Cyber stalking generally involves unwarranted, repeated and threatening conduct of the offender via the Internet or social media platforms, which causes fear, distress or alarm to the victim. A qualitative study on the perception of cyber stalking and the adequacy of the anti-stalking law to regulate such crime in Malaysia is somewhat scarce. Hence, this paper seeks to examine cyber stalking risks and the sufficiency of laws to govern such crime and the legal protection afforded to victims. This paper adopts a qualitative methodology, where the data is obtained from eighteen semi-structured interviews conducted with various stakeholders, including the regulators and enforcement officers. Secondary data involves cyber legislation, the Penal Code, and online sources. The findings suggest that cyber stalking risks are often manufactured by the victims, which lead to individual responsibility towards managing and mitigating such risks. The findings have significant implications for lawmakers to either enact specific laws on cyber stalking or amend the Penal Code to include such crime. ________________________________________________________________________
{"title":"Cloaked by cyber space: A legal response to the risks of cyber stalking in Malaysia","authors":"Z. Hamin, Wan Rosalili Wan Rosli","doi":"10.5281/ZENODO.1467931","DOIUrl":"https://doi.org/10.5281/ZENODO.1467931","url":null,"abstract":"Cyber stalking generally involves unwarranted, repeated and threatening conduct of the offender via the Internet or social media platforms, which causes fear, distress or alarm to the victim. A qualitative study on the perception of cyber stalking and the adequacy of the anti-stalking law to regulate such crime in Malaysia is somewhat scarce. Hence, this paper seeks to examine cyber stalking risks and the sufficiency of laws to govern such crime and the legal protection afforded to victims. This paper adopts a qualitative methodology, where the data is obtained from eighteen semi-structured interviews conducted with various stakeholders, including the regulators and enforcement officers. Secondary data involves cyber legislation, the Penal Code, and online sources. The findings suggest that cyber stalking risks are often manufactured by the victims, which lead to individual responsibility towards managing and mitigating such risks. The findings have significant implications for lawmakers to either enact specific laws on cyber stalking or amend the Penal Code to include such crime. ________________________________________________________________________","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"12 1","pages":"316-332"},"PeriodicalIF":1.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71025352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Danielle M. Crimmins, Kathryn C. Seigfried-Spellar
This study assessed the prevalence of sexting behaviors among adults, and the relationship between sexting and moral foundations, self-esteem, and individual differences. Additionally, this study examined differences in the methods used to send sext messages (mobile applications vs. text messages) and image content (e.g., face, masturbating). Respondents solicited through Amazon’s Mechanical Turk completed the anonymous survey measuring “attitudes toward sexting.” The final sample included 508 adult participants; 68% of adults reported sexting behaviors, and both mobile applications and traditional text messages were used to send sext messages. In general, individuals who scored higher on extraversion and lower on conscientiousness, agreeableness, harm, and fairness were more likely to engage in sexting behaviors. Self-esteem was not associated with any sexting behaviors. Results also found significant differences between individuals who send semi-nude and nude sext messages. Limitations and future research suggestions are discussed.
{"title":"Adults Who Sext: Exploring Differences In Self-Esteem, Moral Foundations, And Personality","authors":"Danielle M. Crimmins, Kathryn C. Seigfried-Spellar","doi":"10.5281/ZENODO.1037378","DOIUrl":"https://doi.org/10.5281/ZENODO.1037378","url":null,"abstract":"This study assessed the prevalence of sexting behaviors among adults, and the relationship between sexting and moral foundations, self-esteem, and individual differences. Additionally, this study examined differences in the methods used to send sext messages (mobile applications vs. text messages) and image content (e.g., face, masturbating). Respondents solicited through Amazon’s Mechanical Turk completed the anonymous survey measuring “attitudes toward sexting.” The final sample included 508 adult participants; 68% of adults reported sexting behaviors, and both mobile applications and traditional text messages were used to send sext messages. In general, individuals who scored higher on extraversion and lower on conscientiousness, agreeableness, harm, and fairness were more likely to engage in sexting behaviors. Self-esteem was not associated with any sexting behaviors. Results also found significant differences between individuals who send semi-nude and nude sext messages. Limitations and future research suggestions are discussed.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"11 1","pages":"169"},"PeriodicalIF":1.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43629153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Wick, C. Nagoshi, R. Basham, C. Jordan, Y. Kim, Anh P. Nguyen, Peter Lehmann
A sample of 298 college students at a large southwestern state university (female 68.8%) completed an online survey about their experiences of being victimized by and engaging in perpetration of cyber-harassment of romantic partners. The findings partially supported the application of Routine Activities Theory to understand the predictors of cyber-harassment for victims and victimizers. Victimization for women was associated with greater general risk-taking propensity and reported online exposure and disclosure. For both men and women, greater risk propensity and online disclosure were associated with greater reports of perpetrating such harassment. ________________________________________________________________________
{"title":"Patterns of Cyber Harassment and Perpetration among College Students in the United States: A Test of Routine Activities Theory","authors":"S. Wick, C. Nagoshi, R. Basham, C. Jordan, Y. Kim, Anh P. Nguyen, Peter Lehmann","doi":"10.5281/ZENODO.495770","DOIUrl":"https://doi.org/10.5281/ZENODO.495770","url":null,"abstract":"A sample of 298 college students at a large southwestern state university (female 68.8%) completed an online survey about their experiences of being victimized by and engaging in perpetration of cyber-harassment of romantic partners. The findings partially supported the application of Routine Activities Theory to understand the predictors of cyber-harassment for victims and victimizers. Victimization for women was associated with greater general risk-taking propensity and reported online exposure and disclosure. For both men and women, greater risk propensity and online disclosure were associated with greater reports of perpetrating such harassment. ________________________________________________________________________","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"11 1","pages":"24-38"},"PeriodicalIF":1.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71084872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Research suggests that those individuals engaging in music piracy have little concern for the potentially negative consequences of engaging in this illegal activity. This study aims to build on previous research which finds that sub-cultural piracy knowledge is effectively transmitted online. Explicitly, this study aims to observe the various justifications people forward to rationalise engagement in music piracy, in accordance with Sykes and Matza’s (1957) widely researched neutralization theory, and if techniques used to rationalize behaviours are shared amongst those individuals found to be discussing and engaging in music piracy online. The research examines naturally occurring discourse across three online settings, finding a widespread perception that there is ‘no harm done’ and that tips to work around web-blocking are exchanged online, including in public spaces such as Twitter. However, differences were found in the beliefs and attitudes of the sample. The study raises key conceptual issues about the theory used.
