Preview

Descriptive Data Mining on Fraudulent Online Dating Profiles

Best Essays
Open Document
Open Document
5113 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Descriptive Data Mining on Fraudulent Online Dating Profiles
DESCRIPTIVE DATA MINING ON FRAUDULENT ONLINE DATING PROFILES
Pan, Jinjian A., The University of New South Wales, School of Information Systems Technology and Management, Sydney, NSW 2052, jinjian.pan@cba.com.au Winchester, Donald, The University of New South Wales, School of Information Systems Technology and Management, Sydney, NSW 2052 d.winchester@unsw.edu.au Land, Lesley, The University of New South Wales, School of Information Systems Technology and Management, Sydney, NSW 2052, l.land@unsw.edu.au Watters, Paul, The University of Ballarat, Graduate School of Information Technology and Mathematical Sciences, Ballarat, VIC 3353, p.watters@ballarat.edu.au

Abstract
The increasing ease of access to the World Wide Web and email harvesting tools has enabled spammers to target a wider audience. The problem is where scams are widely encountered in day to day environment to individuals from all walks of life and result in millions of dollars in financial loss as well as emotional trauma (Newman 2005). This paper aims to analyse and examine the structure of Romance Fraud, in a bid to understand and detect Romance Fraud profiles. We focus on scams that utilise the medium of dating websites. The primary indicators of Romance Fraud identified in the literature include social factors, scam characteristics and content. The approach followed is informed by interpretivist and quantitative research perspectives. From this understanding, Romance Fraud can be viewed as a methodical attempt by scammers to penetrate their victims’ defences by impersonating someone else or creating an avatar (fictitious identity). A quantitative approach was undertaken in order to extract reflective, informative and rich data (Neuman 2003). The research methodology incorporating Knowledge Discovery from an existing proprietary online dating database was adopted to provide the foundation for this research (PiatetskyShapiro 1996). Keywords: Romance Scams in Online Dating, Information Systems



