IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v19y2017i3d10.1007_s10796-017-9752-4.html
   My bibliography  Save this article

Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests

Author

Listed:
  • Ruochen Liao

    (State University of New York at Buffalo
    Blue Cross Blue Shield of WNY
    University of Texas at San Antonio)

  • Shenaz Balasinorwala

    (State University of New York at Buffalo
    Blue Cross Blue Shield of WNY
    University of Texas at San Antonio)

  • H. Raghav Rao

    (State University of New York at Buffalo
    Blue Cross Blue Shield of WNY
    University of Texas at San Antonio)

Abstract

Previous studies on fighting computer-assisted frauds have attempted to assist law enforcement agencies (LEAs) to better understand important aspects of motivation, opportunity and deterrence. However, there have been few empirical studies on the profiles of convicted offenders, post detection. This paper examines characteristics of frauds and their associated respective law enforcement response with particular emphasis on frauds facilitated by information technology. The findings show how the prosecution and conviction of the offenders differ among commonly-seen types of computer assisted frauds, and bring new evidence to the common association of gender and crime, severity and punishment, etc. The findings may help LEAs and legislative bodies to evaluate their current practices from the point of restorative social justice.

Suggested Citation

  • Ruochen Liao & Shenaz Balasinorwala & H. Raghav Rao, 2017. "Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests," Information Systems Frontiers, Springer, vol. 19(3), pages 443-455, June.
  • Handle: RePEc:spr:infosf:v:19:y:2017:i:3:d:10.1007_s10796-017-9752-4
    DOI: 10.1007/s10796-017-9752-4
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-017-9752-4
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-017-9752-4?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Petter Gottschalk, 2010. "Knowledge management technology for organized crime risk assessment," Information Systems Frontiers, Springer, vol. 12(3), pages 267-275, July.
    2. Neilson, William S. & Winter, Harold, 1997. "On criminals' risk attitudes," Economics Letters, Elsevier, vol. 55(1), pages 97-102, August.
    3. Daniel S. Soper & Haluk Demirkan & Michael Goul, 2007. "An interorganizational knowledge-sharing security model with breach propagation detection," Information Systems Frontiers, Springer, vol. 9(5), pages 469-479, November.
    4. John D’Arcy & Anat Hovav, 2009. "Does One Size Fit All? Examining the Differential Effects of IS Security Countermeasures," Journal of Business Ethics, Springer, vol. 89(1), pages 59-71, May.
    5. Moon, Byongook & McCluskey, John D. & McCluskey, Cynthia Perez, 2010. "A general theory of crime and computer crime: An empirical test," Journal of Criminal Justice, Elsevier, vol. 38(4), pages 767-772, July.
    6. Susan W. Brenner, 2004. "U.S. Cybercrime Law: Defining Offenses," Information Systems Frontiers, Springer, vol. 6(2), pages 115-132, June.
    7. King, Gary & Zeng, Langche, 2001. "Logistic Regression in Rare Events Data," Political Analysis, Cambridge University Press, vol. 9(2), pages 137-163, January.
    8. Fariborz Farahmand & Eugene H. Spafford, 2013. "Understanding insiders: An analysis of risk-taking behavior," Information Systems Frontiers, Springer, vol. 15(1), pages 5-15, March.
    9. Mark Chan & Irene Woon & Atreyi Kankanhalli, 2005. "Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior," Journal of Information Privacy and Security, Taylor & Francis Journals, vol. 1(3), pages 18-41, July.
    10. Jiexun Li & G. Alan Wang & Hsinchun Chen, 2011. "Identity matching using personal and social identity features," Information Systems Frontiers, Springer, vol. 13(1), pages 101-113, March.
    11. Burns, Ronald G. & Whitworth, Keith H. & Thompson, Carol Y., 2004. "Assessing law enforcement preparedness to address Internet fraud," Journal of Criminal Justice, Elsevier, vol. 32(5), pages 477-493.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Jin Li & Wei Xiao & Chong Zhang, 2023. "Data security crisis in universities: identification of key factors affecting data breach incidents," Palgrave Communications, Palgrave Macmillan, vol. 10(1), pages 1-18, December.
    2. Xiongfei Cao & Ali Nawaz Khan & Ahsan Ali & Naseer Abbas Khan, 2020. "Consequences of Cyberbullying and Social Overload while Using SNSs: A Study of Users’ Discontinuous Usage Behavior in SNSs," Information Systems Frontiers, Springer, vol. 22(6), pages 1343-1356, December.
    3. Martin Offei & Francis Kofi Andoh-Baidoo & Emmanuel W. Ayaburi & David Asamoah, 2022. "How Do Individuals Justify and Rationalize their Criminal Behaviors in Online Romance Fraud?," Information Systems Frontiers, Springer, vol. 24(2), pages 475-491, April.