{"title":"Where do beliefs about music piracy come from and how are they shared","authors":"S. Brown","doi":"10.5281/ZENODO.58518","DOIUrl":"https://doi.org/10.5281/ZENODO.58518","url":null,"abstract":"Research suggests that those individuals engaging in music piracy have little concern for the potentially negative consequences of engaging in this illegal activity. This study aims to build on previous research which finds that sub-cultural piracy knowledge is effectively transmitted online. Explicitly, this study aims to observe the various justifications people forward to rationalise engagement in music piracy, in accordance with Sykes and Matza’s (1957) widely researched neutralization theory, and if techniques used to rationalize behaviours are shared amongst those individuals found to be discussing and engaging in music piracy online. The research examines naturally occurring discourse across three online settings, finding a widespread perception that there is ‘no harm done’ and that tips to work around web-blocking are exchanged online, including in public spaces such as Twitter. However, differences were found in the beliefs and attitudes of the sample. The study raises key conceptual issues about the theory used.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"10 1","pages":"21-39"},"PeriodicalIF":1.0,"publicationDate":"2016-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71091540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IntroductionThis paper describes an in-depth analysis into the behaviour and characteristics of bank customers leading to victimization caused by phishing and malware attacks, the most common crimes involving online banking fraud in the Netherlands (NVB, 2013). Phishing is "a scalable act of deception whereby impersonation is used to obtain information from a target" (Lastdrager 2014, 8). Malware is the infection of a computer by malicious software, which includes viruses, worms, Trojan horses and spyware. In both cases, the aim of the fraudsters is to deceive the customer or the system used for online banking in order to obtain user credentials and/or to gain control over customers' devices. Fraudster use user credentials to access a victim's online bank account and to validate money transfers on behalf of the victim. Phishing and malware scams, however, are significant across the world and go beyond the online banking context. The Anti-Phishing Working Group reported in their Phishing Activities Trends Report of Q4 2014 that nearly 200,000 unique phishing reports were submitted to them and that an average of 255,000 new malware threats (including variants) emerged each day (APWG, 2015).A number of recent studies try to shed light on how and why people fall victim to these crimes and others do not (Bossler & Holt, 2009; Ngo & Paternoster, 2011; Vishwanath, Herath, Chen, Wang, & Rao, 2011). Jansen and Leukfeldt (2015), for example, carried out an exploratory study into how customers become victims of online banking fraud and demonstrate that customers have a specific role in their own victimization. Customers provide fraudsters with information, such as credentials, which fraudsters can use to steal money from their bank accounts. A study into phishing victimization shows that everybody is at risk when it comes to this type of crime (Leukfeldt, 2014). Additionally, Leukfeldt (2015) claims that this also largely holds for malware victimization; merely spending more time online, carrying out various kinds of activities, increased the risk of a malware infection.Both of Leukfeldt's studies (2014, 2015) - which are based on an online survey - conclude that in-depth studies are necessary to increase knowledge about why customers are victimized. It is not sufficiently clear if certain individuals are more prone to being at risk for online banking fraud than others, and how it can be explained. Therefore, this study qualitatively explores, by means of interviews, what factors explain online banking fraud victimization. Crossler et al. (2013) mention, that, the interview is a valuable method to better understand the actual motivations and behaviour of individuals.Theoretical backgroundFor this study, two theoretical perspectives are in place. First, we take a routine activity approach (Cohen & Felson, 1979) to study victim characteristics and behaviours that influence victimization. This approach is also central to the studies of Leukfeldt (2014, 2015) m
{"title":"Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization","authors":"J. Jansen, R. Leukfeldt","doi":"10.5281/ZENODO.58523","DOIUrl":"https://doi.org/10.5281/ZENODO.58523","url":null,"abstract":"IntroductionThis paper describes an in-depth analysis into the behaviour and characteristics of bank customers leading to victimization caused by phishing and malware attacks, the most common crimes involving online banking fraud in the Netherlands (NVB, 2013). Phishing is \"a scalable act of deception whereby impersonation is used to obtain information from a target\" (Lastdrager 2014, 8). Malware is the infection of a computer by malicious software, which includes viruses, worms, Trojan horses and spyware. In both cases, the aim of the fraudsters is to deceive the customer or the system used for online banking in order to obtain user credentials and/or to gain control over customers' devices. Fraudster use user credentials to access a victim's online bank account and to validate money transfers on behalf of the victim. Phishing and malware scams, however, are significant across the world and go beyond the online banking context. The Anti-Phishing Working Group reported in their Phishing Activities Trends Report of Q4 