Anesa, P. (2020). Lovextortion: Persuasion strategies in romance cybercrime. Discourse, Context & Media, 35, 1–8.
CrossRef
Google Scholar
Anthony, L. (2019). AntConc. Waseda University.
Google Scholar
Barn, R., & Barn, B. (2016). An ontological representation of a taxonomy for cybercrime. Research Papers, 45. Retrieved from https://aisel.aisnet.org/ecis2016_rp/45.
Blythe, J. M., & Coventry, L. (2018). Costly but effective: Comparing the factors that influence employee anti-malware behaviours. Computers in Human Behavior, 87, 87–97.
Google Scholar
Bolton, A. (2014). Virtual criminology. In J. M. Miller (Ed.), The Encyclopedia of theoretical criminology (pp. 924–927). Wiley Blackwell.
Google Scholar
Buchanan, T., & Whitty, M. T. (2014). The online dating romance scam: causes and consequences of victimhood. Psychology, Crime & Law, 20, 261–283.
CrossRef
Google Scholar
Danielewicz-Betz, A. (2012). The role of forensic linguistics in crime investigation. In A. Littlejohn, & S. R. Mehta (Eds.), Language Studies: Stretching the Boundaries (pp. 93–108). Cambridge Scholars Publishing.
Google Scholar
Donalds, C., & Osei-Bryson, K. M. (2019). Toward a cybercrime classification ontology: A knowledge-based approach. Computers in Human Behavior, 92, 403–418.
CrossRef
Google Scholar
Furnell, S. (2002). Cybercrime: Vandalising the information society. Addison Wesley.
Google Scholar
Gill, M. (2013). Authentication and Nigerian letters. In S. Herring, D. Stein, & T. Virtanen (Eds.), Pragmatics of computer-mediated communication (pp. 411–436). De Gruyter.
CrossRef
Google Scholar
Hancock, J. (2007). Digital deception: When, where and how people lie online. In K. McKenna, T. Postmes, U. Reips, & A. N. Joinson (Eds.), Oxford handbook of internet psychology (pp. 287–301). Oxford University Press.
Google Scholar
Hancock, J., & Gonzales, A. (2013). Deception in computer-mediated communication. In S. Herring, D. Stein, & T. Virtanen (Eds.), Pragmatics of computer-mediated communication (pp. 363–383). De Gruyter.
CrossRef
Google Scholar
Herring, S., Stein, D., & Virtanen, T. (2013). Introduction to the pragmatics of computer-mediated communication. In S. Herring, D. Stein, & T. Virtanen (Eds.), Pragmatics of computer-mediated communication (pp. 3–32). De Gruyter.
CrossRef
Google Scholar
Inches, G., Harvey, M., & Crestani, F. (2013). Finding participants in a chat: authorship attribution for conversational documents. International conference on social computing, Alexandria, VA, 2013, 272–279. https://doi.org/10.1109/SocialCom.2013.45
CrossRef
Google Scholar
Jones, H., Towse, J., & Race, N. (2015). Susceptibility to email fraud: A review of psychological perspectives, data-collection methods, and ethical considerations. International Journal of Cyber Behavior: Psychology and Learning, 5(3), 13–29.
Google Scholar
Lindgren, S. (2018). A ghost in the machine: Tracing the role of ‘the digital’ in discursive processes of cybervictimization. Discourse & Communication, 12(5), 517–534.
CrossRef
Google Scholar
Modic, D., & Lea, S. (2013). Scam compliance and the psychology of persuasion. Social science research network. doi: https://doi.org/10.2139/ssrn.2364464.
Perkins, R. C. (2018). The application of forensic linguistics in cybercrime investigations. Policing: A Journal of Policy and Practice. doi: https://doi.org/10.1093/police/pay097.
Stamatatos, E. (2009). A survey of modern authorship attribution methods. Journal of the American Society for Information Science and Technology, 60(3), 538–556.
CrossRef
Google Scholar
Suarez-Tangil, G., Edwards, M., Peersman, C., Stringhini, G., Rashid, A., & Whitty, M. (2019). Automatically dismantling online fating Fraud. Retrieved from arXiv:1905.12593.
Google Scholar
Suleman, I. (2016). Social and contextual taxonomy of cybercrime: Socio-economic theory of Nigerian cybercriminals. International Journal of Law, Crime and Justice, 47, 44–57.
CrossRef
Google Scholar
Toma, C. L. (2017). Developing online deception literacy while looking for love. Media, Culture & Society, 39(3), 423–428.
CrossRef
Google Scholar
Wall, D. S. (2005). The Internet as a conduit for criminal activity. In A. Pattavina (Ed.), Information technology and the criminal justice system (pp. 77–98). Sage Publications.
CrossRef
Google Scholar
Whitty, M. T. (2013). The scammers’ persuasive techniques model: Development of a stage model to explain the online dating romance scam. British Journal of Criminology, 53(4), 665–684.
CrossRef
Google Scholar
Whitty, M. T. (2018). Do you love me? Psychological characteristics of romance scam victims. Cyberpsychology, Behavior, and Social Networking, 21(2), 105–109.
CrossRef
Google Scholar
Whitty, M. T., & Buchanan, T. (2012). The online dating romance scam: A serious crime. Cyberpsychology, Behavior, and Social Networking, 15(3), 181–183.
CrossRef
Google Scholar