IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v19y2017i3d10.1007_s10796-017-9752-4.html
   My bibliography  Save this article

Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests

Author

Listed:
  • Ruochen Liao

    (State University of New York at Buffalo
    Blue Cross Blue Shield of WNY
    University of Texas at San Antonio)

  • Shenaz Balasinorwala

    (State University of New York at Buffalo
    Blue Cross Blue Shield of WNY
    University of Texas at San Antonio)

  • H. Raghav Rao

    (State University of New York at Buffalo
    Blue Cross Blue Shield of WNY
    University of Texas at San Antonio)

Abstract

Previous studies on fighting computer-assisted frauds have attempted to assist law enforcement agencies (LEAs) to better understand important aspects of motivation, opportunity and deterrence. However, there have been few empirical studies on the profiles of convicted offenders, post detection. This paper examines characteristics of frauds and their associated respective law enforcement response with particular emphasis on frauds facilitated by information technology. The findings show how the prosecution and conviction of the offenders differ among commonly-seen types of computer assisted frauds, and bring new evidence to the common association of gender and crime, severity and punishment, etc. The findings may help LEAs and legislative bodies to evaluate their current practices from the point of restorative social justice.

Suggested Citation

  • Ruochen Liao & Shenaz Balasinorwala & H. Raghav Rao, 2017. "Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests," Information Systems Frontiers, Springer, vol. 19(3), pages 443-455, June.
  • Handle: RePEc:spr:infosf:v:19:y:2017:i:3:d:10.1007_s10796-017-9752-4
    DOI: 10.1007/s10796-017-9752-4
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-017-9752-4
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-017-9752-4?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Petter Gottschalk, 2010. "Knowledge management technology for organized crime risk assessment," Information Systems Frontiers, Springer, vol. 12(3), pages 267-275, July.
    2. Daniel S. Soper & Haluk Demirkan & Michael Goul, 2007. "An interorganizational knowledge-sharing security model with breach propagation detection," Information Systems Frontiers, Springer, vol. 9(5), pages 469-479, November.
    3. John D’Arcy & Anat Hovav, 2009. "Does One Size Fit All? Examining the Differential Effects of IS Security Countermeasures," Journal of Business Ethics, Springer, vol. 89(1), pages 59-71, May.
    4. Moon, Byongook & McCluskey, John D. & McCluskey, Cynthia Perez, 2010. "A general theory of crime and computer crime: An empirical test," Journal of Criminal Justice, Elsevier, vol. 38(4), pages 767-772, July.
    5. Susan W. Brenner, 2004. "U.S. Cybercrime Law: Defining Offenses," Information Systems Frontiers, Springer, vol. 6(2), pages 115-132, June.
    6. King, Gary & Zeng, Langche, 2001. "Logistic Regression in Rare Events Data," Political Analysis, Cambridge University Press, vol. 9(2), pages 137-163, January.
    7. Fariborz Farahmand & Eugene H. Spafford, 2013. "Understanding insiders: An analysis of risk-taking behavior," Information Systems Frontiers, Springer, vol. 15(1), pages 5-15, March.
    8. Neilson, William S. & Winter, Harold, 1997. "On criminals' risk attitudes," Economics Letters, Elsevier, vol. 55(1), pages 97-102, August.
    9. Mark Chan & Irene Woon & Atreyi Kankanhalli, 2005. "Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior," Journal of Information Privacy and Security, Taylor & Francis Journals, vol. 1(3), pages 18-41, July.
    10. Jiexun Li & G. Alan Wang & Hsinchun Chen, 2011. "Identity matching using personal and social identity features," Information Systems Frontiers, Springer, vol. 13(1), pages 101-113, March.
    11. Burns, Ronald G. & Whitworth, Keith H. & Thompson, Carol Y., 2004. "Assessing law enforcement preparedness to address Internet fraud," Journal of Criminal Justice, Elsevier, vol. 32(5), pages 477-493.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Jin Li & Wei Xiao & Chong Zhang, 2023. "Data security crisis in universities: identification of key factors affecting data breach incidents," Palgrave Communications, Palgrave Macmillan, vol. 10(1), pages 1-18, December.
    2. Douglas Cumming & Sofia Johan & Denis Schweizer, 2017. "Information systems, agency problems, and fraud," Information Systems Frontiers, Springer, vol. 19(3), pages 421-424, June.
    3. Xiongfei Cao & Ali Nawaz Khan & Ahsan Ali & Naseer Abbas Khan, 2020. "Consequences of Cyberbullying and Social Overload while Using SNSs: A Study of Users’ Discontinuous Usage Behavior in SNSs," Information Systems Frontiers, Springer, vol. 22(6), pages 1343-1356, December.
    4. Martin Offei & Francis Kofi Andoh-Baidoo & Emmanuel W. Ayaburi & David Asamoah, 2022. "How Do Individuals Justify and Rationalize their Criminal Behaviors in Online Romance Fraud?," Information Systems Frontiers, Springer, vol. 24(2), pages 475-491, April.