2014 that nearly 200,000 unique phishing reports were submitted to them and that an average of 255,000 new malware threats (including variants) emerged each day (APWG, 2015).A number of recent studies try to shed light on how and why people fall victim to these crimes and others do not (Bossler & Holt, 2009; Ngo & Paternoster, 2011; Vishwanath, Herath, Chen, Wang, & Rao, 2011). Jansen and Leukfeldt (2015), for example, carried out an exploratory study into how customers become victims of online banking fraud and demonstrate that customers have a specific role in their own victimization. Customers provide fraudsters with information, such as credentials, which fraudsters can use to steal money from their bank accounts. A study into phishing victimization shows that everybody is at risk when it comes to this type of crime (Leukfeldt, 2014). Additionally, Leukfeldt (2015) claims that this also largely holds for malware victimization; merely spending more time online, carrying out various kinds of activities, increased the risk of a malware infection.Both of Leukfeldt's studies (2014, 2015) - which are based on an online survey - conclude that in-depth studies are necessary to increase knowledge about why customers are victimized. It is not sufficiently clear if certain individuals are more prone to being at risk for online banking fraud than others, and how it can be explained. Therefore, this study qualitatively explores, by means of interviews, what factors explain online banking fraud victimization. Crossler et al. (2013) mention, that, the interview is a valuable method to better understand the actual motivations and behaviour of individuals.Theoretical backgroundFor this study, two theoretical perspectives are in place. First, we take a routine activity approach (Cohen & Felson, 1979) to study victim characteristics and behaviours that influence victimization. This approach is also central to the studies of Leukfeldt (2014, 2015) m","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"26 1","pages":"79"},"PeriodicalIF":1.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71091546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With advancements in modernization came the infiltration of information and communication technologies across the world, Nigeria inclusive. Several benefits are obtainable from these but also prevalent are some associated risks. Communication exists massively in cyberspace and as such poses a myriad of threats to a nation. This can be addressed on a national spectrum by the implementation of cyber security policies and strategies. This research involves making a qualitative analysis of the current Nigerian National Cyber Security Policy and Strategy. The documents were analyzed in the light of selected harmonized strategy developmental frameworks and subsequently comparatively evaluated with similar documents of selected countries. After the analysis, the national documents were found to have met majority of the requirements in terms of content, but failed to address certain elements of concern to cyber security in the Nigerian environment.
{"title":"National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis","authors":"Oluwafemi Osho, Agada David Onoja","doi":"10.5281/ZENODO.22390","DOIUrl":"https://doi.org/10.5281/ZENODO.22390","url":null,"abstract":"With advancements in modernization came the infiltration of information and communication technologies across the world, Nigeria inclusive. Several benefits are obtainable from these but also prevalent are some associated risks. Communication exists massively in cyberspace and as such poses a myriad of threats to a nation. This can be addressed on a national spectrum by the implementation of cyber security policies and strategies. This research involves making a qualitative analysis of the current Nigerian National Cyber Security Policy and Strategy. The documents were analyzed in the light of selected harmonized strategy developmental frameworks and subsequently comparatively evaluated with similar documents of selected countries. After the analysis, the national documents were found to have met majority of the requirements in terms of content, but failed to address certain elements of concern to cyber security in the Nigerian environment.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"9 1","pages":"120-143"},"PeriodicalIF":1.0,"publicationDate":"2015-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71048189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nitish Saxena, D. Schwebel, Jacinta Cai, J. Sloan, K. Jaishankar, Jun Yu, M. Godbole, Olive Nick Harper, Michael Goergescu
IntroductionPoint-Of-Sale (POS) systems are used globally to accept payment from consumers using credit or debit cards to purchase goods or services. The most popular form of POS reader, especially in the United States (US), involves swiping a credit or debit card through a magnetic scanner (Smart Card Alliance, 2011). This "traditional" POS (TPOS) system requires a dedicated, standalone card reader deployed solely for the purpose of processing transactions using credit/debit cards. Such systems have been used for many years and most consumers are familiar with them.Recently, a new POS system was introduced to the market, the mobile POS (MPOS) system (Johnson, 2012). Manufactured by several venders, including Square®, Intuit GoPayment® and Paypal Here®, MPOS systems take two forms. One type, hardware-based MPOS systems, consists of a small reader that plugs into a mobile device such as a smart phone or tablet. Consumers swipe their credit/debit cards through the device to make a payment. Merchants typically use the mobile device not just