References: Agarwal, R. and Karahanna, E. (2000). Time Flies When You 're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage. Management Information Systems Quarterly, 24, 665-692. Amber Stabek, S. B., and Watters, P. A. (2009). the Case for a Consistant Cyberscam Classification Framework. Internet Commerce Security Laboratory. ARIN (2009). ARIN: WHOIS Database Search Retrieved 20th Oct 2009 from ws.arin.net/ Arnold, B. (2008). The 419 scam: basis, statistics, regulation. Caslon Analytics [Online]. Available: http://www.caslon.com.au/419scamnote.htm#statistics. Bishop, J. (2008). Understanding and facilitating the development of social networks in online dating communities: A case study and model. Social Networking communities and eDating Services. Bolton, R. J. (2002). Unsupervised Profiling Methods for Fraud Detection. Statistical Science, 17, 235-255. Bonchi, E. F., Malin, B., and Jiang, W. (2008). PinKDD '08: Privacy, Security, and Trust in KDD: Post-Workshop Report. SIGKDD Explorations 2008, 10, 66-67. Dixon, R. (2005). I will eat your Dollars. Los Angeles Times [Online]. Available: http://web.archive.org/web/20051029165224/http://news.yahoo.com/s/latimests/20051020/ts_latim es/iwilleatyourdollars. Ellison, N., and Gibbs, J. (2006). Managing Impressions Online: Self Presentation in the Online Dating Environment. Journal of Computer Mediated Communication, 11. FDIC. (2009). Fraud Alert. Teller Vision. April. Feliciano, C., Robnett, B., and Komaie, G. (2009). Gendered racial exclusion among white Internet daters. Social Science Research, 38, 41-56. Ferreyra-Orozo, G. (2008). A Culture of Corruption: Everyday Deception and Popular Discontent in Nigeria. American Anthropologist, 110, 145-146. Gill, J. O. (2003). Perception of email personality at zero-acquaintance: Extroversion takes care of itself; Neuroticism is a worry. Proceedings of the 25th annual conference of the cognitive science society. GMI. (2006). Logging in for love -global survey shows popularity & pitfalls of love online. Han, J. W., Altman, R. B., Kumar, V., Mannila, H. and Pregibon, D. (2002). Emerging scientific applications in data mining. Communications of the ACM, 45, 54-58. Hancock, J. T., and Ellison, N. (2007). The Truth about lying in Online Dating Profiles. Proceedings of the ACM Conference on Human Factors in Computing Systems, 449-452. Henderson, L. (2009). Nigerian Romance Scams [Online]. Available: http://www.crimes-ofpersuasion.com/Nigerian/nigerian-romance-scams.htm [Accessed]. Hitchcock, J. A. (2009). To Scam or Not to Scam, Information Today Inc. Horning, A. (2007). Examining Personal Ads and Job Ads. In: WHITTY, M. T., and Inman, J. A. (ed.) Online M@tchmaking. London: Palgrave Macmillian. Jamieson, R J., Winchester, D W., Stephens, G., Smith, S., (2008). Developing a Conceptual Framework for Identity Fraud Profiling. Proceedings of the 16th European Conference on Information Systems at the J.E. Cairnes Graduate School of Business & Public Policy, National University of Ireland, Galway, Ireland, 9-11 June, 12 pages. Jerving, J. (2007). You 've Got Mail--And You May Be Rich: The Nigerian 419 Scam Keeps Going. [Online]. Available: [Accessed 11(43)]. Levitz, J. and Stecklow, S. (2008). Credit Crunch Fuels Rise in 'Advance Fee ' Schemes. Wall Street Journal - Eastern Edition [Online], 252. Available: http://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=33124196&site=ehost-live. Mannila, H. (2002). Combining pattern discovery and probabilistic modeling in data mining. In: PENTTONEN, M. & SCHMIDT, E. M., eds., Jul 03-05 2002 Turku, Finland. Springer-Verlag Berlin, 10-19. Mierswa, M. W., Klingkenberg, R., Scholz, M., and Euler, T. (2009). RapidMiner 4.3 Tutorial. Mierswa, I., Wurst, M., Klinkenberg, R, Scholz, M., and Euler, T. (2006). YALE: Rapid Prototyping for Complex Data Mining Tasks. Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD-06), August, 935--940. Morris, J. L. S. (ed.) 2001. Online and Personal: The reality of Internet relationships, Sydney: Finch Publishing Mykola Pechenizkiy, S. P., Alexey Tsymbal (1998). On the Use of Information Systems Research Methods in Data Mining. Information Systems Development: Advances in Theory, Practise and Education. Neuman, W. L. (2003). Social Research Methods: Qualitative and Quantitative Approaches, Allyn and Bacon. Newman, G. R. (2005). Identity Theft Literature Review. In: Justice, U. D. O. (ed.). Park, Y. J., Choi, E., and Park, S. H. (2009). Two-step filtering datamining method integrating casebased reasoning and rule induction. Expert Systems with Applications, 36, 861-871. Piatetsky-Shapiro, G., Smyth, P and Uthurusamy, R. (1994). KDD-93:Progress and Challenges in Knowledge Discovery in Databases. AI Magazine, 15. Piatetsky-Shapiro, G., and Smyth, P. (1996). From Data Mining to Knowledge Discovery in Databases. American Association for Artificial Intelligence. Silberstein, L. (2009). e Love scams [Online]. Available: http://www.elovedeceptions.com/ [Accessed]. Silberschatz, A. T. (1995). On Subjective Measures of Interestingness in Knowledge Discovery. Proceedings of the First International Conference on AAAI. Silberschatz, A. T. (1996). What makes patterns interesting in Knowledge Discovery systems. IEEE Transactions on Knowledge and Data Engineering. Smith, A. (2009). Nigerian Scam E-mails and the Charms of Capital. Cultural Studies, 23, 27-47. Smith, S., Winchester, D., Bunker, D., and Jamieson, R. (2010). Circuits of Power: A Study of Mandated Compliance to an Information Systems Security De Jure Standard in a Government Organization, MIS Quarterly, forthcoming. Stephure, R. J., Boon, S. D., MacKinnon, S. L., and Deveau, V. L. (2009). Internet Initiated Relationships: Associations Between Age and Involvement in Online Dating. Journal of ComputerMediated Communication, 14, 658–681. The Cheshire Cat (2005) The Ethics of Scambaiting. 419 eater [Online]. Available: http://www.419eater.com/html/ethics.htm. USA, D. O. S. (2008). 419 scams. In: USA, D. O. S. (ed.). Usama Fayyad, G. P.-S., Padhraic Smyth (1996). From Data Mining to Knowledge Discovery in Databases. American Association for Artificial Intelligence. Wayne. (2009a). About Romance Scams [Online]. Available: http://www.romancescam.com/about.htm ; http://www.datingnmore.com/fraud/scam_operate.htm [Accessed]. Wayne. (2009b). Romance Scammers List (my blog): Lohotron. Wayne. Whitty, M. T. (2007). The art of selling one 's 'self ' on an oline dating site: the BAR Approach. In: Whitty, M. T., and Inman, J. A. (ed.) Online M@tchmaking. London: Palgrave Macmillian. Wizard, B. (2001). Nigeria - The 419 Coalition Website: We Fight the Nigerian Scam with Education. Available: http://home.rica.net/alphae/419coal/. Zhang, H., Yen, J., and Foley, H. (2008). SNAKDD 2008 -Social Network Mining and Analysis: Post Workshop Report. SIGKDD Explorations 2008, 10, 74-77. Zhou, B., Pei, J., and Luk, W-S. (2008). A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data. SIGKDD Explorations 2008, 10, 12-22.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Some of this surveillance focuses in credit card fraud and identities theft. Marketing companies main job now days is to create profiles from our own information. Then they develop better sales or pitches.” Consumer profiling” is the method of selling that has generated high levels of revenues for these companies. Facebook partner with Bacon, allowing Facebook to post on the account holder’s wall if any purchase was made; this step will inform friends of the purchase, ending this partnership after a law suit was filed.…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Identity fraud can ruin a person's entire life because what they worked so hard for is taken from them. People pretend to be someone else on the computer. As the amount of online dating sites are going up, so it the amount of “catfishing”, or pretending to be someone else and tricking people into believing it really is that person. They start communicating with people online and have a fake relationship. Some people even keep the game going for years, making other people think they met “the love of their life” even though its all a lie. If people can’t be honest with each other, how can they live together…