    5. Rajan, Rishabh & Rana, Nripendra P. & Parameswar, Nakul & Dhir, Sanjay & Sushil, & Dwivedi, Yogesh K., 2021. "Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management," Technological Forecasting and Social Change, Elsevier, vol. 170(C).
    6. Xiongfei Cao & Ali Nawaz Khan & Ahsan Ali & Naseer Abbas Khan, 0. "Consequences of Cyberbullying and Social Overload while Using SNSs: A Study of Users’ Discontinuous Usage Behavior in SNSs," Information Systems Frontiers, Springer, vol. 0, pages 1-14.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
    2. Chang-Gyu Yang & Hee-Jun Lee, 2016. "A study on the antecedents of healthcare information protection intention," Information Systems Frontiers, Springer, vol. 18(2), pages 253-263, April.
    3. Foreman-Peck, James & Moore, Simon C., 2010. "Gratuitous violence and the rational offender model," International Review of Law and Economics, Elsevier, vol. 30(2), pages 160-172, June.
    4. F. Gauthier & D. Germain & B. Hétu, 2017. "Logistic models as a forecasting tool for snow avalanches in a cold maritime climate: northern Gaspésie, Québec, Canada," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 89(1), pages 201-232, October.
    5. Douglas Cumming & Lars Hornuf & Moein Karami & Denis Schweizer, 2023. "Disentangling Crowdfunding from Fraudfunding," Journal of Business Ethics, Springer, vol. 182(4), pages 1103-1128, February.
    6. Eunae Yoo & Elliot Rabinovich & Bin Gu, 2020. "The Growth of Follower Networks on Social Media Platforms for Humanitarian Operations," Production and Operations Management, Production and Operations Management Society, vol. 29(12), pages 2696-2715, December.
    7. Lo Turco, Alessia & Maggioni, Daniela, 2018. "Effects of Islamic religiosity on bilateral trust in trade: The case of Turkish exports," Journal of Comparative Economics, Elsevier, vol. 46(4), pages 947-965.
    8. Blackman, Allen & Guerrero, Santiago, 2012. "What drives voluntary eco-certification in Mexico?," Journal of Comparative Economics, Elsevier, vol. 40(2), pages 256-268.
    9. Mehrez Ben Slama & Dhafer Saidane & Hassouna Fedhila, 2012. "How to identify targets in the M&A banking operations? Case of cross-border strategies in Europe by line of activity," Review of Quantitative Finance and Accounting, Springer, vol. 38(2), pages 209-240, February.
    10. Lorenzo Cassi & Anne Plunket, 2014. "Proximity, network formation and inventive performance: in search of the proximity paradox," The Annals of Regional Science, Springer;Western Regional Science Association, vol. 53(2), pages 395-422, September.
    11. Xinfu Xing & Chenglong Wu & Jinhui Li & Xueyou Li & Limin Zhang & Rongjie He, 2021. "Susceptibility assessment for rainfall-induced landslides using a revised logistic regression method," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 106(1), pages 97-117, March.
    12. Hwang, Seokyoun & Sarath, Bharat & Han, Seung-youb, 2022. "Auditor independence: The effect of auditors’ quality control efforts and corporate governance," Journal of International Accounting, Auditing and Taxation, Elsevier, vol. 47(C).
    13. Lahiri, Kajal & Yang, Liu, 2013. "Forecasting Binary Outcomes," Handbook of Economic Forecasting, in: G. Elliott & C. Granger & A. Timmermann (ed.), Handbook of Economic Forecasting, edition 1, volume 2, chapter 0, pages 1025-1106, Elsevier.
    14. Eling, Martin & Jia, Ruo, 2018. "Business failure, efficiency, and volatility: Evidence from the European insurance industry," International Review of Financial Analysis, Elsevier, vol. 59(C), pages 58-76.
    15. Andrews, RJ & Fazio, Catherine & Guzman, Jorge & Liu, Yupeng & Stern, Scott, 2022. "The Startup Cartography Project: Measuring and mapping entrepreneurial ecosystems," Research Policy, Elsevier, vol. 51(2).
    16. Tom Broekel & Wladimir Mueller, 2018. "Critical links in knowledge networks – What about proximities and gatekeeper organisations?," Industry and Innovation, Taylor & Francis Journals, vol. 25(10), pages 919-939, November.
    17. Valérie Revest & Alessandro Sapio, 2016. "Graduation and sell-out strategies in the Alternative Investment Market," Discussion Papers 4_2016, CRISEI, University of Naples "Parthenope", Italy.
    18. Andy Lardon & Marc Deloof, 2014. "Financial disclosure by SMEs listed on a semi-regulated market: evidence from the Euronext Free Market," Small Business Economics, Springer, vol. 42(2), pages 361-385, February.
    19. Sarlin, Peter & von Schweinitz, Gregor, 2021. "Optimizing Policymakers’ Loss Functions In Crisis Prediction: Before, Within Or After?," Macroeconomic Dynamics, Cambridge University Press, vol. 25(1), pages 100-123, January.
    20. Paul Collier & Anke Hoeffler, 2004. "Greed and grievance in civil war," Oxford Economic Papers, Oxford University Press, vol. 56(4), pages 563-595, October.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:19:y:2017:i:3:d:10.1007_s10796-017-9752-4. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.