to accept payments but also for various other personal or business purposes. Payments are processed through software apps stored on the device. The other type of MPOS system is software based and usually requires manual entry of card information onto the phone or tablet. In some cases, the merchant can photograph the credit/debit card instead of entering data found on the card (www.card.io).A large body of research suggests consumers may have anxiety, fear, or concern about their personal safety and security when using new technology, especially when they are sharing personal or secure information such as credit or debit card numbers using that technology (Liu, 2012; Meuter et al., 2003; Perea y Monsuwe, Dellaert, & de Ruyter, 2004). Such anxiety was reported by consumers, for example, when making Internet-based credit card purchases a decade ago (Perea y Monsuwe et al, 2004) and more recently in using self-service bank machines (Liu, 2012). Given recent mass media publicity about cyber-crime and the potential for personal data to be stolen electronically (e.g., Whitaker, 2014), MPOS systems may introduce particular concern about crime victimization among consumers for several reasons. These include: (a) the electronic devices are used for multiple purposes by merchants, including personal matters, which may introduce greater risk of consumer information being stolen or misused; (b) they are small, mobile devices connected wirelessly and often insecurely to the Internet, which may raise fear of ready access by criminals to personal information; (c) third-party apps are both easily and typically stored on MPOS host devices and may contain malware; and (d) credit card theft has been featured prominently by national US media outlets in recent years.Given the rapid increase recently in the use of MPOS systems, the potential for high levels of consumer anxiety about crime victimization while using them based on resear
销售点(POS)系统在全球范围内用于接受消费者使用信用卡或借记卡购买商品或服务的付款。最流行的POS读卡器形式,特别是在美国(US),涉及通过磁性扫描仪刷信用卡或借记卡(智能卡联盟,2011)。这种“传统的”POS (TPOS)系统需要一个专用的、独立的读卡器,专门用于处理使用信用卡/借记卡的交易。这种系统已经使用了很多年,大多数消费者都很熟悉。最近,一种新的POS系统被引入市场,移动POS (MPOS)系统(约翰逊,2012)。MPOS系统由包括Square®,Intuit GoPayment®和Paypal Here®在内的几家供应商制造,采用两种形式。一种是基于硬件的MPOS系统,它包括一个插入智能手机或平板电脑等移动设备的小型读卡器。消费者通过该设备刷信用卡/借记卡进行支付。商家通常不仅使用移动设备接受付款,而且还用于各种其他个人或商业目的。支付通过存储在设备上的软件应用程序进行处理。另一种类型的MPOS系统是基于软件的,通常需要在手机或平板电脑上手动输入卡片信息。在某些情况下,商家可以拍摄信用卡/借记卡,而不是输入卡上的数据(www.card.io)。大量的研究表明,消费者在使用新技术时可能会对他们的人身安全和保障感到焦虑、恐惧或担忧,特别是当他们使用该技术共享个人或安全信息时,如信用卡或借记卡号码(Liu, 2012;Meuter et al., 2003;Perea y Monsuwe, Dellaert, & de Ruyter, 2004)。例如,消费者在十年前进行基于互联网的信用卡购物时(Perea y Monsuwe等人,2004年)以及最近在使用自助银行机器时(Liu, 2012年)都报告了这种焦虑。鉴于最近大众媒体对网络犯罪和个人数据被电子窃取的可能性的宣传(例如,Whitaker, 2014), MPOS系统可能会引起消费者对犯罪受害的特别关注,原因有几个。这些问题包括:(a)电子设备被商家用于多种目的,包括个人事务,这可能会增加消费者信息被盗用或被滥用的风险;(b)它们是小型的移动设备,以无线方式连接,通常与互联网不安全,这可能会引起对犯罪分子随时获取个人信息的担忧;(c)第三方应用程序容易且通常存储在MPOS主机设备上,并且可能包含恶意软件;(4)信用卡盗窃近年来一直是美国全国性媒体的重点报道。鉴于最近MPOS系统的使用迅速增加,基于类似技术的研究,消费者在使用MPOS系统时对犯罪受害的潜在高度焦虑,以及缺乏关于消费者对MPOS系统周围犯罪和个人安全的焦虑以及这种焦虑对行业的影响的实证研究,本研究旨在评估消费者在当地商家使用MPOS设备时的恐惧、焦虑和不适。具体来说,我们测试了四个假设:(a)消费者通常会对使用MPOS或TPOS系统感到舒适,但(b)消费者报告使用TPOS系统比使用MPOS系统更少担心;(c)消费者将报告对TPOS系统比MPOS系统更信任;(d)消费者会发现TPOS系统和MPOS系统一样方便。为了验证这些假设,我们进行了一项聚集病例与对照调查研究。消费者在两家小店购物时进行了调查,一家是使用TPOS读卡器的冰淇淋店,另一家是使用MPOS读卡器的三明治店。方法研究地点选择的研究地点符合以下标准:(a)消费者人口多而多样;(b)高峰时段消费者流量高;(c)地理位置(
{"title":"Consumer Perceptions of Mobile and Traditional Point-of-Sale Credit/Debit Card Systems in the United States: A Survey","authors":"Nitish Saxena, D. Schwebel, Jacinta Cai, J. Sloan, K. Jaishankar, Jun Yu, M. Godbole, Olive Nick Harper, Michael Goergescu","doi":"10.5281/ZENODO.56201","DOIUrl":"https://doi.org/10.5281/ZENODO.56201","url":null,"abstract":"IntroductionPoint-Of-Sale (POS) systems are used globally to accept payment from consumers using credit or debit cards to purchase goods or services. The most popular form of POS reader, especially in the United States (US), involves swiping a credit or debit card through a magnetic scanner (Smart Card Alliance, 2011). This \"traditional\" POS (TPOS) system requires a dedicated, standalone card reader deployed solely for the purpose of processing transactions using credit/debit cards. Such systems have been used for many years and most consumers are familiar with them.Recently, a new POS system was introduced to the market, the mobile POS (MPOS) system (Johnson, 2012). Manufactured by several venders, including Square®, Intuit GoPayment® and Paypal Here®, MPOS systems take two forms. One type, hardware-based MPOS systems, consists of a small reader that plugs into a mobile device such as a smart phone or tablet. Consumers swipe their credit/debit cards through the device to make a payment. Merchants typically use the mobile device not just to accept payments but also for various other personal or business purposes. Payments are processed through software apps stored on the device. The other type of MPOS system is software based and usually requires manual entry of card information onto the phone or tablet. In some cases, the merchant can photograph the credit/debit card instead of entering data found on the card (www.card.io).A large body of research suggests consumers may have anxiety, fear, or concern about their personal safety and security when using new technology, especially when they are sharing personal or secure information such as credit or debit card numbers using that technology (Liu, 2012; Meuter et al., 2003; Perea y Monsuwe, Dellaert, & de Ruyter, 2004). Such anxiety was reported by consumers, for example, when making Internet-based credit card purchases a decade ago (Perea y Monsuwe et al, 2004) and more recently in using self-service bank machines (Liu, 2012). Given recent