    • 815 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Despite widespread public perception that FTC. How Not to Get Hooked by a ‘Phishing” Scam. June 2004. The Internet is a major contributor to the rise in identity theft, surveys indicate that comparatively few individuals who know how a thief acquired their personally identifiable information (PII) cite the Internet. Some attribute the rise in identity theft instead to carelessness by businesses in handling PII, and by credit issuers that grant credit without proper checks. The Internet may play a role, however. Today, attention is focused on a relatively new scam called “phishing.” Phishing refers to a practice where someone misrepresents their identity or authority in order to induce another person to provide PII over the Internet. Some common phishing scams involve e-mails that purport to be from a financial institution, ISP, or other trusted company claiming that a person’s record has been lost. The e-mail directs the person to a website that mimics the legitimate business’ website and asks the person to enter a credit card number and other PII so the record can be restored. In fact, the e-mail or website is controlled by a third party who is attempting to extract information that will be used in identity theft or other crimes. The FTC issued a consumer alert on phishing in June 2004. Several laws restrict the disclosure of consumer information and require companies to ensure the security and integrity of the data in certain contexts — Section 5 of the Federal Trade Commission Act, the Fair Credit Reporting Act (FCRA), and Title V of the Gramm-Leach-Bliley Act. Congress also has passed several laws specifically related to identity theft: the 1998 Identity Theft and Assumption Deterrence Act; the 2003 Fair and Accurate Credit Transactions (FACT) Act; and the 2004 Identity…

