CINXE.COM

Cyber Fraud Schemes: Modus Operandi, Tools and Techniques, and the Role of European Legislation as a Defense Strategy

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Cyber Fraud Schemes: Modus Operandi, Tools and Techniques, and the Role of European Legislation as a Defense Strategy</title> <meta name="description" content="Cyber Fraud Schemes: Modus Operandi, Tools and Techniques, and the Role of European Legislation as a Defense Strategy"> <meta name="keywords" content="Business email compromise, cybercrime, European legislation, investment fraud, Network and Information Security, online sales fraud, romance scams."> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <meta name="citation_title" content="Cyber Fraud Schemes: Modus Operandi, Tools and Techniques, and the Role of European Legislation as a Defense Strategy"> <meta name="citation_author" content="Papathanasiou Anastasios"> <meta name="citation_author" content="Liontos George"> <meta name="citation_author" content="Liagkou Vasiliki"> <meta name="citation_author" content="Glavas Euripides"> <meta name="citation_publication_date" content="2024/04/15"> <meta name="citation_journal_title" content="International Journal of Computer and Information Engineering"> <meta name="citation_volume" content="18"> <meta name="citation_issue" content="4"> <meta name="citation_firstpage" content="178"> <meta name="citation_lastpage" content="187"> <meta name="citation_pdf_url" content="https://publications.waset.org/10013594/pdf"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value=""> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 33093</div> </div> </div> </div> <div class="card publication-listing mt-3 mb-3"> <h5 class="card-header" style="font-size:.9rem">Cyber Fraud Schemes: Modus Operandi, Tools and Techniques, and the Role of European Legislation as a Defense Strategy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Papathanasiou%20Anastasios">Papathanasiou Anastasios</a>, <a href="https://publications.waset.org/search?q=Liontos%20George"> Liontos George</a>, <a href="https://publications.waset.org/search?q=Liagkou%20Vasiliki"> Liagkou Vasiliki</a>, <a href="https://publications.waset.org/search?q=Glavas%20Euripides"> Glavas Euripides</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>The purpose of this paper is to describe the growing problem of various cyber fraud schemes that exist on the internet and are currently among the most prevalent. The main focus of this paper is to provide a detailed description of the modus operandi, tools, and techniques utilized in four basic typologies of cyber frauds: Business Email Compromise (BEC) attacks, investment fraud, romance scams, and online sales fraud. The paper aims to shed light on the methods employed by cybercriminals in perpetrating these types of fraud, as well as the strategies they use to deceive and victimize individuals and businesses on the internet. Furthermore, this study outlines defense strategies intended to tackle the issue head-on, with a particular emphasis on the crucial role played by European legislation. European legislation has proactively adapted to the evolving landscape of cyber fraud, striving to enhance cybersecurity awareness, bolster user education, and implement advanced technical controls to mitigate associated risks. The paper evaluates the advantages and innovations brought about by the European legislation while also acknowledging potential flaws that cybercriminals might exploit. As a result, recommendations for refining the legislation are offered in this study in order to better address this pressing issue.</p> <iframe src="https://publications.waset.org/10013594.pdf" style="width:100%; height:400px;" frameborder="0"></iframe> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Business%20email%20compromise" title="Business email compromise">Business email compromise</a>, <a href="https://publications.waset.org/search?q=cybercrime" title=" cybercrime"> cybercrime</a>, <a href="https://publications.waset.org/search?q=European%20legislation" title=" European legislation"> European legislation</a>, <a href="https://publications.waset.org/search?q=investment%20fraud" title=" investment fraud"> investment fraud</a>, <a href="https://publications.waset.org/search?q=Network%20and%20Information%20Security" title=" Network and Information Security"> Network and Information Security</a>, <a href="https://publications.waset.org/search?q=online%20sales%20fraud" title=" online sales fraud"> online sales fraud</a>, <a href="https://publications.waset.org/search?q=romance%20scams." title=" romance scams."> romance scams.