Preview

Descriptive Data Mining on Fraudulent Online Dating Profiles

Best Essays
Open Document
Open Document
5113 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Descriptive Data Mining on Fraudulent Online Dating Profiles
DESCRIPTIVE DATA MINING ON FRAUDULENT ONLINE DATING PROFILES
Pan, Jinjian A., The University of New South Wales, School of Information Systems Technology and Management, Sydney, NSW 2052, jinjian.pan@cba.com.au Winchester, Donald, The University of New South Wales, School of Information Systems Technology and Management, Sydney, NSW 2052 d.winchester@unsw.edu.au Land, Lesley, The University of New South Wales, School of Information Systems Technology and Management, Sydney, NSW 2052, l.land@unsw.edu.au Watters, Paul, The University of Ballarat, Graduate School of Information Technology and Mathematical Sciences, Ballarat, VIC 3353, p.watters@ballarat.edu.au

Abstract
The increasing ease of access to the World Wide Web and email harvesting tools has enabled spammers to target a wider audience. The problem is where scams are widely encountered in day to day environment to individuals from all walks of life and result in millions of dollars in financial loss as well as emotional trauma (Newman 2005). This paper aims to analyse and examine the structure of Romance Fraud, in a bid to understand and detect Romance Fraud profiles. We focus on scams that utilise the medium of dating websites. The primary indicators of Romance Fraud identified in the literature include social factors, scam characteristics and content. The approach followed is informed by interpretivist and quantitative research perspectives. From this understanding, Romance Fraud can be viewed as a methodical attempt by scammers to penetrate their victims’ defences by impersonating someone else or creating an avatar (fictitious identity). A quantitative approach was undertaken in order to extract reflective, informative and rich data (Neuman 2003). The research methodology incorporating Knowledge Discovery from an existing proprietary online dating database was adopted to provide the foundation for this research (PiatetskyShapiro 1996). Keywords: Romance Scams in Online Dating, Information Systems



