Pan, Jinjian A., The University of New South Wales, School of Information Systems Technology and Management, Sydney, NSW 2052, jinjian.pan@cba.com.au Winchester, Donald, The University of New South Wales, School of Information Systems Technology and Management, Sydney, NSW 2052 d.winchester@unsw.edu.au Land, Lesley, The University of New South Wales, School of Information Systems Technology and Management, Sydney, NSW 2052, l.land@unsw.edu.au Watters, Paul, The University of Ballarat, Graduate School of Information Technology and Mathematical Sciences, Ballarat, VIC 3353, p.watters@ballarat.edu.au
Abstract
The increasing ease of access to the World Wide Web and email harvesting tools has enabled spammers to target a wider audience. The problem is where scams are widely encountered in day to day environment to individuals from all walks of life and result in millions of dollars in financial loss as well as emotional trauma (Newman 2005). This paper aims to analyse and examine the structure of Romance Fraud, in a bid to understand and detect Romance Fraud profiles. We focus on scams that utilise the medium of dating websites. The primary indicators of Romance Fraud identified in the literature include social factors, scam characteristics and content. The approach followed is informed by interpretivist and quantitative research perspectives. From this understanding, Romance Fraud can be viewed as a methodical attempt by scammers to penetrate their victims’ defences by impersonating someone else or creating an avatar (fictitious identity). A quantitative approach was undertaken in order to extract reflective, informative and rich data (Neuman 2003). The research methodology incorporating Knowledge Discovery from an existing proprietary online dating database was adopted to provide the foundation for this research (PiatetskyShapiro 1996). Keywords: Romance Scams in Online Dating, Information Systems
References: Agarwal, R. and Karahanna, E. (2000). Time Flies When You 're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage. Management Information Systems Quarterly, 24, 665-692. Amber Stabek, S. B., and Watters, P. A. (2009). the Case for a Consistant Cyberscam Classification Framework. Internet Commerce Security Laboratory. ARIN (2009). ARIN: WHOIS Database Search Retrieved 20th Oct 2009 from ws.arin.net/ Arnold, B. (2008). The 419 scam: basis, statistics, regulation. Caslon Analytics [Online]. Available: http://www.caslon.com.au/419scamnote.htm#statistics. Bishop, J. (2008). Understanding and facilitating the development of social networks in online dating communities: A case study and model. Social Networking communities and eDating Services. Bolton, R. J. (2002). Unsupervised Profiling Methods for Fraud Detection. Statistical Science, 17, 235-255. Bonchi, E. F., Malin, B., and Jiang, W. (2008). PinKDD '08: Privacy, Security, and Trust in KDD: Post-Workshop Report. SIGKDD Explorations 2008, 10, 66-67. Dixon, R. (2005). I will eat your Dollars. Los Angeles Times [Online]. Available: http://web.archive.org/web/20051029165224/http://news.yahoo.com/s/latimests/20051020/ts_latim es/iwilleatyourdollars. Ellison, N., and Gibbs, J. (2006). Managing Impressions Online: Self Presentation in the Online Dating Environment. Journal of Computer Mediated Communication, 11. FDIC. (2009). Fraud Alert. Teller Vision. April. Feliciano, C., Robnett, B., and Komaie, G. (2009). Gendered racial exclusion among white Internet daters. Social Science Research, 38, 41-56. Ferreyra-Orozo, G. (2008). A Culture of Corruption: Everyday Deception and Popular Discontent in Nigeria. American Anthropologist, 110, 145-146. Gill, J. O. (2003). Perception of email personality at zero-acquaintance: Extroversion takes care of itself; Neuroticism is a worry. Proceedings of the 25th annual conference of the cognitive science society. GMI. (2006). Logging in for love -global survey shows popularity & pitfalls of love online. Han, J. W., Altman, R. B., Kumar, V., Mannila, H. and Pregibon, D. (2002). Emerging scientific applications in data mining. Communications of the ACM, 45, 54-58. Hancock, J. T., and Ellison, N. (2007). The Truth about lying in Online Dating Profiles. Proceedings of the ACM Conference on Human Factors in Computing Systems, 449-452. Henderson, L. (2009). Nigerian Romance Scams [Online]. Available: http://www.crimes-ofpersuasion.com/Nigerian/nigerian-romance-scams.htm [Accessed]. Hitchcock, J. A. (2009). To Scam or Not