Abstract
This chapter takes as its basis an attempted so-called romance scam to evaluate a common modern communications phenomenon: the difficulty in evaluating human interaction online. Without having access to the kind of well-established, largely subconscious physical signals that we use to assess a situation in the offline world, extra vigilance is needed. The option of avoiding online communications is becoming increasingly unrealistic in personal as well as professional situations. The chapter examines whether, in addition to experience, training or personal characteristics, technology can help to avoid risks of misuse of personal data, fraud, extortion and so on.
We argue that the elements that arose suspicions in a sceptical and above-average vigilant Internet user can be generalised and instrumentalised through software agents. This would allow such agents to assist the user and raise the red flags where appropriate, even when the user herself may not detect the danger. Such software agents can be made required companions on cyber journeys, becoming an integral part of communication networks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
The description of trust is inspired by the concept of economic, social and cultural capital discussed by Bourdieu (1986), pp. 241–258. The authors do not attempt to define the concept of trust in this chapter.
- 2.
- 3.
Chawki et al. (2015), pp. 7–9, 20.
- 4.
Examples related to Nigeria in Chawki et al. (2015), p. 143.
- 5.
There are a number of websites (and Facebook pages) directed at helping detect scams, like http://askville.amazon.com/major-patterns-online-dating-scammer/AnswerViewer.do?requestId=58411519 and http://www.stop-scammers.com/. The problem with such sites is that people will often only consult them after they have already been scammed or possibly when things have gone so far that they are truly suspicious.
- 6.
See, e.g., Moore (1984).
- 7.
We are presuming the actions of a human scammer in this chapter. It is unfortunately now technologically possible to have artificial agents fake to be humans in social-media platforms.
- 8.
Poullet and Dinant (2010), pp. 60–90.
- 9.
Case of Peck v. The United Kingdom (2003) Application 00044647/98, judgement of 28 Jan. 2003, paragraph 57: “… include activities of a professional or business nature.”; Case of Niemietz v. Germany (1992) Application 72/1991/324/396, judgement of 16 Dec. 1992, especially paragraph 29; Case of Halford v. the United Kingdom (1997) Application 73/1996/692/884, judgement of 25 June 1997, paragraph 44: “… a zone of interaction of a person with others, even in a public context …. ”; Case of Rotaru v. Romania (2000) Application 28341/95, judgement of 4 May 2000, paragraph 43; Case of P.G. and J.H. v. The United Kingdom (2001) Application 44787/98, judgement of 25 Sep 2001.
- 10.
As the ECtHR states, e.g., in Peck: The Court has already held that elements such as gender identification, name, sexual orientation and sexual life are important elements of the personal sphere protected by Article 8. The Article also protects a right to identity and personal development, and the right to establish and develop relationships with other human beings and the outside world and it may include activities of a professional or business nature. There is, therefore, a zone of interaction of a person with others, even in a public context, which may fall within the scope of ‘private life’.
- 11.
Von Hannover v. Germany (2005) Application 59320/00, judgement of 24 June 2004.
- 12.
Barendt (2010), pp. 11–31.
- 13.
Robbers (2002), pp. 98–105, translated definition of the right to informational self-determination is available at https://www.datenschutz.de/privo/recht/grundlagen/ (accessed 9.07.2015).
- 14.
See, e.g., Rull et al. (2014), pp. 73–94.
- 15.
Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data, Strasbourg, 28.I.1981, ETS No. 108, entry into force 1.X.1985 (hereinafter as Convention 108), available at http://conventions.coe.int/treaty/en/Treaties/Html/108.htm.
- 16.
Edwards and Waelde (2000), p. 85.
- 17.
Nyman-Metcalf (2014), pp. 21–35.
- 18.
Gonzales Fuster et al. (2010), pp. 105–117.
- 19.
Engel and Keller (2000), pp. 44–52.
- 20.
Fraunhofer Fokus (2012), pp. 11–12.
- 21.
- 22.
Fraunhofer Fokus (2012), p. 12.
- 23.
Nyman-Metcalf (2014), p. 27.
- 24.
Case von Hannover v. Germany (2004).
- 25.
Grimm (2009), pp. 11–22.
- 26.
There is also a link between data theft through hacking or other means and the kind of situations we describe here as people who have their details stolen from various networks are likely to be the subject of scams, have their identities stolen to perpetrate scams and so on. Anandarajan et al. (2013), pp. 51–61.
- 27.
See, e.g., Westin (1970), pp. 32–37. Four basic criteria necessary for the development of personhood are (1) providing an individual autonomy to control disclosing one’s self; (2) giving an individual opportunity for emotional release; (3) permitting an individual to conduct self-evaluation, engaging in moral and creative activities; (4) allowing an individual to share confidences and intimacies in the course of limited and protected communication.
- 28.