References: Agarwal, R. and Karahanna, E. (2000). Time Flies When You 're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage. Management Information Systems Quarterly, 24, 665-692. Amber Stabek, S. B., and Watters, P. A. (2009). the Case for a Consistant Cyberscam Classification Framework. Internet Commerce Security Laboratory. ARIN (2009). ARIN: WHOIS Database Search Retrieved 20th Oct 2009 from ws.arin.net/ Arnold, B. (2008). The 419 scam: basis, statistics, regulation. Caslon Analytics [Online]. Available: http://www.caslon.com.au/419scamnote.htm#statistics. Bishop, J. (2008). Understanding and facilitating the development of social networks in online dating communities: A case study and model. Social Networking communities and eDating Services. Bolton, R. J. (2002). Unsupervised Profiling Methods for Fraud Detection. Statistical Science, 17, 235-255. Bonchi, E. F., Malin, B., and Jiang, W. (2008). PinKDD '08: Privacy, Security, and Trust in KDD: Post-Workshop Report. SIGKDD Explorations 2008, 10, 66-67. Dixon, R. (2005). I will eat your Dollars. Los Angeles Times [Online]. Available: http://web.archive.org/web/20051029165224/http://news.yahoo.com/s/latimests/20051020/ts_latim es/iwilleatyourdollars. Ellison, N., and Gibbs, J. (2006). Managing Impressions Online: Self Presentation in the Online Dating Environment. Journal of Computer Mediated Communication, 11. FDIC. (2009). Fraud Alert. Teller Vision. April. Feliciano, C., Robnett, B., and Komaie, G. (2009). Gendered racial exclusion among white Internet daters. Social Science Research, 38, 41-56. Ferreyra-Orozo, G. (2008). A Culture of Corruption: Everyday Deception and Popular Discontent in Nigeria. American Anthropologist, 110, 145-146. Gill, J. O. (2003). Perception of email personality at zero-acquaintance: Extroversion takes care of itself; Neuroticism is a worry. Proceedings of the 25th annual conference of the cognitive science society. GMI. (2006). Logging in for love -global survey shows popularity & pitfalls of love online. Han, J. W., Altman, R. B., Kumar, V., Mannila, H. and Pregibon, D. (2002). Emerging scientific applications in data mining. Communications of the ACM, 45, 54-58. Hancock, J. T., and Ellison, N. (2007). The Truth about lying in Online Dating Profiles. Proceedings of the ACM Conference on Human Factors in Computing Systems, 449-452. Henderson, L. (2009). Nigerian Romance Scams [Online]. Available: http://www.crimes-ofpersuasion.com/Nigerian/nigerian-romance-scams.htm [Accessed]. Hitchcock, J. A. (2009). To Scam or Not to Scam, Information Today Inc. Horning, A. (2007). Examining Personal Ads and Job Ads. In: WHITTY, M. T., and Inman, J. A. (ed.) Online M@tchmaking. London: Palgrave Macmillian. Jamieson, R J., Winchester, D W., Stephens, G., Smith, S., (2008). Developing a Conceptual Framework for Identity Fraud Profiling. Proceedings of the 16th European Conference on Information Systems at the J.E. Cairnes Graduate School of Business & Public Policy, National University of Ireland, Galway, Ireland, 9-11 June, 12 pages. Jerving, J. (2007). You 've Got Mail--And You May Be Rich: The Nigerian 419 Scam Keeps Going. [Online]. Available: [Accessed 11(43)]. Levitz, J. and Stecklow, S. (2008). Credit Crunch Fuels Rise in 'Advance Fee ' Schemes. Wall Street Journal - Eastern Edition [Online], 252. Available: http://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=33124196&site=ehost-live. Mannila, H. (2002). Combining pattern discovery and probabilistic modeling in data mining. In: PENTTONEN, M. & SCHMIDT, E. M., eds., Jul 03-05 2002 Turku, Finland. Springer-Verlag Berlin, 10-19. Mierswa, M. W., Klingkenberg, R., Scholz, M., and Euler, T. (2009). RapidMiner 4.3 Tutorial. Mierswa, I., Wurst, M., Klinkenberg, R, Scholz, M., and Euler, T. (2006). YALE: Rapid Prototyping for Complex Data Mining Tasks. Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD-06), August, 935--940. Morris, J. L. S. (ed.) 2001. Online and Personal: The reality of Internet relationships, Sydney: Finch Publishing Mykola Pechenizkiy, S. P., Alexey Tsymbal (1998). On the Use of Information Systems Research Methods in Data Mining. Information Systems Development: Advances in Theory, Practise and Education. Neuman, W. L. (2003). Social Research Methods: Qualitative and Quantitative Approaches, Allyn and Bacon. Newman, G. R. (2005). Identity Theft Literature Review. In: Justice, U. D. O. (ed.). Park, Y. J., Choi, E., and Park, S. H. (2009). Two-step filtering datamining method integrating casebased reasoning and rule induction. Expert Systems with Applications, 36, 861-871. Piatetsky-Shapiro, G., Smyth, P and Uthurusamy, R. (1994). KDD-93:Progress and Challenges in Knowledge Discovery in Databases. AI Magazine, 15. Piatetsky-Shapiro, G., and Smyth, P. (1996). From Data Mining to Knowledge Discovery in Databases. American Association for Artificial Intelligence. Silberstein, L. (2009). e Love scams [Online]. Available: http://www.elovedeceptions.com/ [Accessed]. Silberschatz, A. T. (1995). On Subjective Measures of Interestingness in Knowledge Discovery. Proceedings of the First International Conference on AAAI. Silberschatz, A. T. (1996). What makes patterns interesting in Knowledge Discovery systems. IEEE Transactions on Knowledge and Data Engineering. Smith, A. (2009). Nigerian Scam E-mails and the Charms of Capital. Cultural Studies, 23, 27-47. Smith, S., Winchester, D., Bunker, D., and Jamieson, R. (2010). Circuits of Power: A Study of Mandated Compliance to an Information Systems Security De Jure Standard in a Government Organization, MIS Quarterly, forthcoming. Stephure, R. J., Boon, S. D., MacKinnon, S. L., and Deveau, V. L. (2009). Internet Initiated Relationships: Associations Between Age and Involvement in Online Dating. Journal of ComputerMediated Communication, 14, 658–681. The Cheshire Cat (2005) The Ethics of Scambaiting. 419 eater [Online]. Available: http://www.419eater.com/html/ethics.htm. USA, D. O. S. (2008). 419 scams. In: USA, D. O. S. (ed.). Usama Fayyad, G. P.-S., Padhraic Smyth (1996). From Data Mining to Knowledge Discovery in Databases. American Association for Artificial Intelligence. Wayne. (2009a). About Romance Scams [Online]. Available: http://www.romancescam.com/about.htm ; http://www.datingnmore.com/fraud/scam_operate.htm [Accessed]. Wayne. (2009b). Romance Scammers List (my blog): Lohotron. Wayne. Whitty, M. T. (2007). The art of selling one 's 'self ' on an oline dating site: the BAR Approach. In: Whitty, M. T., and Inman, J. A. (ed.) Online M@tchmaking. London: Palgrave Macmillian. Wizard, B. (2001). Nigeria - The 419 Coalition Website: We Fight the Nigerian Scam with Education. Available: http://home.rica.net/alphae/419coal/. Zhang, H., Yen, J., and Foley, H. (2008). SNAKDD 2008 -Social Network Mining and Analysis: Post Workshop Report. SIGKDD Explorations 2008, 10, 74-77. Zhou, B., Pei, J., and Luk, W-S. (2008). A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data. SIGKDD Explorations 2008, 10, 12-22.

