Cryptocurrency Ponzi schemes and their modus operandi in South Korea

IF 0.2 0 LANGUAGE & LINGUISTICS Security Journal Pub Date : 2024-03-08 DOI:10.1057/s41284-024-00417-5
Seoung Won Choi, Julak Lee, Sang-Hak Lee
{"title":"Cryptocurrency Ponzi schemes and their modus operandi in South Korea","authors":"Seoung Won Choi, Julak Lee, Sang-Hak Lee","doi":"10.1057/s41284-024-00417-5","DOIUrl":null,"url":null,"abstract":"<p>The surge of interest in digital currencies has led to a corresponding global increase in Ponzi schemes associated with cryptocurrencies. Scammers of cryptocurrency Ponzi schemes often target older adults who are cash-rich and have limited knowledge of digital assets. Therefore, to reduce the number of victims, it is imperative to increase the understanding of the crime itself. However, there remains a paucity of scholarly exploration focused on the criminal mechanisms underpinning such schemes and the strategic decision-making process of the perpetrators. This study seeks to address this gap in the literature and enhance the current understanding of cryptocurrency-based Ponzi schemes through an examination of their operational tactics. The methodology employed in this study distinguishes the progression of these schemes into two stages: the pre-crime phase and the criminal event phase, each scripted for further clarity, yielding three scripts for the former and eleven for the latter. Based on these parsed narratives, this research proposes several policy strategies aimed at curtailing the prevalence of cryptocurrency Ponzi schemes.</p>","PeriodicalId":47023,"journal":{"name":"Security Journal","volume":"32 1","pages":""},"PeriodicalIF":0.2000,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Security Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1057/s41284-024-00417-5","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"0","JCRName":"LANGUAGE & LINGUISTICS","Score":null,"Total":0}
引用次数: 0

Abstract

The surge of interest in digital currencies has led to a corresponding global increase in Ponzi schemes associated with cryptocurrencies. Scammers of cryptocurrency Ponzi schemes often target older adults who are cash-rich and have limited knowledge of digital assets. Therefore, to reduce the number of victims, it is imperative to increase the understanding of the crime itself. However, there remains a paucity of scholarly exploration focused on the criminal mechanisms underpinning such schemes and the strategic decision-making process of the perpetrators. This study seeks to address this gap in the literature and enhance the current understanding of cryptocurrency-based Ponzi schemes through an examination of their operational tactics. The methodology employed in this study distinguishes the progression of these schemes into two stages: the pre-crime phase and the criminal event phase, each scripted for further clarity, yielding three scripts for the former and eleven for the latter. Based on these parsed narratives, this research proposes several policy strategies aimed at curtailing the prevalence of cryptocurrency Ponzi schemes.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
韩国的加密货币庞氏骗局及其作案手法
人们对数字货币的兴趣激增,导致全球与加密货币相关的庞氏骗局也相应增加。加密货币庞氏骗局的诈骗者通常以现金充裕、对数字资产了解有限的老年人为目标。因此,要减少受害者人数,就必须加强对犯罪本身的了解。然而,学术界对此类骗局的犯罪机制和犯罪者的战略决策过程的探索仍然很少。本研究旨在弥补文献中的这一空白,并通过研究基于加密货币的庞氏骗局的运作策略,加深当前对此类骗局的理解。本研究采用的方法将这些计划的进展分为两个阶段:犯罪前阶段和犯罪事件阶段,每个阶段都编写了脚本以进一步明确,前者编写了三个脚本,后者编写了十一个脚本。根据这些经过解析的叙述,本研究提出了几项旨在遏制加密货币庞氏骗局盛行的政策战略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
3.50
自引率
0.00%
发文量
35
期刊介绍: The?Security Journal?is a dynamic publication that keeps you informed about the latest developments and techniques in security management. Written in an accessible style it is the world's premier peer-reviewed journal for today's security researcher and professional. The journal is affiliated to ASIS International and has an advisory board which includes representatives from major associations expert practitioners and leading academics.The?Security Journal?publishes papers at the cutting edge in developing ideas and improving practice focusing on the latest research findings on all aspects of security. Regular features include personal opinions and informed comment on key issues in security as well as incisive reviews of books videos and official reports.What are the benefits of subscribing?Learn from evaluations of the latest security measures policies and initiatives; keep up-to-date with new techniques for managing security as well as the latest findings and recommendations of independent research; understand new perspectives and how they inform the theory and practice of security management.What makes the journal distinct?Articles are jargon free and independently refereed; papers are at the cutting edge in developing ideas and improving practice; we have appointed an Advisory Board which includes representatives from leading associations skilled practitioners and the world's leading academics.How does the journal inform?The?Security Journal?publishes innovative papers highlighting the latest research findings on all aspects of security; incisive reviews of books videos and official reports; personal opinions and informed comment on key issues.Topics covered include:fraudevaluations of security measuresshop theftburglaryorganised crimecomputer and information securityrepeat victimisationviolence within the work placeprivate policinginsuranceregulation of the security industryCCTVtaggingaccess controlaviation securityhealth and safetyarmed robberydesigning out crimesecurity staffoffenders' viewsPlease note that the journal does not accept technical or mathematic submissions or research based on formulas or prototypes.
期刊最新文献
Open-source intelligence and great-power competition under mediatization Stakeholders’ views of online surveillance capabilities: a comparative analysis of the debates in UK, Finland and Norway A general problem-solving matrix (GPSM): combining crime prevention and public health tools The dimensions of ‘forensic biosecurity’ in genetic and facial contexts Identifying and preventing future forms of crimes using situational crime prevention
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1