    • 3034 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Deception in Online Dating

    • 1298 Words
    • 6 Pages

    Imagine scrolling through a multitude of single people on an online dating site. You find an interesting candidate; their profile catches your attention, their pictures captivate your eyes, and the smooth way they chat with you online keeps you fascinated with their persona. Since your conversation online was always a thrill, it seemed natural to set up a face-to-face (FTF) meeting. When you finally get to meet this wonderful person, who has been roaming through your mind since the first online date, your eyes are appalled to see the drastic contrast of their online and offline self. There is a significant error with the image you had in mind about what they would be like; their appearance is less attractive, their clothes were out of style, they smell and speak repugnantly, and their confidence they displayed online has vanished. This story ends with you running back home completely disturbed with how much deception was present. This situation describes the real problem with finding romance online. Even though the internet provides an efficient and prompt way of networking, those seeking long-lasting relationships should switch off the server. The intimacy between online daters is artificially produced with the internet’s ability to give users more control over presentation of self (Goffman, 1959), misrepresentation, and the deception that comes with these elements.…

    • 1298 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    There is therefore a need for some form of standards for online-dating agencies. We define online-dating agencies as a paid internet-based provider of match-making services, which would serve as a regulatory body of content within their community. This is contrary to pure social advertising sites, where the users simply pay to place a personal advertisement on the page, and interactions between parties are at their own discretion.…

    • 2552 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Mail Order Brides

    • 3667 Words
    • 15 Pages

    The phenomenon of Mail-order brides (MOB) directly correlates to human trafficking into the sex industry by organized criminal groups. Contemporary mail-order bride phenomenon can be described as the introduction of women from Third World countries (or from former USSR) to men from First World countries through agencies that specialize in placing personal ads about potential wives on the internet with the ultimate goal of immigration of the woman and marriage between the two parties (Langevin, 76) . From first impression, it seems that the marriage agencies represent an extension of internet dating in the age of globalization (Langevin, 76). To the uncritical observer, it appears to ‘kill two birds with one stone’, solving the issue of solitude for men who could not find a compatible partner and the desire of underprivileged women to immigrate for better opportunities. The method at which it is done also seems appropriate with the growing accessibility of information technology as well as international migration (Langevin, 76). Yet this plain view fails to see the women involved as commodities for consumer men and the MOB industry as very lucrative for criminals.…

    • 3667 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Criminals are very common on online dating websites because they know that they will find a lot of victims. Once they find their victim they gain a relationship with them and then slowly start asking them personal questions such their address. They then ask to meet up and then try to either rape or kill them, this happened to Stephen Robinson's sister Sharon Winters. She was stabbed several times by a man she had met online a couple of days earlier (Laura Mitchell). Criminals not only use dating website to murder, rape and stalk innocent people but they also use them to get money (FBI). What they do gain a close bond with the victim and then later on ask them for some money, they then get their personal information causing the victim to lose money (FBI). Since criminals are very common on dating websites it's important not to give out any personal information to anyone on these sites to avoid a tragedy or losing…

    • 865 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    12] 12-Earp, J. B. and D.L. Baumer, Innovative Web Use to Learn about Consumer Behavior and Online Privacy, Communications of the ACM, Vol. 46 No. 4, 2003, pp: 81-83…

    • 9303 Words
    • 38 Pages
    Powerful Essays
  • Better Essays

    Identity theft is the most-costly and fastest growing crime in the world. Ident theft is a white-collar crime that became popular among criminal in today’s society. It accords when a criminal obtains someone’s personal information without them knowing, such as, their bank account or social security number, many people uses the internet as a productive and educational tool to stay connected and knowledgeable; and criminal uses it to gain access to peoples’ information. Social media is one of the few ways criminal get hold of people information since people use it for personal and business purposes. Despite the beneficial reasons, a lot of people became victims because they’re not aware that criminal can steal their identity through social media.…

