2019
DOI: 10.1108/jcrpp-01-2019-0008
|View full text |Cite
|
Sign up to set email alerts
|

Is online fraud just fraud? Examining the efficacy of the digital divide

Abstract: Purpose Fraud is not a new offence. However, the recent evolution and proliferation of technologies (predominantly the internet) has seen offenders increasingly use virtual environments to target and defraud victims worldwide. Several studies have examined the ways that fraud is perpetrated with a clear demarcation between terrestrial and cyber offences. However, with moves towards the notion of a “digital society” and recognition that technology is increasingly embedded across all aspects of our lives, it is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0
3

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 29 publications
0
7
0
3
Order By: Relevance
“…Interviews covered a range of topics on the interaction between the FJN and victims of fraud (for other publications taken from the same data set see Cross 2019a, b). Given the variety in topics covered across the interviews, the current paper focuses only on the issue of accountability as it relates to fraud victimisation.…”
Section: Methodsmentioning
confidence: 99%
“…Interviews covered a range of topics on the interaction between the FJN and victims of fraud (for other publications taken from the same data set see Cross 2019a, b). Given the variety in topics covered across the interviews, the current paper focuses only on the issue of accountability as it relates to fraud victimisation.…”
Section: Methodsmentioning
confidence: 99%
“…In other words, fraudulent people abound everywhere and Nigeria is not an exception. To underscore the ubiquity of fraud, Cross (2019) extensively reports fraud incidences from the United Kingdom, the United States, Australia, Canada, and Hong Kong with attendant losses in millions of dollars.…”
Section: Introductionmentioning
confidence: 99%
“…It should be noted that most studies on cybercrime and cybersecurity that use the PMT framework recognize the value of the theory, but also acknowledge the importance of extending the original framework and adapting it to the online environment by including one or several additional variables, such as exposure to media coverage on security (Anderson & Agarwal, 2010), experience with the internet (Anderson & Agarwal, 2010;Youn, 2009), prior experience with online threats (Anderson & Agarwal, 2010), digital safety skills (Dodel & Mesch, 2018, 2019, or knowledge (Youn, 2009). These studies illustrate that extending the PMT framework creates a better understanding of people's protection motivation.…”
Section: Antecedents Of Threat and Coping Appraisalmentioning
confidence: 99%
“…Even though no consensus exists about the exact definition of cybercrime, the term is usually applied to refer to two types of incidents: cyber-enabled/computer-assisted crimes, and cyber-dependent/computer-focused crimes (e.g., Cross, 2019;Holt & Bossler, 2016;McGuire & Dowling, 2013). The former category refers to crimes that already have an offline equivalent (e.g., fraud, identity theft), and where the online environment offers additional ways for perpetrators to approach their targets.…”
Section: Introductionmentioning
confidence: 99%