to Scam, Information Today Inc. Horning, A. (2007). Examining Personal Ads and Job Ads. In: WHITTY, M. T., and Inman, J. A. (ed.) Online M@tchmaking. London: Palgrave Macmillian. Jamieson, R J., Winchester, D W., Stephens, G., Smith, S., (2008). Developing a Conceptual Framework for Identity Fraud Profiling. Proceedings of the 16th European Conference on Information Systems at the J.E. Cairnes Graduate School of Business & Public Policy, National University of Ireland, Galway, Ireland, 9-11 June, 12 pages. Jerving, J. (2007). You 've Got Mail--And You May Be Rich: The Nigerian 419 Scam Keeps Going. [Online]. Available: [Accessed 11(43)]. Levitz, J. and Stecklow, S. (2008). Credit Crunch Fuels Rise in 'Advance Fee ' Schemes. Wall Street Journal - Eastern Edition [Online], 252. Available: http://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=33124196&site=ehost-live. Mannila, H. (2002). Combining pattern discovery and probabilistic modeling in data mining. In: PENTTONEN, M. & SCHMIDT, E. M., eds., Jul 03-05 2002 Turku, Finland. Springer-Verlag Berlin, 10-19. Mierswa, M. W., Klingkenberg, R., Scholz, M., and Euler, T. (2009). RapidMiner 4.3 Tutorial. Mierswa, I., Wurst, M., Klinkenberg, R, Scholz, M., and Euler, T. (2006). YALE: Rapid Prototyping for Complex Data Mining Tasks. Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD-06), August, 935--940. Morris, J. L. S. (ed.) 2001. Online and Personal: The reality of Internet relationships, Sydney: Finch Publishing Mykola Pechenizkiy, S. P., Alexey Tsymbal (1998). On the Use of Information Systems Research Methods in Data Mining. Information Systems Development: Advances in Theory, Practise and Education. Neuman, W. L. (2003). Social Research Methods: Qualitative and Quantitative Approaches, Allyn and Bacon. Newman, G. R. (2005). Identity Theft Literature Review. In: Justice, U. D. O. (ed.). Park, Y. J., Choi, E., and Park, S. H. (2009). Two-step filtering datamining method integrating casebased reasoning and rule induction. Expert Systems with Applications, 36, 861-871. Piatetsky-Shapiro, G., Smyth, P and Uthurusamy, R. (1994). KDD-93:Progress and Challenges in Knowledge Discovery in Databases. AI Magazine, 15. Piatetsky-Shapiro, G., and Smyth, P. (1996). From Data Mining to Knowledge Discovery in Databases. American Association for Artificial Intelligence. Silberstein, L. (2009). e Love scams [Online]. Available: http://www.elovedeceptions.com/ [Accessed]. Silberschatz, A. T. (1995). On Subjective Measures of Interestingness in Knowledge Discovery. Proceedings of the First International Conference on AAAI. Silberschatz, A. T. (1996). What makes patterns interesting in Knowledge Discovery systems. IEEE Transactions on Knowledge and Data Engineering. Smith, A. (2009). Nigerian Scam E-mails and the Charms of Capital. Cultural Studies, 23, 27-47. Smith, S., Winchester, D., Bunker, D., and Jamieson, R. (2010). Circuits of Power: A Study of Mandated Compliance to an Information Systems Security De Jure Standard in a Government Organization, MIS Quarterly, forthcoming. Stephure, R. J., Boon, S. D., MacKinnon, S. L., and Deveau, V. L. (2009). Internet Initiated Relationships: Associations Between Age and Involvement in Online Dating. Journal of ComputerMediated Communication, 14, 658–681. The Cheshire Cat (2005) The Ethics of Scambaiting. 419 eater [Online]. Available: http://www.419eater.com/html/ethics.htm. USA, D. O. S. (2008). 419 scams. In: USA, D. O. S. (ed.). Usama Fayyad, G. P.-S., Padhraic Smyth (1996). From Data Mining to Knowledge Discovery in Databases. American Association for Artificial Intelligence. Wayne. (2009a). About Romance Scams [Online]. Available: http://www.romancescam.com/about.htm ; http://www.datingnmore.com/fraud/scam_operate.htm [Accessed]. Wayne. (2009b). Romance Scammers List (my blog): Lohotron. Wayne. Whitty, M. T. (2007). The art of selling one 's 'self ' on an oline dating site: the BAR Approach. In: Whitty, M. T., and Inman, J. A. (ed.) Online M@tchmaking. London: Palgrave Macmillian. Wizard, B. (2001). Nigeria - The 419 Coalition Website: We Fight the Nigerian Scam with Education. Available: http://home.rica.net/alphae/419coal/. Zhang, H., Yen, J., and Foley, H. (2008). SNAKDD 2008 -Social Network Mining and Analysis: Post Workshop Report. SIGKDD Explorations 2008, 10, 74-77. Zhou, B., Pei, J., and Luk, W-S. (2008). A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data. SIGKDD Explorations 2008, 10, 12-22.