Mark Button
YOU?
Author Swipe
View article: Nigerian confraternities and mass cross-border fraud
Nigerian confraternities and mass cross-border fraud Open
Nigeria is well-known for its significant problem with criminal actors who commit industrial-scale online fraud and related crimes, predominantly targeting foreign nationals and businesses. However, the structures and characteristics of th…
View article: Factors Influencing Involvement in Cyber-Frauds in West Africa and the Implications for Policy
Factors Influencing Involvement in Cyber-Frauds in West Africa and the Implications for Policy Open
Cyber-frauds and scams have become a major problem in the Global North, and there is evidence that a significant volume of it emanates from West African countries, such as Nigeria and Ghana. This paper offers rare and original insights int…
View article: Economic espionage via fake social media profiles in the UK: professional workers awareness and resilience
Economic espionage via fake social media profiles in the UK: professional workers awareness and resilience Open
This paper explores the use of fake social media accounts for economic espionage. It focuses solely on the first step of the recruitment process, the link requests. There has been very little research on economic espionage and none on the …
View article: Fear of fraud amongst older adults: a hidden epidemic?
Fear of fraud amongst older adults: a hidden epidemic? Open
This paper explores older adults who are largely over 75 and their experience of fraud, based upon research with the clients of a UK charity working with this age group. The researchers used a postal questionnaire yielding almost 2000 resp…
View article: The profile and detection of bribery in South Korea
The profile and detection of bribery in South Korea Open
Bribery, including its various forms such as political contributions and gift-giving in return for favourable treatment in government tenders, present a challenge for law enforcement authorities around the world. While bribery undermines t…
View article: Strategic business movements? The migration of online romance fraudsters from Nigeria to Ghana
Strategic business movements? The migration of online romance fraudsters from Nigeria to Ghana Open
This study used an emic approach to examine the dynamics of online romance fraud, focusing on the migration of offenders from Nigeria to Ghana. We collected data through qualitative methods, such as semi-structured interviews and focus gro…
View article: Policing cross-border fraud ‘Above and below the surface’: mapping actions and developing a more effective global response
Policing cross-border fraud ‘Above and below the surface’: mapping actions and developing a more effective global response Open
Cross-border fraud, including its various forms such as online retail fraud, pyramid schemes, romance fraud and pig butchering, is a major problem around the world. Despite clear evidence that cross-border fraud is growing, there is little…
View article: An exploratory study of victimisation and near misses in online shopping fraud
An exploratory study of victimisation and near misses in online shopping fraud Open
The internet has revolutionised retail sales, with online shopping a common practice globally. While convenient, offenders have also embraced the opportunity to target potential victims and their shopping carts. Online shopping fraud occur…
View article: Disseminating fraud awareness and prevention advice to older adults: perspectives on the most effective means of delivery
Disseminating fraud awareness and prevention advice to older adults: perspectives on the most effective means of delivery Open
Raising awareness to combat scams has become a central strategy of fraud/scam prevention. Using data from a wider evaluation of a targeted campaign to improve fraud prevention and awareness for older adults predominantly over 75, this pape…
View article: The technification of domestic abuse: Methods, tools and criminal justice responses
The technification of domestic abuse: Methods, tools and criminal justice responses Open
Methods of domestic abuse are progressively incorporating computer misuse and other related online offences and digital tools, escalating opportunities for perpetrators to monitor, threaten and humiliate their victims. Drawing on empirical…
View article: The dishonest disposition and everyday economic criminality of the British public
The dishonest disposition and everyday economic criminality of the British public Open
This paper is concerned with the everyday economic crimes of ordinary people. Although dishonesty is a core characteristic of these offences, we are not aware of any prior research that examines the direct, relationship between dishonest a…
View article: Fear and phoning: Telephones, fraud, and older adults in the UK
Fear and phoning: Telephones, fraud, and older adults in the UK Open
This study explores the experiences of attempted frauds and victimisation which use largely telephone-based means of communication on predominantly over 75s in the United Kingdom. Using a postal survey targeted at the clients of a charity …
View article: Preventing fraud victimisation against older adults: Towards a holistic model for protection
Preventing fraud victimisation against older adults: Towards a holistic model for protection Open
The prevention of fraud against older adults and other age groups, has been the subject of limited research with very few systematic attempts to map different tools and strategies that are used. This paper using the UK and South Korea as a…
View article: Working with the Private Security Industry to Enhance Public Policing
Working with the Private Security Industry to Enhance Public Policing Open
-
View article: What really works in preventing fraud against organisations and do decision-makers really need to know?
What really works in preventing fraud against organisations and do decision-makers really need to know? Open
An evidence base of what works using high-quality evaluations in tackling societal problems has become the norm in many spheres, including tackling traditional crime. Yet, as we show in the example of fraud faced by organisations, high-qua…
View article: The Cost of Food Crime Phase 2 - Project Brief and Deliverables
The Cost of Food Crime Phase 2 - Project Brief and Deliverables Open
This research – Phase 2 – will draw on findings and outputs from Phase 1, Cox et al. (2020)(footnote 1). The aim for phase 2 will be to build on Phase 1 using its outputs and methods to produce monetised estimates pertaining to the cost of…
View article: The Impact of Deviant Social Media Influencers and Consumer Characteristics on Purchasing Counterfeit Goods
The Impact of Deviant Social Media Influencers and Consumer Characteristics on Purchasing Counterfeit Goods Open
Product counterfeiting is a large and global economic crime that causes significant economic, social and personal harms. Facilitated by the efficiency and convenience of e-commerce, finding and buying counterfeits have never been easier. G…
View article: Understanding the rise of fraud in England and Wales through field theory: Blip or flip?
Understanding the rise of fraud in England and Wales through field theory: Blip or flip? Open
There is a debate at the highest levels of government and civil society over whether the rise in fraud is a blip exacerbated by the pandemic or a more fundamental transformation (or flip) in the structure of crime. This paper examines this…
View article: Non-Ideal Victims or Offenders? The Curious Case of Pyramid Scheme Participants
Non-Ideal Victims or Offenders? The Curious Case of Pyramid Scheme Participants Open
Pyramid schemes, including their various forms such as chain letters and illegal forms of multi-level marketing, harm people that are often far from ideal victims. While many lose cash and suffer emotional, health, and other harms; victims…
View article: Advantageous comparison: using Twitter responses to understand similarities between cybercriminals (“Yahoo Boys”) and politicians (“Yahoo men”)
Advantageous comparison: using Twitter responses to understand similarities between cybercriminals (“Yahoo Boys”) and politicians (“Yahoo men”) Open
This article is about the manifestations of similarities between two seemingly distinct groups of Nigerians: cybercriminals and politicians. Which linguistic strategies do Twitter users use to express their opinions on cybercriminals and p…
View article: “I Have Only Checked after the Event”: Consumer Approaches to Safe Online Shopping
“I Have Only Checked after the Event”: Consumer Approaches to Safe Online Shopping Open
Online shopping has now become very common, with consumers increasingly opting to purchase products on the World Wide Web instead of visiting traditional "bricks and mortar" stores, particularly during the COVID-19 pandemic. This has, howe…
View article: Exploring the value of feminist theory in understanding digital crimes: Gender and cybercrime types
Exploring the value of feminist theory in understanding digital crimes: Gender and cybercrime types Open
Do men and women perceive cybercrime types differently? This article draws on the distinction between socio‐economic and psychosocial cybercrime proposed by Lazarus (2019) to investigate whether men and women hold different perceptions of …