You May Also Find These Documents Helpful

  • Good Essays

    Identity fraud can ruin a person's entire life because what they worked so hard for is taken from them. People pretend to be someone else on the computer. As the amount of online dating sites are going up, so it the amount of “catfishing”, or pretending to be someone else and tricking people into believing it really is that person. They start communicating with people online and have a fake relationship. Some people even keep the game going for years, making other people think they met “the love of their life” even though its all a lie. If people can’t be honest with each other, how can they live together…

    • 815 Words
    • 4 Pages
    Good Essays
  • Good Essays

    William Golding believes that “man produces evil as bees produce honey.” In the book Lord of the Flies Golding proves that men are evil savages. In the book, a group of boys from London crash land on a deserted island. They create two governments through the struggle for power. This results in the murder of three young boys. Before they were rescued, they burned down the island into destruction. The chubby, asthmatic boy wears glasses which represents intelligence. The glasses are thrown, stolen, misused, and shatter turning everyone ignorant. William Golding argues men are savages through the mistreatment of the symbolic Piggy’s glasses.…

    • 596 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    • The Internet Crime Complaint Center (IC3) processed more than 336,000 complaints related to Internet crime in 2009 in the United States. • Many complaints were related to fraud, including nondelivery of ordered items, credit and debit card fraud, and advanced fee scams. Much of the credit card fraud was perpetrated when credit card numbers were stolen by criminals tricking people into revealing sensitive information or by computer programs that gather credit card data. • Non-fraud-related complaints pertained to issues such as computer intrusions, unsolicited e-mail, and child pornography.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Satisfactory Essays

    Some of this surveillance focuses in credit card fraud and identities theft. Marketing companies main job now days is to create profiles from our own information. Then they develop better sales or pitches.” Consumer profiling” is the method of selling that has generated high levels of revenues for these companies. Facebook partner with Bacon, allowing Facebook to post on the account holder’s wall if any purchase was made; this step will inform friends of the purchase, ending this partnership after a law suit was filed.…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Deception in Online Dating

    • 1298 Words
    • 6 Pages

    Imagine scrolling through a multitude of single people on an online dating site. You find an interesting candidate; their profile catches your attention, their pictures captivate your eyes, and the smooth way they chat with you online keeps you fascinated with their persona. Since your conversation online was always a thrill, it seemed natural to set up a face-to-face (FTF) meeting. When you finally get to meet this wonderful person, who has been roaming through your mind since the first online date, your eyes are appalled to see the drastic contrast of their online and offline self. There is a significant error with the image you had in mind about what they would be like; their appearance is less attractive, their clothes were out of style, they smell and speak repugnantly, and their confidence they displayed online has vanished. This story ends with you running back home completely disturbed with how much deception was present. This situation describes the real problem with finding romance online. Even though the internet provides an efficient and prompt way of networking, those seeking long-lasting relationships should switch off the server. The intimacy between online daters is artificially produced with the internet’s ability to give users more control over presentation of self (Goffman, 1959), misrepresentation, and the deception that comes with these elements.…

