{ "access": { "embargo": { "active": false, "reason": null }, "files": "public", "record": "public", "status": "open" }, "created": "2016-07-26T07:42:28+00:00", "custom_fields": { "journal:journal": { "issue": "1", "pages": "79-91", "title": "International Journal of Cyber Criminology", "volume": "10" } }, "deletion_status": { "is_deleted": false, "status": "P" }, "files": { "count": 1, "enabled": true, "entries": { "JansenLeukfeldtvol10issue1IJCC2016.pdf": { "checksum": "md5:2f35788afc4377055fda1f6cadac10ef", "ext": "pdf", "id": "9ea87703-c355-4cae-9746-fc593b907da5", "key": "JansenLeukfeldtvol10issue1IJCC2016.pdf", "metadata": null, "mimetype": "application/pdf", "size": 235666 } }, "order": [], "total_bytes": 235666 }, "id": "58523", "is_draft": false, "is_published": true, "links": { "access": "https://zenodo.org/api/records/58523/access", "access_links": "https://zenodo.org/api/records/58523/access/links", "access_request": "https://zenodo.org/api/records/58523/access/request", "access_users": "https://zenodo.org/api/records/58523/access/users", "archive": "https://zenodo.org/api/records/58523/files-archive", "archive_media": "https://zenodo.org/api/records/58523/media-files-archive", "communities": "https://zenodo.org/api/records/58523/communities", "communities-suggestions": "https://zenodo.org/api/records/58523/communities-suggestions", "doi": "https://doi.org/10.5281/zenodo.58523", "draft": "https://zenodo.org/api/records/58523/draft", "files": "https://zenodo.org/api/records/58523/files", "latest": "https://zenodo.org/api/records/58523/versions/latest", "latest_html": "https://zenodo.org/records/58523/latest", "media_files": "https://zenodo.org/api/records/58523/media-files", "parent": "https://zenodo.org/api/records/639182", "parent_doi": "https://zenodo.org/doi/", "parent_html": "https://zenodo.org/records/639182", "requests": "https://zenodo.org/api/records/58523/requests", "reserve_doi": "https://zenodo.org/api/records/58523/draft/pids/doi", "self": "https://zenodo.org/api/records/58523", "self_doi": "https://zenodo.org/doi/10.5281/zenodo.58523", "self_html": "https://zenodo.org/records/58523", "self_iiif_manifest": "https://zenodo.org/api/iiif/record:58523/manifest", "self_iiif_sequence": "https://zenodo.org/api/iiif/record:58523/sequence/default", "versions": "https://zenodo.org/api/records/58523/versions" }, "media_files": { "count": 0, "enabled": false, "entries": {}, "order": [], "total_bytes": 0 }, "metadata": { "contributors": [ { "affiliations": [ { "name": "Raksha Shakti University" } ], "person_or_org": { "family_name": "K Jaishankar", "name": "K Jaishankar", "type": "personal" }, "role": { "id": "editor", "title": { "de": "EditorIn", "en": "Editor" } } } ], "creators": [ { "affiliations": [ { "name": "Open University, NHL University of Applied Sciences, Police Academy, the Netherlands" } ], "person_or_org": { "family_name": "Jansen", "given_name": "Jurjen", "name": "Jansen, Jurjen ", "type": "personal" } }, { "affiliations": [ { "name": "Open University, NHL University of Applied Sciences, Police Academy, the Netherlands" } ], "person_or_org": { "family_name": "Leukfeldt", "given_name": "Rutger", "name": " Leukfeldt, Rutger", "type": "personal" } } ], "description": "
This paper explores factors that may explain online banking fraud victimization. The routine activity approach and protection motivation theory are used as theoretical lenses for this study. Based on 30 semi-structured interviews with phishing and malware victims, we found that suitable target factors from the routine activity approach have a marginal influence on victimization. About a third of the respondents were aware of the scam that they fell victim to prior to the incident. Most respondents had taken measures to protect themselves against online banking fraud. However, phishing victims were negligent and gave security codes to fraudsters. Several respondents reported having insufficient knowledge and skills regarding the safety and security of online banking and finding it difficult to assess to what extent protective measures help them to safeguard against fraudulent attacks. The results suggest, in line with the literature, that everyone is susceptible to some degree to online banking fraud victimization. From a customer perspective, both awareness of fraudulent schemes and training in how to apply protective measures are critical in keeping online banking safe and secure. Future research is needed to assess how customers can be trained to effectively mitigate phishing scams and whether customers are the right unit of analysis to target with interventions for combating malware attacks.