    • 1429 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Online Dating Analysis

    • 645 Words
    • 3 Pages

    If I ever try online dating I will know now to be aware of people lying, and more specifically what aspects they may be lying about. I’ll also have tips that I can use to have a better chance at maintaining a possible relationship with someone I meet online, and I’ll know to not expect too much from many sites that offer online dating, especially ones that require you to pay in order to respond to messages. I think some of the tips in this article can help me in dating in general, whether online or if I meet someone face-to-face without the use of the virtual world. Even in the real world people lie about themselves to make themselves seem better, and I should always be aware of that and aware of my own lies I may tell. As for my future profession, I think I can use some of this information to possibly help future co-workers if they pursue online dating, and I can use some of the tips when interacting with people in a non-romantic setting. I learned a lot from this article, especially about popular dating sites. I did not realize that most of them required payment to actually even talk to people, and that the tests they claimed were supposed to find your soulmate actually had no scientific evidence to prove they work. After reading this article I feel I am more adequately prepared and knowledgeable if I or someone I know should ever look into online…

    • 645 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Life in color

    • 2102 Words
    • 9 Pages

    Identity theft is a major problem in the United States and is growing ever year. In 2003, identity theft cost business and consumers close to $53 billion and identities stolen from around 10 million Americans (Dinev 77). Identity theft is where someone can pretend to be someone else, and to make financial charges under the victim’s name, leaving all the troubles of fixing the victim’s financial troubles to the victim while the theft continues to steal until they either are caught or move on to another victim (Vacca 4). In 1998, identity theft became illegal even though this issue has been around for ages (Hoffman and McGinley 1). The traditional way of identity theft is “pinched wallet or pilfered mail” also is known as “dumpster diving” (Yount 71).Also, the Internet plays a big role in identity theft. In the Internet, a thief can hide from detection while stealing peoples’ identities from their homes, being able to steal peoples’ information one by one “then disappearing into another identity,” (Vacca 60). Internet users must know about the risk of online identity theft, so that they can protect themselves from this threat.…

    • 2102 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    Identity Theft

    • 1277 Words
    • 4 Pages

    “Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.” (The United States Department of Justce)In today’s world where people are very dependent on internet and technology, identity theft has become a major issue for both consumers and business. Internet became a convenient, easy, and quick solution to everything starting from education, work, accessing medical records, paying bills, to shopping to fulfill daily task while coping up with the busy life. People are entering personal information such as names, addresses, phone numbers, social security numbers, and even bank information on a daily basis on different websites thinking that particular site is trustworthy and secure. However, no matter how secure and safe the site claims to be, there can be a glitch to the system anytime and the site can be hacked by different programs created and used by hackers which they use to successfully steal and use valuable personal information of other people towards excessive expenses. Identity theft is a process online hackers developing programs to breach the cyber security of different organizations’ websites to usually obtain personal data for example bank account information, drivers’ license number, social security to obtain large amount of money from consumers. Victims of identity theft can be in a vulnerable situation and can lose their house and job, face financial penalties, and can get punished for the crime they have never committed. As of September 2014, according to Identity Theft Recourse Center, about 76 million personal records were exposed through online security breaches in areas including medical, government, education, and other businesses.1…

    • 1277 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    New technology has increased the convenience of online shopping, and ordering food. Socially it has created many outlets for us to communicate to one another, from far places, which is very cool in my opinion, but at the same time its easy for predators to find victims on the social cites. Thesis Statement:…

    • 1537 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Con Artists

    • 694 Words
    • 3 Pages

    Thesis Statement: In order to understand my topic, I will discuss scam victims, spotting a con-artist, and avoiding one.…

    • 694 Words
    • 3 Pages
    Good Essays