    • 1298 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    There is therefore a need for some form of standards for online-dating agencies. We define online-dating agencies as a paid internet-based provider of match-making services, which would serve as a regulatory body of content within their community. This is contrary to pure social advertising sites, where the users simply pay to place a personal advertisement on the page, and interactions between parties are at their own discretion.…

    • 2552 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Mail Order Brides

    • 3667 Words
    • 15 Pages

    The phenomenon of Mail-order brides (MOB) directly correlates to human trafficking into the sex industry by organized criminal groups. Contemporary mail-order bride phenomenon can be described as the introduction of women from Third World countries (or from former USSR) to men from First World countries through agencies that specialize in placing personal ads about potential wives on the internet with the ultimate goal of immigration of the woman and marriage between the two parties (Langevin, 76) . From first impression, it seems that the marriage agencies represent an extension of internet dating in the age of globalization (Langevin, 76). To the uncritical observer, it appears to ‘kill two birds with one stone’, solving the issue of solitude for men who could not find a compatible partner and the desire of underprivileged women to immigrate for better opportunities. The method at which it is done also seems appropriate with the growing accessibility of information technology as well as international migration (Langevin, 76). Yet this plain view fails to see the women involved as commodities for consumer men and the MOB industry as very lucrative for criminals.…

    • 3667 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Con Artists

    • 694 Words
    • 3 Pages

    Thesis Statement: In order to understand my topic, I will discuss scam victims, spotting a con-artist, and avoiding one.…

    • 694 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    12] 12-Earp, J. B. and D.L. Baumer, Innovative Web Use to Learn about Consumer Behavior and Online Privacy, Communications of the ACM, Vol. 46 No. 4, 2003, pp: 81-83…

    • 9303 Words
    • 38 Pages
    Powerful Essays
  • Powerful Essays

    New technology has increased the convenience of online shopping, and ordering food. Socially it has created many outlets for us to communicate to one another, from far places, which is very cool in my opinion, but at the same time its easy for predators to find victims on the social cites. Thesis Statement:…

    • 1537 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Criminals are very common on online dating websites because they know that they will find a lot of victims. Once they find their victim they gain a relationship with them and then slowly start asking them personal questions such their address. They then ask to meet up and then try to either rape or kill them, this happened to Stephen Robinson's sister Sharon Winters. She was stabbed several times by a man she had met online a couple of days earlier (Laura Mitchell). Criminals not only use dating website to murder, rape and stalk innocent people but they also use them to get money (FBI). What they do gain a close bond with the victim and then later on ask them for some money, they then get their personal information causing the victim to lose money (FBI). Since criminals are very common on dating websites it's important not to give out any personal information to anyone on these sites to avoid a tragedy or losing…

    • 865 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Identity theft is the most-costly and fastest growing crime in the world. Ident theft is a white-collar crime that became popular among criminal in today’s society. It accords when a criminal obtains someone’s personal information without them knowing, such as, their bank account or social security number, many people uses the internet as a productive and educational tool to stay connected and knowledgeable; and criminal uses it to gain access to peoples’ information. Social media is one of the few ways criminal get hold of people information since people use it for personal and business purposes. Despite the beneficial reasons, a lot of people became victims because they’re not aware that criminal can steal their identity through social media.…

    • 1429 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Online Dating Analysis

    • 645 Words
    • 3 Pages

    If I ever try online dating I will know now to be aware of people lying, and more specifically what aspects they may be lying about. I’ll also have tips that I can use to have a better chance at maintaining a possible relationship with someone I meet online, and I’ll know to not expect too much from many sites that offer online dating, especially ones that require you to pay in order to respond to messages. I think some of the tips in this article can help me in dating in general, whether online or if I meet someone face-to-face without the use of the virtual world. Even in the real world people lie about themselves to make themselves seem better, and I should always be aware of that and aware of my own lies I may tell. As for my future profession, I think I can use some of this information to possibly help future co-workers if they pursue online dating, and I can use some of the tips when interacting with people in a non-romantic setting. I learned a lot from this article, especially about popular dating sites. I did not realize that most of them required payment to actually even talk to people, and that the tests they claimed were supposed to find your soulmate actually had no scientific evidence to prove they work. After reading this article I feel I am more adequately prepared and knowledgeable if I or someone I know should ever look into online…

    • 645 Words
    • 3 Pages
    Good Essays