mass media publicity about cyber-crime and the potential for personal data to be stolen electronically (e.g., Whitaker, 2014), MPOS systems may introduce particular concern about crime victimization among consumers for several reasons. These include: (a) the electronic devices are used for multiple purposes by merchants, including personal matters, which may introduce greater risk of consumer information being stolen or misused; (b) they are small, mobile devices connected wirelessly and often insecurely to the Internet, which may raise fear of ready access by criminals to personal information; (c) third-party apps are both easily and typically stored on MPOS host devices and may contain malware; and (d) credit card theft has been featured prominently by national US media outlets in recent years.Given the rapid increase recently in the use of MPOS systems, the potential for high levels of consumer anxiety about crime victimization while using them based on resear","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"9 1","pages":"162-172"},"PeriodicalIF":1.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71091109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IntroductionThe internet has become a common and indispensable phenomenon in our society. At the same time, cyber crime generates a lot of media attention. Furthermore, reports on the prevalence of cyber crime appear regularly and the Dutch government prioritizes the tracking and prevention of cyber crime. The term 'cyber crime' refers to criminal and deviant behaviour through the use of online technologies (Wall, 2001; Yar, 2012). Cyber crime is, either implicitly or explicitly, conceptualized as the contemporary counterpart of traditional crime, i.e., crimes that occur only in the offline world (Taylor, Fritsch, Liederbach, & Holt, 2010). Studies on cyber crime predominantly focus on identifying the types and prevalence of cyber crimes and often lack a theoretical base. Studies on the applicability of criminological theories to cyber crime are scarce (McQuade, 2006; Taylor, Caeti, Loper, Fritsch & Liederbach, 2006). Anyone who studies cyber crime will eventually have to look in to theories in order to find an explanation for the findings. At the same time, research is necessary to test the applicability of criminological theories to cyber crime or, to further develop theoretical approaches (e.g., Bernard, 2002; Bottoms, 2000). Lately, criminologists have been debating whether existing criminological theories are useful for the explanation of cyber crime or whether the phenomenon requires novel theoretical explanations (Jaishankar, 2008). In essence, the question is whether cyber crime constitutes a new category of criminal behaviour (Yar, 2005; Jaishankar, 2008; Holt, 2013; Yar, 2012).The Offline-Online dichotomy in relation to Cyber CrimeResearchers, politicians, and policy makers see the offline and online worlds as two separate worlds. The two are regarded as opposites, and characteristics attributed to the online world do not apply to the offline world: the transformation of time-space relationships, (perceived) anonymity, and the relative ease with which social identities can be manipulated (Yar, 2006). Of these characteristics, (perceived) anonymity is particularly connected with online disinhibition: in the online world people behave with fewer restrictions and inhibitions than in the offline world (Suler, 2004). With the arrival of the internet, a new world seems to have emerged: the online world, or cyber space. The question is, however, whether the offline-online dichotomy does justice to the complexity and interrelatedness of offline and online interactions. Subrahmanyam and Smahel (2011) call attention to the immense development in the use of online technologies since the arrival of the internet and argue that the offline and online worlds are interwoven. Research also shows that online interactions of youth occur predominantly in the context of existing relationships (Livingstone, Haddon, Gorzig, & Olafsson, 2011) and that young people increasingly see their offline and online interactions as a coherent experience (Livingstone, 200
{"title":"Cyber Bullying in the Netherlands: A Criminological Perspective","authors":"Joyce Kerstens, K. Jaishankar, S. Veenstra","doi":"10.5281/ZENODO.55055","DOIUrl":"https://doi.org/10.5281/ZENODO.55055","url":null,"abstract":"IntroductionThe internet has become a common and indispensable phenomenon in our society. At the same time, cyber crime generates a lot of media attention. Furthermore, reports on the prevalence of cyber crime appear regularly and the Dutch government prioritizes the tracking and prevention of cyber crime. The term 'cyber crime' refers to criminal and deviant behaviour through the use of online technologies (Wall, 2001; Yar, 2012). Cyber crime is, either implicitly or explicitly, conceptualized as the contemporary counterpart of traditional crime, i.e., crimes that occur only in the offline world (Taylor, Fritsch, Liederbach, & Holt, 2010). Studies on cyber crime predominantly focus on identifying the types and prevalence of cyber crimes and often lack a theoretical base. Studies on the applicability of criminological theories to cyber crime are scarce (McQuade, 2006; Taylor, Caeti, Loper, Fritsch & Liederbach, 2006). Anyone who studies cyber crime will eventually have to look in to theories in order to find an explanation for the findings. At the same time, research is necessary to test the applicability of criminological theories to cyber crime or, to further develop theoretical approaches (e.g., Bernard, 2002; Bottoms, 2000). Lately, criminologists have been debating whether