</a> </p> <a href="https://publications.waset.org/10013594/cyber-fraud-schemes-modus-operandi-tools-and-techniques-and-the-role-of-european-legislation-as-a-defense-strategy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/10013594/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/10013594/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/10013594/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/10013594/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/10013594/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/10013594/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/10013594/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/10013594/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/10013594/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/10013594/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/10013594.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">200</span> </span> <p class="card-text"><strong>References:</strong></p> <br>[1] Europol, "Internet Organized Crime Assessment (IOCTA)", 2023, Retrieved August 2, 2023, from https://www.europol.europa.eu/cms/sites/default/files/documents/IOCTA%202023%20-%20EN.pdf <br>[2] Al-Musib, Norah, Al-Serhani, Faeiz, Humayun, Mamoona, Jhanjhi, Noor. "Business email compromise (BEC) attacks." Materials Today: Proceedings, vol. 81, 2021, pp. 647. doi: 10.1016/j.matpr.2021.03.647. <br>[3] Arumugam, Nalini, Mohamad, Faizah, Shanthi, Alice, Dharinee, Sai. "A Study on Online Shopping Scams." International Journal of Social Science Research, vol. 10, 2021, pp. 22. doi: 10.5296/ijssr.v10i1.19290. <br>[4] Nomleni, Kristin. "Analysis of The Romance Scam Phenomenon in Interpersonal Communication Love Scammers and Victims."Volume 12, 2023, pp. 202-221. doi: 10.35508/jikom.v12i2.9179. <br>[5] Nomleni, Kristin. (2023). Analysis of The Romance Scam Phenomenon in Interpersonal Communication Love Scammers and Victims. 12. 202-221. 10.35508/jikom.v12i2.9179. <br>[6] Eurojust. "Eurojust Guidelines on How to Prosecute Investment Fraud.", July 2021, Retrieved August 1, 2023, from https://www.eurojust.europa.eu/sites/default/files/assets/eurojust_guidelines_how_to_prosecute_fraud_07_2021.pdf <br>[7] Marguerite Deliema and others. "Profiling Victims of Investment Fraud: Mindsets and Risky Behaviors." Journal of Consumer Research, vol. 46, issue 5, February 2020, pp. 904–914. <br>[8] Fadhil, Hassan. "Social engineering attacks techniques." International Journal of Management Science and Engineering Management, 2023, vol. 3, pp.18-20. <br>[9] Brandão, Nuno. "The right of defence under Regulation (EU) 2018/1805 on the mutual recognition of freezing orders and confiscation orders." New Journal of European Criminal Law, vol. 13, 2022, pp. 203228442210843. doi: 10.1177/20322844221084334. <br>[10] Olber, Paweł. "The European Investigation Order as a mechanism for international cooperation in criminal cases to combat cybercrime." Przegląd Policyjny, vol. 137, 2019, pp. 174-187. doi: 10.5604/01.3001.0014.2406. <br>[11] Geraci, Rosa. "Beyond mutual recognition: the rules of joint investigation teams." Optime, vol. 13, 2022, pp. 29-40. doi: 10.55312/op.v13i2.378. <br>[12] James, Joshua I & Gladyshev, Pavel. (2016). A survey of mutual legal assistance involving digital evidence. Digital Investigation. 18. 10.1016/j.diin.2016.06.004. <br>[13] Cruz, Mario & Laguna, Jessica & Huillcen, Herwin & Vargas, Edgar & Valdivia, Flor. (2021). Implementation of an Information Security Management System Based on the ISO/IEC 27001: 2013 Standard for the Information Technology Division. 10.1007/978-3-030-63665-4_21. <br>[14] Sarma, Dhiman & Hossain, Sohrab & Alam, Wahidul. (2020). Bank Fraud Detection using Community Detection Algorithm. 10.1109/ICIRCA48905.2020.9182954. <br>[15] Aldawood, Hussain, Skinner, Geoff. "Educating and Raising Awareness on Cyber Security Social Engineering: A Literature Review." doi: 10.1109/TALE.2018.8615162. <br>[16] Srokosz, Michal, Bobyk, Andrzej, Ksiezopolski, Bogdan, Wydra, Michał. "Machine-Learning-Based Scoring System for Antifraud CISIRTs in Banking Environment." Electronics, vol. 12, 2023, pp. 251. doi: 10.3390/electronics12010251 <br>[17] Carvalho, J.a.V.; Carvalho, S.; Rocha, A. European Strategy and Legislation for Cybersecurity: Implications for Portugal. Cluster 1060 Computing 2020, 23, 1845–1854. https://doi.org/10.1007/s10586-020-03052-y <br>[18] European Parliament, Cybersecurity in the EU: Overview of challenges and state of play, 2021, Retrieved August 3, 2023, from https://www.europarl.europa.eu/RegData/etudes/BRIE/20 107021/689333/EPRS_BRI(2021)689333_EN.pdf <br>[19] NIS 2: A new directive to strengthen cybersecurity measures in the EU, Retrieved August 14, 2023, from https://strike.sh/blog/NIS2-Directive-Cybersecurity <br>[20] Parliament, E. Directive (EU) 2022/2555 of the European Parliament and of the Council of 21 March 2022 laying down measures 1074for a high common level of cybersecurity across the Union. Official Journal of the European Union 2022, pp. 1–87 </div> </div> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10