using financial intelligence to target online fraud victimization: Applying a tertiary prevention perspective. Criminal Justice Studies, 29(2), 124–145.
  • Cross, C., & Blackshaw, D. (2015). Improving police responses to online fraud. Policing: A Journal of Policy and Practice, 9(2), 119–128.
  • Cross, C., & Kelly, M. (2016). The problem of “white noise”: Examining current prevention approaches to online fraud. Journal of Financial Crime, 23(4), 806–814.
  • Cross, C., Smith, R., & Richards, K. (2014). Challenges of responding to online fraud victimization in Australia. Trends and issues in crime and criminal justice (Vol. 474, pp. 1–6).
  • Canberra: Australian Institute of Criminology. Retrieved from https://aic.gov.au/publications/tandi/tandi474
  • Davidson, J. C., & Martellozzo, E. (2008). Protecting vulnerable young people in cyberspace from sexual abuse: Raising awareness and responding globally. Police Practice and Research: an International Journal, 9(4), 277–289.
  • Davis, J. T. (2012). Examining perceptions of local law enforcement in the fight against crimes with a cyber component. Policing: an International Journal of Police Strategies & Management, 35(2), 272–284.
  • Drew, J. M., & Cross, C. (2013). Fraud and its PREY: Conceptualising social engineering tactics and its impact on financial literacy outcomes. Journal of Financial Services Marketing, 18(3), 188–198.
  • Gamble, K., Boyle, P., Yu, L., & Bennett, D. (2013) Aging, financial literacy and fraud. Social Science Research Network. Retrieved from http://ssrn.com/abstract=2165564
  • Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social and Legal Studies, 10(2), 243–249.
  • Hinduja, S. (2004). Perceptions of local and state law enforcement concerning the role of computer crime investigative teams. Policing: an International Journal of Police Strategies & Management, 27(3), 341–357.
  • Holt, T., & Bossler, A. M. (2008). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30, 1–25.
  • Hot, T., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35, 20–40.
  • House of Representatives Standing Committee on Communications. (2010). Hackers, fraudsters and botnets: Tackling the problem of cybercrime. The Report of the Inquiry into Cyber Crime. The Parliament of the Commonwealth of Australia. Retrieved from http://www.aph.gov.au/parliamentary_Business/Committees/House_of_Representatives_Committees?url=coms/cybercrime/report.htm
  • Indermaur, D., & Roberts, L. (2005). Perceptions of crime and justice. Australian social attitudes: The first report. Sydney: University of New South Wales Press.
  • Ionescu, L., Mirea, V., & Blajan, A. (2011). Fraud, Corruption and Cyber Crime in a Global Digital Network. Economics, Management and Financial Markets, 6(2), 373–380.
  • Leukfeldt, E. R. (2014). Phishing for suitable targets in the Netherlands: Routine activity theory and phishing victimization. Cyberpsychology, Behavior and Social Networking, 17(8), 551–555.
  • Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263–280.
  • Martin, N., & Rice, J. (2010). Building better Government IT: Understanding community beliefs and attitudes towards smart card technologies. Behavior and Information Technology, 29(4), 433–444.
  • McNeeley, S. (2015). Lifestyle-routine activities and crime events. Journal of Contemporary Criminal Justice, 31(1), 30–52.
  • NASD Investor Education Foundation. (2006). Investor fraud study: Final report. Retrieved from http://www.sec.gov/news/press/extra/seniors/nasdfraudstudy051206.pdf, accessed 25 January 2013.
  • Office of National Statistics (2017). Crime survey for England and Wales. Retrieved from http://www.crimesurvey.co.uk/
  • Pfeffer, J., & Sutton, R. (1999). Knowing “what” to do is not enough: Turning knowledge into action. California Management Review, 42(1), 83–108.
  • Radar, N. E., May, D. C., & Goodrum, S. (2007). An empirical assessment of the “threat of victimization”: Considering fear of crime, perceived risk, avoidance, and defensive behaviors. Sociological Spectrum, 27(5), 475–505.
  • Reyns, B. W. (2010). A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers. Crime Prevention and Community Safety, 12(2), 99–118.
  • United Nations. (2016). The state of broadband: Broadband catalyzing sustainable development. Broadband Commission for Sustainable Development. Retrieved from http://www.broadbandcommission.org/Documents/reports/bb-annualreport2016.pdf
  • US Internet Crime Complaint Center. (2016). Internet crime report. Retrieved from https://pdf.ic3.gov/2016_IC3Report.pdf
  • Van Wilsem, J. (2011). Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization. European Journal of Criminology, 8(2), 115–127.
  • Wall, D. S. (2007). Policing cybercrimes: Situating the public police in networks of security within cyberspace. Police Practice and Research: an International Journal, 8(2), 183–205.
  • Webster, J., & Drew, J. M. (2017). Policing advance fee fraud (AFF): Experiences of fraud detectives using a victim-focused approach. International Journal of Police Science and Management, 19(1), 39–53.
  • Whitty, M., & Buchanan, T. (2012). The online romance scam: A serious cybercrime. Cyberpsychology, Behavior and Social Networking, 15(3), 181–183.
  • Wortley, R. (1998). A two-stage model of situational crime prevention. Studies on Crime and Crime Prevention, 7, 173–188.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.