existing criminological theories are useful for the explanation of cyber crime or whether the phenomenon requires novel theoretical explanations (Jaishankar, 2008). In essence, the question is whether cyber crime constitutes a new category of criminal behaviour (Yar, 2005; Jaishankar, 2008; Holt, 2013; Yar, 2012).The Offline-Online dichotomy in relation to Cyber CrimeResearchers, politicians, and policy makers see the offline and online worlds as two separate worlds. The two are regarded as opposites, and characteristics attributed to the online world do not apply to the offline world: the transformation of time-space relationships, (perceived) anonymity, and the relative ease with which social identities can be manipulated (Yar, 2006). Of these characteristics, (perceived) anonymity is particularly connected with online disinhibition: in the online world people behave with fewer restrictions and inhibitions than in the offline world (Suler, 2004). With the arrival of the internet, a new world seems to have emerged: the online world, or cyber space. The question is, however, whether the offline-online dichotomy does justice to the complexity and interrelatedness of offline and online interactions. Subrahmanyam and Smahel (2011) call attention to the immense development in the use of online technologies since the arrival of the internet and argue that the offline and online worlds are interwoven. Research also shows that online interactions of youth occur predominantly in the context of existing relationships (Livingstone, Haddon, Gorzig, & Olafsson, 2011) and that young people increasingly see their offline and online interactions as a coherent experience (Livingstone, 200","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"9 1","pages":"144-161"},"PeriodicalIF":1.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71090575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IntroductionMoney mules can be seen as a crucial part of the criminal network. They are of great importance for the core members of these networks because money mules are used to interrupt the trail that may lead law enforcement agencies to the top of the network. Money mules, for example, register bank accounts or businesses under their names, which are actually exploited by the criminal network.Several studies acknowledge the important role of money mules in the diversion of money stolen by cyber criminals who are engaged in financial cyber crimes, such as carding3 or phishing4 attacks (Choo, 2008; Moore & Clayton, 2009; McCombie, 2011;Aston et al., 2009; Soudijn & Zegers, 2012; Leukfeldt, 2014; Leukfeldt et al., 2016b, 2016c). Most of these studies, however, concentrate primarily on the core group of the criminal networks and only focus indirectly on money mules. Empirical studies into characteristics of internet money mules are lacking. Only Aston et al. and McCombie carried out some exploratory analyses of money mules used in Australian phishing attacks.In order to fill this knowledge gap, this paper focuses on money mules who are used by cyber criminal groups that carry out attacks on financial institutions. To gain insight into this group of criminals, which we believe plays a vital role in the crime process; we analyzed unique data from a fraud registration system of a major Dutch bank. We obtained 600 fraud incidents from the period 2011-2013. Based on these data, this paper provides insight into the characteristics of money mules and the way in which this group is used by criminal networks to transfer money from victim bank accounts. More specifically, we present background characteristics, the socioeconomic status of money mules, and the value and number of transactions to money mules.Review of LiteratureThe present study advances the work of Leukfeldt et al. (2016a, 2016b, 2016c). These studies provide insight into the composition, origin and growth, and criminal capabilities of criminal networks carrying out financial cyber crimes. Forty cyber criminal networks were analyzed in the Netherlands, Germany, UK and the US. The Dutch cases provided the authors with information about cyber criminal networks and their members largely as a result of investigative methods such as wiretaps, IP taps, observations, undercover policing and house searches. The authors reviewed the financial cyber crime cases systematically using an analytical framework. In the other three countries, the authors relied on interviews with case officers and public prosecutors involved in the criminal investigations against cyber criminal networks since no police files were available to them. This section briefly describes the main results of these three studies.Criminal CapabilitiesAll networks that were analyzed by Leukfeldt et al. are involved in attacks on online banking. The crime scripts of the Dutch networks have many similarities. Step one is obtaining login cr
钱骡可以被看作是犯罪网络的重要组成部分。他们对这些网络的核心成员非常重要,因为金钱骡子被用来中断可能导致执法机构到达网络顶端的线索。例如,“钱骡”以自己的名义注册银行账户或企业,这些账户或企业实际上被犯罪网络所利用。几项研究承认,金钱骡子在转移从事金融网络犯罪的网络罪犯所窃取的资金方面发挥了重要作用,这些网络犯罪包括诈骗或网络钓鱼攻击(Choo, 2008;Moore & Clayton, 2009;McCombie, 2011;Aston et al., 2009;Soudijn & Zegers, 2012;Leukfeldt, 2014;Leukfeldt et al., 2016b, 2016c)。然而,这些研究大多集中在犯罪网络的核心群体上,而只间接地关注“钱骡”。缺乏对互联网货币骡子特征的实证研究。只有Aston et al.和McCombie对澳大利亚网络钓鱼攻击中使用的金钱骡子进行了一些探索性分析。为了填补这一知识空白,本文将重点放在网络犯罪集团使用的对金融机构进行攻击的钱骡子上。为了深入了解这群犯罪分子,我们认为他们在犯罪过程中起着至关重要的作用;我们分析了荷兰一家大银行欺诈登记系统的独特数据。我们获得了2011-2013年期间的600起欺诈事件。基于这些数据,本文深入了解了钱骡的特征,以及犯罪网络利用这个群体从受害者的银行账户转移资金的方式。更具体地说,我们呈现了背景特征,货币骡子的社会经济地位,以及货币骡子的交易价值和数量。本研究推进了Leukfeldt et al. (2016a, 2016b, 2016c)的工作。这些研究对实施金融网络犯罪的犯罪网络的构成、起源和发展以及犯罪能力提供了深入的了解。研究人员分析了荷兰、德国、英国和美国的40个网络犯罪网络。荷兰的案件为作者提供了有关网络犯罪网络及其成员的信息,这在很大程度上是通过窃听、IP窃听、观察、卧底警察和房屋搜查等调查方法获得的。本文运用分析框架对金融网络犯罪案例进行了系统回顾。在其他三个国家,由于没有警方档案,作者依靠对参与网络犯罪网络刑事调查的案件官员和检察官的采访。本节简要介绍了这三项研究的主要结果。犯罪能力Leukfeldt等人分析的所有网络都涉及对网上银行的攻击。荷兰电视台的犯罪剧本有很多相似之处。第一步是从受害者那里获取登录凭证。网络犯罪分子使用网络钓鱼电子邮件、网络钓鱼网站和恶意软件拦截这些凭证。但是,为了从受害者的账户中转移资金,需要所谓的“一次性交易认证码”。因此,第二步是获取这些代码。获取这些代码的方法多种多样。在某些情况下,犯罪分子冒充银行职员给受害者打电话。在其他情况下,恶意软件在受害者不知道或无法看到的情况下修改了他们的交易。第三步与本研究的主题有关,即将资金转移到钱骡账户。受害者账户中的钱不会直接转入核心成员的账户。相反,为了掩盖核心成员的踪迹,他们使用了钱骡银行账户一旦钱被转移到钱骡账户,钱就会尽快以现金形式取出,并通过各种链接提供给核心成员。…
