Zusammenfassung
Die Lebenswelt von Verbraucher:innen wird zunehmend digitalisiert. Ein wachsendes Problem ist dabei die Online-Kriminalität. Der vorliegende Beitrag gibt einen Überblick über die Literatur zu Onlinebetrug. Dabei beschreiben wir verschiedene Formen des Onlinebetrugs und legen dar, welche Verbraucher:innen besonders von dieser Form der Kriminalität betroffen sind. Desweitern gehen wir in diesem Beitrag auf mögliche Auswirkungen für Betroffene ein und skizzieren Bewältigungsstrategien sowie mögliche Ansatzpunkte für Hilfsangebote für Verbraucher:innen.
Notes
- 1.
Der Begriff Dark Pattern beschreibt ein Benutzeroberflächendesign das darauf abzielt, die Benutze:innen zu Handlungen zu verleiten, die ihren Interessen zuwiderlaufen (Mathur et al., 2021). Ein Beispiel hierfür sind beispielsweise häufig auf Cookie-Bannern zu finden, bei denen es oft wesentlich einfacher ist, den gut sichtbaren „Zustimmen“ Knopf zu drücken, als sich durch halb-versteckte Untermenüs zu klicken, um der Datenanalyse zu widersprechen.
Literatur
Anderson, R., Barton, C., Böhme, R., Clayton, R., Van Eeten, M. J., Levi, M., Moore, T., & Savage, S. (2013). Measuring the cost of cybercrime. In The economics of information security and privacy (S. 265–300). Springer.
Bala, C., & Schuldzinski, W. (2016). Einleitung: Schöne neue Verbraucherwelt? Big Data, Scoring und das Internet der Dinge. In C. Bala & W. Schuldzinski (Hrsg.), Schöne neue Verbraucherwelt? Big Data, Scoring und das Internet der Dinge (Bd. 5, S. 7–20). Verbraucherzentrale Nordrhein-Westfalen e.V. https://doi.org/10.15501/978-3-86336-912-5_1
Beals, M., DeLiema, M., & Deevy, M. (2015). Framework for a taxonomy of fraud. Financial Fraud Research Center. https://www.finrafoundation.org/sites/finrafoundation/files/framework-taxonomy-fraud.pdf.
bitkom. (2013). Jeder Dritte hat Angst vor Betrug beim Online-Banking|Bitkom e.V., Zugegriffen am 11 Juli 2021. https://www.bitkom.org/Presse/Presseinformation/Jeder-Dritte-hat-Angst-vor-Betrug-beim-Online-Banking.html.
bitkom. (2020). Schon jeder Fünfte hat Betrug beim Online-Shopping erlebt|Bitkom e.V. https://www.bitkom.org/Presse/Presseinformation/Schon-jeder-Fuenfte-hat-Betrug-beim-Online-Shopping-erlebt.
Blum, S., Brow, M., & Silver, R. C. (2012). Coping. In Encyclopedia of human behavior (S. 596–601). Elsevier.
Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3(1), 400–420.
Bowron, M., & Shaw, O. (2007). Fighting financial crime: A UK perspective. Economic Affairs, 27(1), 6–9.
Buchanan, T., & Whitty, M. T. (2014). The online dating romance scam: Causes and consequences of victimhood. Psychology, Crime & Law, 20(3), 261–283.
Bundesamt für Sicherheit in der Informationstechnik, & Polizei. (o. J.-a). BETRUG BEIM ONLINEBANKING: CHECKLISTE FÜR DEN ERNSTFALL. https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Checklisten/BSI-ProPK-Checkliste-Onlinebanking.pdf?—blob=publicationFile&v=1. Zugegriffen am 06.04.2021.
Bundesamt für Sicherheit in der Informationstechnik, & Polizei. (o. J.-b). INFEKTION MIT SCHADPROGRAMMEN: CHECKLISTE FÜR DEN ERNSTFALL. https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Checklisten/BSI-ProPK-Checkliste-Schadsoftware.pdf?—blob=publicationFile&v=1. Zugegriffen am 06.04.2021.
Bundesamt für Sicherheit in der Informationstechnik, & Polizei. (o. J.-c). PHISHING: CHECKLISTE FÜR DEN ERNSTFALL. https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Checklisten/BSI-ProPK-Checkliste-Phishing.pdf?__blob=publicationFile&v=1. Zugegriffen am 06.04.2021.
Button, M. (2012). Cross-border fraud and the case for an „Interfraud“. Policing: An International Journal of Police Strategies & Management, 35, 285.
Button, M., & Cross, C. (2017). Cyber Frauds, Scams and their Victims. Routledge. https://doi.org/10.4324/9781315679877
Button, M., Lewis, C., & Tapley, J. (2009). A better deal for fraud victims: Research into victims’ needs and experiences. National Fraud Authority.
Button, M., Gee, J., & Brooks, G. (2012). Measuring the cost of fraud: an opportunity for the new competitive advantage. Journal of Financial Crime, 19(1), 65–75.
Button, M., Lewis, C., & Tapley, J. (2014). Not a victimless crime: The impact of fraud on individual victims and their families. Security Journal, 27(1), 36–54.
Clevenger, S., Navarro, J. N., Marcum, C. D., & Higgins, G. E. (2018). Understanding victimology: An active-learning approach. Routledge. https://doi.org/10.4324/9781315151571
Cross, C. (2013). „Nobody’s holding a gun to your head …“ examining current discourses surrounding victims of online fraud. Crime, Justice and Social Democracy: Proceedings of the 2nd International Conference, 1, 25–32.
Cross, C. (2015). No laughing matter: Blaming the victim of online fraud. International Review of Victimology, 21(2), 187–204.