", "publication_date": "2016-07-24", "publisher": "Zenodo", "references": [ { "reference": "Anderson, K. B. (2006). Who are the victims of identity theft? The effect of demographics. Journal of Public Policy & Marketing, 25(2), 160\u2013171." }, { "reference": "Anderson, R. (2007). Closing the phishing hole - Fraud, risk and nonbanks. Proceedings of the Payments System Research Conferences, 1\u201316." }, { "reference": "APWG [Anti-Phishing Working Group] (2015). Phishing activity trends report: 4th quarter 2014. Retrieved from http://docs.apwg.org/reports/apwg_trends_report_q4_2014.pdf." }, { "reference": "Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3(1), 400\u2013420." }, { "reference": "Brown, J. S., Collins, A. & Duguid, P. (1989). Situated cognition and the culture of learning. Educational Researcher, 18(1), 32\u201342." }, { "reference": "Choi, K.-S. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1), 308\u2013333." }, { "reference": "Cohen, L. E. & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, 588\u2013608." }, { "reference": "Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M. & Baskerville, R. (2013). Future directions for behavioral information security research. Computers & Security, 32, 90\u2013101." }, { "reference": "Davinson, N. & Sillence, E. (2014). Using the health belief model to explore users\u2019 perceptions of \u201cbeing safe and secure\u201d in the world of technology mediated financial transactions. International Journal of Human-Computer Studies, 72(2), 154\u2013168." }, { "reference": "Einspruch, E. L., Lynch, B., Aufderheide, T. P., Nichol, G. & Becker, L. (2007). Retention of CPR skills learned in a traditional AHA Heartsaver course versus 30-min video self-training: A controlled randomized study. Resuscitation, 74(3), 476\u2013486." }, { "reference": "Harrell, E. & Langton, L. (2013). Victims of identity theft, 2012. Washington DC: Bureau of Justice Statistics." }, { "reference": "Hong, J. (2012). The state of phishing attacks. Communications of the ACM, 55(1), 74\u201381." }, { "reference": "Hutchings, A. & Hayes, H. (2009). Routine activity theory and phishing victimisation: Who gets caught in the net? Current Issues in Criminal Justice, 20, 433\u2013451." }, { "reference": "Jansen, J. (2015). Studying safe online banking behaviour: A protection motivation theory approach. Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 120\u2013130." }, { "reference": "Jansen, J. & Leukfeldt, R. (2015). How people help fraudsters steal their money: An analysis of 600 online banking fraud cases. Proceedings of the 5th Workshop on Socio-Technical Aspects in Security and Trust, 25\u201331." }, { "reference": "Jansson, K. & von Solms, R. (2013). Phishing for phishing awareness. Behaviour & Information Technology, 32(6), 584\u2013593." }, { "reference": "Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L. F. & Hong, J. (2010). Teaching Johnny not to fall for phish. ACM Transactions on Internet Technology, 10(2), 7:1\u20137:31." }, { "reference": "Lastdrager, E. E. (2014). Achieving a consensual definition of phishing based on a systematic review of the literature. Crime Science, 3(1), 1\u201310." }, { "reference": "Leukfeldt, E. R. (2014). Phishing for suitable targets in the Netherlands: Routine activity theory and phishing victimization. Cyberpsychology, Behavior, and Social Networking, 17(8), 551\u2013555." }, { "reference": "Leukfeldt, E. R. (2015). Comparing victims of phishing and malware attacks: Unraveling risk factors and possibilities for situational crime prevention. International Journal of Advanced Studies in Computer Science and Engineering, 4(5), 26\u201332." }, { "reference": "Leukfeldt, E. R., Kleemans, E. R. & Stol, W. P. (in press). From low tech locals to high tech specialists: A typology of phishing networks. Crime, Law and Social Change." }, { "reference": "Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis, Deviant Behavior, 37(3), 263\u2013280." }, { "reference": "Milne, S., Sheeran, P., & Orbell, S. (2000). Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory. Journal of Applied Social Psychology, 30(1), 106\u2013143." }, { "reference": "Ngo, F. T. & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5(1), 773\u2013793." }, { "reference": "NVB [Dutch Banking Association] (2013). Position paper rondetafelgesprek online betalingsverkeer: 30 mei 2013 [Position paper on online banking: May 30, 2013].Amsterdam: Nederlandse Vereniging van Banken." }, { "reference": "Pratt, T. C., Holtfreter, K. & Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47(3), 267\u2013296." }, { "reference": "Reyns, B., Henson, B. & Fisher, B. S. (2011). Being pursued online: Applying cyberlifestyle-routine activities theory to cyberstalking victimization. Criminal Justice and Behavior, 38(11), 1149\u20131169." }, { "reference": "Ritchie, J., Lewis, J., McNaughton-Nicholls, C. & Ormston, R. (2014). Qualitative research practice: A guide for social science students & researchers. London, UK: SAGE Publications Ltd." }, { "reference": "Sutton, M. (2009). Product design: CRAVED and VIVA. In B. S. Fisher, & S. P. Lab (eds.), Encyclopedia of Victimology and Crime Prevention. Thousand Oaks: Sage." }, { "reference": "Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. The Journal of Psychology, 91(1), 93\u2013114." }, { "reference": "Vishwanath, A., Herath, T., Chen, R., Wang, J. & Rao, H. R. (2011). Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decision Support Systems, 51(3), 576\u2013586." }, { "reference": "Wilsem van, J. A. (2011a). Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization. European Journal of Criminology, 8(2), 115\u2013127." }, { "reference": "Wilsem van, J. A. (2011b). Bought it, but never got it: Assessing risk factors for online consumer fraud victimization. European Sociologic Review, 29(2),168\u2013178." }, { "reference": "Yar, M. (2005). The novelty of cybercrime: An assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407\u2013427." } ], "related_identifiers": [ { "identifier": "http://cybercrimejournal.com/Jansen&Leukfeldtvol10issue1IJCC2016.pdf", "relation_type": { "id": "issupplementto", "title": { "de": "Erg\u00e4nzt", "en": "Is supplement to" } }, "scheme": "url" } ], "resource_type": { "id": "publication-article", "title": { "de": "Zeitschriftenartikel", "en": "Journal article" } }, "rights": [ { "description": { "en": "" }, "icon": "cc-by-nc-sa-icon", "id": "cc-by-nc-sa-4.0", "props": { "scheme": "spdx", "url": "https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode" }, "title": { "en": "Creative Commons Attribution Non Commercial Share Alike 4.0 International" } } ], "subjects": [ { "subject": "Online Banking Fraud, Phishing, Malware, Customer Behaviour, Protection Motivation Theory, Routine Activity Theory." } ], "title": "Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization" }, "parent": { "access": { "owned_by": { "user": 13663 } }, "communities": { "default": "9dc977ce-8c52-41f6-b0a1-99d351310dd8", "entries": [ { "access": { "member_policy": "open", "members_visibility": "public", "record_policy": "open", "review_policy": "open", "visibility": "public" }, "children": { "allow": false }, "created": "2015-08-02T09:29:30+00:00", "custom_fields": {}, "deletion_status": { "is_deleted": false, "status": "P" }, "id": "9dc977ce-8c52-41f6-b0a1-99d351310dd8", "links": {}, "metadata": { "curation_policy": "", "page": "International Journal of Cyber Criminology (IJCC) is a peer reviewed online (open access) interdisciplinary journal published biannually and devoted to the study of cyber crime, cyber criminal behavior, cyber victims, cyber laws and cyber policy.IJCC will focus on all aspects of cyber/computer crime: Forms of Cyber Crime, Impact of cyber crimes in the real world, Policing Cyber space, International Perspectives of Cyber Crime, developing cyber safety policy, Cyber Victims, Cyber Psychopathology, Geographical aspects of Cyber crime, Cyber offender behavior, cyber crime law, Cyber Pornography, Privacy & Anonymity on the Net, Internet Fraud and Identity Theft, Mobile Phone Safety and policy issues, Online Gambling, Copyright and Intellectual property Law. As the discipline of Cyber Criminology approaches the future, facing the dire need to document the literature in this rapidly changing area has become more important than ever before. The IJCC will be a nodal centre to develop and disseminate the knowledge of cyber crimes to the academic and lay world. The journal publishes theoretical, methodological, and applied papers, as well as book reviews. We do not publish highly technical cyber forensics / digital forensics papers and papers of descriptive / overview nature.
\r\n\r\nhttp://www.cybercrimejournal.com
", "title": "International Journal of Cyber Criminology (ISSN: 0974 \u2013 2891) " }, "revision_id": 0, "slug": "cybercriminologyjournal", "updated": "2016-07-26T09:19:23+00:00" } ], "ids": [ "9dc977ce-8c52-41f6-b0a1-99d351310dd8" ] }, "id": "639182", "pids": { "doi": { "identifier": "", "provider": "legacy" } } }, "pids": { "doi": { "client": "datacite", "identifier": "10.5281/zenodo.58523", "provider": "datacite" }, "oai": { "identifier": "oai:zenodo.org:58523", "provider": "oai" } }, "revision_id": 11, "stats": { "all_versions": { "data_volume": 147526916.0, "downloads": 626, "unique_downloads": 549, "unique_views": 1081, "views": 1163 }, "this_version": { "data_volume": 146348586.0, "downloads": 621, "unique_downloads": 544, "unique_views": 1073, "views": 1154 } }, "status": "published", "updated": "2020-01-20T17:21:18.072976+00:00", "versions": { "index": 1, "is_latest": true } }