{"title":"Cyber Criminal Networks and Money Mules: An Analysis of Low-Tech and High-Tech Fraud Attacks in the Netherlands","authors":"R. Leukfeldt, J. Jansen","doi":"10.5281/ZENODO.56210","DOIUrl":"https://doi.org/10.5281/ZENODO.56210","url":null,"abstract":"IntroductionMoney mules can be seen as a crucial part of the criminal network. They are of great importance for the core members of these networks because money mules are used to interrupt the trail that may lead law enforcement agencies to the top of the network. Money mules, for example, register bank accounts or businesses under their names, which are actually exploited by the criminal network.Several studies acknowledge the important role of money mules in the diversion of money stolen by cyber criminals who are engaged in financial cyber crimes, such as carding3 or phishing4 attacks (Choo, 2008; Moore & Clayton, 2009; McCombie, 2011;Aston et al., 2009; Soudijn & Zegers, 2012; Leukfeldt, 2014; Leukfeldt et al., 2016b, 2016c). Most of these studies, however, concentrate primarily on the core group of the criminal networks and only focus indirectly on money mules. Empirical studies into characteristics of internet money mules are lacking. Only Aston et al. and McCombie carried out some exploratory analyses of money mules used in Australian phishing attacks.In order to fill this knowledge gap, this paper focuses on money mules who are used by cyber criminal groups that carry out attacks on financial institutions. To gain insight into this group of criminals, which we believe plays a vital role in the crime process; we analyzed unique data from a fraud registration system of a major Dutch bank. We obtained 600 fraud incidents from the period 2011-2013. Based on these data, this paper provides insight into the characteristics of money mules and the way in which this group is used by criminal networks to transfer money from victim bank accounts. More specifically, we present background characteristics, the socioeconomic status of money mules, and the value and number of transactions to money mules.Review of LiteratureThe present study advances the work of Leukfeldt et al. (2016a, 2016b, 2016c). These studies provide insight into the composition, origin and growth, and criminal capabilities of criminal networks carrying out financial cyber crimes. Forty cyber criminal networks were analyzed in the Netherlands, Germany, UK and the US. The Dutch cases provided the authors with information about cyber criminal networks and their members largely as a result of investigative methods such as wiretaps, IP taps, observations, undercover policing and house searches. The authors reviewed the financial cyber crime cases systematically using an analytical framework. In the other three countries, the authors relied on interviews with case officers and public prosecutors involved in the criminal investigations against cyber criminal networks since no police files were available to them. This section briefly describes the main results of these three studies.Criminal CapabilitiesAll networks that were analyzed by Leukfeldt et al. are involved in attacks on online banking. The crime scripts of the Dutch networks have many similarities. Step one is obtaining login cr","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"78 1","pages":"173-184"},"PeriodicalIF":1.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71091162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IntroductionRecent two decades witnessed a swift transforming of human and social landscape due to the pervasive use of digital networks, which connect individuals, institutions, businesses and agencies spreading over the world. The growing convenience for creating, depositing, processing, transmitting, and retrieving of information increased the quantity of data in both static and dynamic processes, improved virtual communication, developed social networks, and at the same time, risks, threats and dangers have also been un-ignorable problems.Naturally, it was not strange that information systems in the background of Chinese history had been regarded as a modern instrument in an ancient territory. In fact, many countries were confronted with similar challenge at the dawn of the information age, when they were perplexed for how to benefit from the pervasive use of information systems while avoiding negative political and legal impact of unmonitored users, uncensored information, unchecked communications, uncontrolled activities and unsolicited visits. Such potentialities were also eroding footstones of the Chinese Great Wall.Additionally, migration of criminal phenomena into information systems-facilitated cyber space has attracted increasing attention due to its high pace of expansion (Li, 2008; Li, 2009). The 1997 Penal Law of China (which was usually translated as Criminal Law, but, Penal Law should be more exact translation) provided fundamental criteria and guidelines for convicting and sentencing cyber criminals. With assistance of a series of other statutory laws and administrative regulations, a legal and regulatory system has been taking shape to suppress the spread of cyber crime of multiple forms, the so-called new century's pestilence, in cyberspace. The