Anandarajan et al. (2013), p. 52.
- 29.
Ibid.
- 30.
Rull et al. (2014), p. 85.
- 31.
This is a branch of artificial intelligence and focuses on the construction and study of systems that learn from data. See, e.g., Pak et al. (2012), pp. 1059–1072.
- 32.
Anandarajan et al. (2013), p. 53.
- 33.
Long (2013).
- 34.
Huang et al. (2008).
- 35.
Sterling and Taveter (2009).
- 36.
Swapneel et al. (2010), pp. 461–472.
- 37.
Isazadeh et al. (2014), pp. 7847–7857.
- 38.
Alexander et al. (1977).
- 39.
Gamma et al. (1994).
- 40.
Hohpe and Woolf (2004).
- 41.
Leymann et al. (2014).
- 42.
JingMin et al. (2015), pp. 216–236.
- 43.
Norta et al. (2006), pp. 834–843.
- 44.
Ibid.
- 45.
Whitty (2012).
- 46.
Konte et al. (2009), pp. 219–228.
- 47.
Domingo-Pascual et al. (2011).
- 48.
McGuinness and Van Harmelen (2004).
- 49.
Musen (2015), pp. 4–12.
- 50.
Horrocks et al. (2012).
- 51.
Buil-Aranda et al. (2013), pp. 277–293.
- 52.
Sterling and Taveter (2009).
- 53.
Casali et al. (2011), pp. 1468–1478.
- 54.
Bose and Shin Kang (2013), pp. 1576–1589.
- 55.
Paris et al. (2013).
- 56.
The OWL ontology would be part of a metadatabase into which several sites can channel data so that BDI agents can work with that metadata.
- 57.
A&M Records, Inc. v. Napster, Inc., No. C99-05183 MHP, 2000 WL 573136 (W.D. Cal.); see also Smith (2003), p. 5. The Digital Millennium Copyright Act, 17 U.S.C. § 512 et seq., was enacted in response to concerns of online service providers, creating narrow safe harbours for copyright liability. See Zimmerman (2004).
- 58.
[1937] 1 KB 818.
- 59.
(1991) Aust. Tort Reports 81-127 (NSW SC).
- 60.
Godfrey v. Demon Internet Limited [1999] EWHC QB 244 (26th March, 1999) http://www.bailii.org/ew/cases/EWHC/QB/1999/244.html.
- 61.
John Bunt v. David Tilley [2006] EWHC 07 [QB] http://www.bailii.org/ew/cases/EWHC/QB/2006/407.html.
- 62.
References
Alexander C, Ishikawa S, Silverstein M (1977) A pattern language: towns, buildings, construction. Oxford University Press, Oxford
Anandarajan M, D’Ovidio R, Jenkins A (2013) Safeguarding consumers against identity-related fraud: examining data breach notification legislation through the lens of routine activities theory. Int Data Priv Law 3(1):51–61
Barendt E (2010) Privacy and freedom of speech. In: Kenyon AT, Richardson M (eds) New dimensions in privacy law. Cambridge University Press, Cambridge, pp 11–31
Bose A, Shin Kang G (2013) Agent‐based modeling of malware dynamics in heterogeneous environments. Secur Commun Netw 6(12):1576–1589
Bourdieu P (1986) The forms of capital. In: Richardson J (ed) Handbook of theory and research for the sociology of education. Greenwood, New York, pp 241–258
Buil-Aranda C, Hogan A, Umbrich J, Vandenbussche P-Y (2013) SPARQL web-querying infrastructure: ready for action? The Semantic Web–ISWC 2013. Springer, Berlin/Heidelberg, pp 277–293
Casali A, Godo L, Sierra C (2011) A graded BDI agent model to represent and reason about preferences. Artif Intell 175(7–8):1468–1478
Chawki M, Darwish A, Ayoub Khna M, Tyagi S (2015) Cybercrime, digital forensics and jurisdiction. Springer, Heidelberg
Domingo-Pascual J, Shavitt Y, Uhlig S (2011) Traffic Monitoring and Analysis: Third International Workshop, TMA 2011, Vienna, Austria, April 27, 2011, Proceedings, vol 6613. Springer Science & Business Media
Edwards L, Waelde C (2000) Law and the Internet. Hart Publishing, London
Engel C, Keller KH (2000) Governance of global networks in the light of differing local values. Nomos Verlagsgesellschaft, Baden-Baden
Fraunhofer Fokus (Hoepner, P., Strick, L., Löhe, M.) Historical Analysis on European Data Protection Legislation. Report March 2012, pp 11–12. www.fokus.fraunhofer.de
Gamma E, Helm R, Johnson R, Vlissides J (1994) Design patterns: elements of reusable object-oriented software. Addison-Wesley, Boston
Gonzales Fuster G, Gutwirth S, de Hert P (2010) From unsolicited communications to unsolicited adjustments. In: Gutwirth G, Poullet Y, de Hert P (eds) Data protection in a profiled world. Springer, Dordrecht/London, pp 105–117
Gowda RS (2008) Role of software agents in E-commerce. Int J Comput Eng 3(3):246–251