    4. Rajan, Rishabh & Rana, Nripendra P. & Parameswar, Nakul & Dhir, Sanjay & Sushil, & Dwivedi, Yogesh K., 2021. "Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management," Technological Forecasting and Social Change, Elsevier, vol. 170(C).
    5. Xiongfei Cao & Ali Nawaz Khan & Ahsan Ali & Naseer Abbas Khan, 0. "Consequences of Cyberbullying and Social Overload while Using SNSs: A Study of Users’ Discontinuous Usage Behavior in SNSs," Information Systems Frontiers, Springer, vol. 0, pages 1-14.
    6. Douglas Cumming & Sofia Johan & Denis Schweizer, 2017. "Information systems, agency problems, and fraud," Information Systems Frontiers, Springer, vol. 19(3), pages 421-424, June.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
    2. Chang-Gyu Yang & Hee-Jun Lee, 2016. "A study on the antecedents of healthcare information protection intention," Information Systems Frontiers, Springer, vol. 18(2), pages 253-263, April.
    3. Foreman-Peck, James & Moore, Simon C., 2010. "Gratuitous violence and the rational offender model," International Review of Law and Economics, Elsevier, vol. 30(2), pages 160-172, June.
    4. Angel M. Morales & Patrick Tarwater & Indika Mallawaarachchi & Alok Kumar Dwivedi & Juan B. Figueroa-Casas, 2015. "Multinomial logistic regression approach for the evaluation of binary diagnostic test in medical research," Statistics in Transition new series, Główny Urząd Statystyczny (Polska), vol. 16(2), pages 203-222, June.
    5. F. Gauthier & D. Germain & B. Hétu, 2017. "Logistic models as a forecasting tool for snow avalanches in a cold maritime climate: northern Gaspésie, Québec, Canada," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 89(1), pages 201-232, October.
    6. Douglas Cumming & Lars Hornuf & Moein Karami & Denis Schweizer, 2023. "Disentangling Crowdfunding from Fraudfunding," Journal of Business Ethics, Springer, vol. 182(4), pages 1103-1128, February.
    7. Eunae Yoo & Elliot Rabinovich & Bin Gu, 2020. "The Growth of Follower Networks on Social Media Platforms for Humanitarian Operations," Production and Operations Management, Production and Operations Management Society, vol. 29(12), pages 2696-2715, December.
    8. Cemal Eren Arbath & Quamral H. Ashraf & Oded Galor & Marc Klemp, 2018. "Diversity and Conflict," Working Papers 2018-6, Brown University, Department of Economics.
    9. Lo Turco, Alessia & Maggioni, Daniela, 2018. "Effects of Islamic religiosity on bilateral trust in trade: The case of Turkish exports," Journal of Comparative Economics, Elsevier, vol. 46(4), pages 947-965.
    10. Matija Kovacic & Claudio Zoli, 2021. "Ethnic distribution, effective power and conflict," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 57(2), pages 257-299, August.
    11. Blackman, Allen & Guerrero, Santiago, 2012. "What drives voluntary eco-certification in Mexico?," Journal of Comparative Economics, Elsevier, vol. 40(2), pages 256-268.
    12. Jacob Ausderan, 2018. "Reassessing the democratic advantage in interstate wars using k-adic datasets," Conflict Management and Peace Science, Peace Science Society (International), vol. 35(5), pages 451-473, September.
    13. Paul Poast, 2013. "Issue linkage and international cooperation: An empirical investigation," Conflict Management and Peace Science, Peace Science Society (International), vol. 30(3), pages 286-303, July.
    14. Yerko Rojas, 2017. "Evictions and short-term all-cause mortality: a 3-year follow-up study of a middle-aged Swedish population," International Journal of Public Health, Springer;Swiss School of Public Health (SSPH+), vol. 62(3), pages 343-351, April.
    15. Mehrez Ben Slama & Dhafer Saidane & Hassouna Fedhila, 2012. "How to identify targets in the M&A banking operations? Case of cross-border strategies in Europe by line of activity," Review of Quantitative Finance and Accounting, Springer, vol. 38(2), pages 209-240, February.
    16. Marcin Chlebus, 2014. "One-day prediction of state of turbulence for financial instrument based on models for binary dependent variable," Ekonomia journal, Faculty of Economic Sciences, University of Warsaw, vol. 37.
    17. Lorenzo Cassi & Anne Plunket, 2014. "Proximity, network formation and inventive performance: in search of the proximity paradox," The Annals of Regional Science, Springer;Western Regional Science Association, vol. 53(2), pages 395-422, September.
    18. Hoon S. Choi & Darrell Carpenter & Myung S. Ko, 2022. "Risk Taking Behaviors Using Public Wi-Fi™," Information Systems Frontiers, Springer, vol. 24(3), pages 965-982, June.
    19. Trent Geisler & Herman Ray & Ying Xie, 2023. "Finding the Proverbial Needle: Improving Minority Class Identification Under Extreme Class Imbalance," Journal of Classification, Springer;The Classification Society, vol. 40(1), pages 192-212, April.
    20. Wegenast, Tim, 2013. "The Impact of Fuel Ownership on Intrastate Violence," GIGA Working Papers 225, GIGA German Institute of Global and Area Studies.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:19:y:2017:i:3:d:10.1007_s10796-017-9752-4. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.