A Reurink - Journal of Economic Surveys, 2018 - Wiley Online Library
This paper describes the empirical universe of financial fraud as it has been documented in the academic literature. Specifically, it describes the different forms of fraudulent behaviour …
F Wang, X Zhou - Victims & Offenders, 2023 - Taylor & Francis
ABSTRACT Sha Zhu Pan (杀猪盘, Pig-Butchering scam) is a new online romance scam targeting mainly Chinese-speaking individuals. While a few studies in Chinese have paid …
Choice architecture tools, commonly known as nudges, powerfully impact decisions and can improve welfare. Yet it is unclear who is most impacted by nudges. If nudge effects are …
A Khare, R Jain - Journal of Business Research, 2022 - Elsevier
Consumer vulnerability (CV) has evolved into an important management research field over the past two decades. The CV field (hereafter, the field) merits evaluation of its present state …
Consumer vulnerability is a sometimes misunderstood or misused concept that is equated erroneously with demographic characteristics, stigmatization, consumer protection, unmet …
Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale …
Routine activity theory predicts that changes in legitimate opportunity structures (eg, technology) can increase the convergence of motivated offenders and suitable targets in the …
Research problem: Phishing is an email-based scam where a perpetrator camouflages emails to appear as a legitimate request for personal and sensitive information. Research …
Scams and other malicious attempts to influence people are continuing to proliferate across the globe, aided by the availability of technology that makes it increasingly easy to create …