Grimm D (2009) Freedom of speech in a globalized world. In: Hare I, Weinstein J (eds) Extreme speech and democracy. Oxford University Press, Oxford, pp 11–22
Hewitt C et al (1973) A universal modular ACTOR formalism for artificial intelligence. In: Proceedings of the 3rd international joint conference on Artificial intelligence. Morgan Kaufmann Publishers Inc., Burlington, pp 234–245
Hohpe G, Woolf B (2004) Enterprise integration patterns: designing, building, and deploying messaging solutions. Addison-Wesley, Boston
Horrocks I, Motik B, Wang Z (2012) The HermiT OWL reasoned. OWL Reasoner Evaluation Workshop (ORE 2012). CEUR Workshop Proceedings, CEUR-WS.org
Huang K-Z, Yang H, Lyu MR (2008) Machine learning modeling data locally and globally. Springer, Heidelberg
Isazadeh A, Pedrycz W, Mahan F (2014) ECA rule learning in dynamic environments. Expert Syst Appl 41(17):7847–7857
JingMin H, Gianluca S, Peng Y (2015) Quit playing games with my heart: understanding online dating scams. Detection of intrusions and malware, and vulnerability assessment. Lect Notes Comp Sci 9148:216–236
Konte M, Feamster N, Jung J (2009) Dynamics of online scam hosting infrastructure. Passive and active network measurement. Lect Notes Comp Sci 5448:219–228
Leymann C, Fehling F, Retter R, Schupeck W, Arbitter P (2014) Cloud computing patterns. Springer, Heidelberg
Long S (2013) Socioanalytic methods: discovering the hidden in organisations and social systems. Karnac Books, London
McGuinness DL, Van Harmelen F (2004) OWL web ontology language overview. W3C recommendation 10, no. 10
Moore B (1984) Privacy studies in social and cultural history. M. E. Sharp Inc., New York
Musen MA (2015) The protégé project: a look back and a look forward. AI Matters 1(4):4–12
Norta A, Hendrix M, Grefen P (2006) A pattern-knowledge base supported establishment of inter-organizational business processes. On the move to meaningful internet systems. OTM 2006 Workshops. Springer, Heidelberg, pp 834–843
Nyman-Metcalf K (2014) The future of universality of rights. In: Kerikmäe T (ed) Protecting human rights in the EU. Springer, Heidelberg, pp 21–35
Pak R et al (2012) Decision support aids with anthropomorphic characteristics influence trust and performance in younger and older adults. Ergonomics 55(9):1059–1072
Paris C, Swartout WR, Mann WC (eds) (2013) Natural language generation in artificial intelligence and computational linguistics, vol 119. Springer Science & Business Media, Berlin/Heidelberg
Poullet Y, Dinant JM (2010) The internet and private life in Europe. In: Kenyon AT, Richardson M (eds) New dimensions in privacy law. Cambridge University Press, Cambridge, pp 60–90
Robbers G (2002) Informationelle Selbstbestimmung und allgemeine Informationsfreiheit in Deutschland. Juridica VII:98–105
Rull A, Täks E, Norta A (2014) Towards software-agent enhanced privacy protection. In: Kerikmäe T (ed) Regulating eTechnologies in the European Union. Springer, Heidelberg, pp 73–94
Smith S (2003) From Napster to Kazaa: the battle over peer-to-peer filesharing goes international. Duke Law Technol Rev
Sterling L, Taveter K (2009) The art of agent-oriented modeling. MIT Press, Boston
Swapneel S, Nipun A, Christian M, Gail K (2010) weHelp: a reference architecture for social recommender systems. IEEE/ACM Int Conf Autom Softw Eng Workshops; Pt-160:461–472
Westin A (1970) Privacy and freedom. The Bodley Head, London
Whitty TM (2012) Anatomy of the online dating romance scam. University of Leicester, Leicester
Zimmerman EM (2004) P2P file sharing: direct and indirect copyright infringement. Florida Bar J
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Norta, A., Nyman-Metcalf, K., Othman, A.B., Rull, A. (2016). “My Agent Will Not Let Me Talk to the General”: Software Agents as a Tool Against Internet Scams. In: Kerikmäe, T., Rull, A. (eds) The Future of Law and eTechnologies. Springer, Cham. https://doi.org/10.1007/978-3-319-26896-5_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-26896-5_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26894-1
Online ISBN: 978-3-319-26896-5
eBook Packages: Law and CriminologyLaw and Criminology (R0)