explosion of new and pertinent laws and regulations over the past two decades reflected society's concerns on the ancient phenomenon in a modernized context, and efforts to wrestle with it. Yet, it remained uncertain whether the current approach to deter and redress cyber crime would prove to be successful.In the following sections, this article will review the process of establishing the legal framework on cyber crime in China, examine the features of Chinese laws and regulations tackling cyber crime, and analyze the policy for preventing cyber crime through control over cyber space in China. The article will also analyze the subject, the means, the mechanism and the main purpose of control over cyberspace, with review of its actual effects and defects.1. Criminalization and Penalization of Cyber CrimeThe "chance encounter" of communist China based on its ancient land and people with the information network had multiple potentialities of changing the politico-social order, which were unexpected and unprepared events in the late 20th century. According to official statistics, to the end of 2014, the number of Internet users in China reached 649 million and the number of mobile Internet
近二十年来,由于数字网络的广泛使用,人类和社会景观发生了迅速的变化,数字网络将遍布世界各地的个人、机构、企业和机构联系在一起。信息的创建、存储、处理、传输和检索日益便利,使静态和动态过程中的数据量增加,虚拟通信得到改善,社交网络得到发展,同时风险、威胁和危险也成为不容忽视的问题。中国历史背景下的信息系统被视为古代领土上的现代工具,这自然不足为奇。事实上,许多国家在信息时代开始时都面临着类似的挑战,当时它们困惑于如何从信息系统的普遍使用中获益,同时避免不受监测的用户、不受审查的信息、不受检查的通讯、不受控制的活动和未经请求的访问所产生的消极的政治和法律影响。这种潜力也侵蚀着中国长城的基石。此外,犯罪现象向信息系统支持的网络空间的迁移由于其高速扩张而引起了越来越多的关注(Li, 2008;李,2009)。1997年的《中国刑法》(通常被翻译为《刑法》,但更准确的翻译应该是《刑法》)为网络犯罪定罪量刑提供了基本的标准和准则。在一系列法律法规和行政法规的辅助下,初步形成了遏制多种形式网络犯罪在网络空间蔓延的法律法规体系,形成了“新世纪瘟疫”。在过去的二十年里,新的和相关的法律法规的爆炸式增长反映了社会在现代化背景下对这一古老现象的关注,以及与之斗争的努力。然而,目前阻止和纠正网络犯罪的方法是否成功仍不确定。在接下来的章节中,本文将回顾中国建立网络犯罪法律框架的过程,考察中国应对网络犯罪的法律法规的特点,并分析中国通过控制网络空间来预防网络犯罪的政策。文章还分析了网络空间管制的主体、手段、机制和主要目的,并对网络空间管制的实际效果和缺陷进行了评述。基于古老土地和人民的共产主义中国与信息网络的“偶遇”具有改变政治社会秩序的多重可能性,这是20世纪后期的意外和未准备事件。据官方统计,截至2014年底,中国互联网用户数达到6.49亿,移动互联网用户数达到5.57亿(中国互联网络信息中心,2015)。移动即时通讯应用稳步增长,吸引了91.2%的移动互联网用户(同上)。网络安全事故和网络犯罪案件都在持续增长(国家计算机网络应急技术小组/中国协调中心,2014)。互联网上的犯罪和罪犯种类繁多,从灾难性的到仅仅令人讨厌的都有(Icove et al., 1995)。因此,从广义上定义,“网络犯罪”一词可以合理地涵盖各种各样的刑事犯罪、活动或问题。在中国,这个词从一开始就是一样的,发音为“电脑犯罪”。现在,更常用的术语是“网络犯罪”。然而,它从来没有一个正式的术语。中国刑法中所公布的罪行更为复杂,因为刑法本身并没有对任何罪行给予简化的名称。…
{"title":"Regulation of Cyber Space: An Analysis of Chinese Law on Cyber Crime","authors":"Xingan Li, K. Jaishankar","doi":"10.5281/ZENODO.56225","DOIUrl":"https://doi.org/10.5281/ZENODO.56225","url":null,"abstract":"IntroductionRecent two decades witnessed a swift transforming of human and social landscape due to the pervasive use of digital networks, which connect individuals, institutions, businesses and agencies spreading over the world. The growing convenience for creating, depositing, processing, transmitting, and retrieving of information increased the quantity of data in both static and dynamic processes, improved virtual communication, developed social networks, and at the same time, risks, threats and dangers have also been un-ignorable problems.Naturally, it was not strange that information systems in the background of Chinese history had been regarded as a modern instrument in an ancient territory. In fact, many countries were confronted with similar challenge at the dawn of the information age, when they were perplexed for how to benefit from the pervasive use of information systems while avoiding negative political and legal impact of unmonitored users, uncensored information, unchecked communications, uncontrolled activities and unsolicited visits. Such potentialities were also eroding footstones of the Chinese Great Wall.Additionally, migration of criminal phenomena into information systems-facilitated cyber space has attracted increasing attention due to its high pace of expansion (Li, 2008; Li, 2009). The 1997 Penal Law of China (which was usually translated as Criminal Law, but, Penal Law should be more exact translation) provided fundamental criteria and guidelines for convicting and sentencing cyber criminals. With assistance of a series of other statutory laws and administrative regulations, a legal and regulatory system has been taking shape to suppress the spread of cyber crime of multiple forms, the so-called new century's pestilence, in cyberspace. The explosion of new and pertinent laws and regulations over the past two decades reflected society's concerns on the ancient phenomenon in a modernized context, and efforts to wrestle with it. Yet, it remained uncertain whether the current approach to deter and redress cyber crime would prove to be successful.In the following sections, this article will review the process of establishing the legal framework on cyber crime in China, examine the features of Chinese laws and regulations tackling cyber crime, and analyze the policy for preventing cyber crime through control over cyber space in China. The article will also analyze the subject, the means, the mechanism and the main purpose of control over cyberspace, with review of its actual effects and defects.1. Criminalization and Penalization of Cyber CrimeThe \"chance encounter\" of communist China based on its ancient land and people with the information network had multiple potentialities of changing the politico-social order, which were unexpected and unprepared events in the late 20th century. According to official statistics, to the end of 2014, the number of Internet users in China reached 649 million and the number of mobile Internet","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"9 1","pages":"185-204"},"PeriodicalIF":1.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71091334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}