Cross, C. (2018). Expectations vs reality: Responding to online fraud across the fraud justice network. International Journal of Law, Crime and Justice, 55, 1–12.
Cross, C. (2019). Responding to individual fraud: Perspectives of the fraud justice network. The Human Factor of Cybercrime, 1, 359–388.
Cross, C., & Blackshaw, D. (2015). Improving the police response to online fraud. Policing: A Journal of Policy and Practice, 9(2), 119–128.
Cross, C., Richards, K., & Smith, R. (2016). The reporting experiences and support needs of victims of online fraud. Trends and Issues in Crime and Criminal Justice, 518, 1–14.
Cross, C., Smith, R. G., & Richards, K. (2014). Challenges of responding to online fraud victimisation in Australia. Trends and Issues in Crime and Criminal Justice, 474, 1.
Cullen, F. T. (1994). Social support as an organizing concept for criminology: Presidential address to the Academy of Criminal Justice Sciences. Justice Quarterly, 11(4), 527–559.
De Kimpe, L., Ponnet, K., Walrave, M., Snaphaan, T., Pauwels, L., & Hardyns, W. (2020). Help, I need somebody: Examining the antecedents of social support seeking among cybercrime victims. Computers in Human Behavior, 108, 106310.
Doig, A., Johnson, S., & Levi, M. (2001). New public management, old populism and the policing of fraud. Public Policy and Administration, 16(1), 91–113.
Eigenberg, H., & Garland, T. (2008). Victim blaming. In Controversies in victimology (S. 33–48). Routledge.
Endler, N. S., & Parker, J. D. (1994). Assessment of multidimensional coping: Task, emotion, and avoidance strategies. Psychological assessment, 6(1), 50.
EVZ. (o. J.). Lotto-Betrug. https://www.evz.de/einkaufen-internet/vorsicht-falle/lotto-betrug.html. Zugegriffen am 02.03.2021.
Fraudehelpdesk.nl. (2021). Home. Fraudehelpdesk. https://www.fraudehelpdesk.nl/.
Freud, A. (1937). The ego and the mechanisms of defence. Routledge.
Gorby, D. M. (2013). The failure of traditional measures of police performance and the rise of broader measures of performance. Policing: A Journal of Policy and Practice, 7(4), 392–400.
Green, D. L., Choi, J. J., & Kane, M. N. (2010). Coping strategies for victims of crime: Effects of the use of emotionfocused, problem-focused, and avoidance-oriented coping. Journal of Human Behavior in the Social Environment, 20(6), 732–743.
Hindelang, M. J., Gottfredson, M. R., & Garofalo, J. (1978). Victims of personal crime: An empirical foundation for a theory of personal victimization. Ballinger.
Hirschi, T., & Gottfredson, M. (1993). Commentary: Testing the general theory of crime. Journal of Research in Crime and Delinquency, 30(1), 47–54.
Jakobi, T., Patil, S., Randall, D., Stevens, G., & Wulf, V. (2019). It is about what they could do with the data: A user perspective on privacy in smart metering. ACM Transactions on Computer-Human Interaction, 26(1), 2:1–2:44. https://doi.org/10.1145/3281444
Janoff-Bulman, R. (1985). Criminal vs. non-criminal victimization: Victims’ reactions. Victimology, 10(1–4), 498–511.
Jansen, J., & Leukfeldt, R. (2018). Coping with cybercrime victimization: An exploratory study into impact and change. Journal of Qualitative Criminal Justice and Criminology, 6(2), 205–228.
Lazarus, R. S., & Folkman, S. (1984). Stress, appraisal, and coping. Springer Publishing Company.
Lazarus, R. S., & Launier, R. (1978). Stress-related transactions between person and environment. In Perspectives in interactional psychology (S. 287–327). Springer.
Leukfeldt, R. (2017). Research Agenda the Human Factor in Cybercrime and Cybersecurity. Eleven International Publishing.
Li, Y., Yazdanmehr, A., Wang, J., & Rao, H. R. (2019). Responding to identity theft: A victimization perspective. Decision Support Systems, 121, 13–24.
Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33, 71–90.
Liang, H., & Xue, Y. L. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 1.
Mason, K. A., & Benson, M. L. (1996). The effect of social support on fraud victims’ reporting behavior: A research note. Justice Quarterly, 13(3), 511–524.
Mathur, A., Kshirsagar, M., & Mayer, J. (2021). What makes a dark pattern … Dark? Design attributes, normative considerations, and measurement methods. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, 1–18. https://doi.org/10.1145/3411764.3445610
McNeeley, S. (2015). Lifestyle-routine activities and crime events. Journal of Contemporary Criminal Justice, 31(1), 30–52.
Meier, R. F., & Miethe, T. D. (1993). Understanding theories of criminal victimization. Crime and Justice, 17, 459–499.
Meld.nl. (2021). Meld.nl | Centraal Meldpunt Nederland. Meld.nl. https://meld.nl/.
Mouton, F., Leenen, L., & Venter, H. S. (2016). Social engineering attack examples, templates and scenarios. Computers & Security, 59, 186–209.
Mouton, F., Malan, M. M., Leenen, L., & Venter, H. S. (2014). Social engineering attack framework. Information Security for South Africa, 2014, 1–9.
Nhan, J., Kinkade, P., & Burns, R. (2009). Finding a pot of gold at the end of an Internet rainbow: Further examination of fraudulent email solicitation. International Journal of Cyber Criminology, 3(1), 452.
Parker, J. D., & Endler, N. S. (1996). Coping and defense: A historical overview. In Handbook of coping: Theory, research, applications (S. 3–23). Wiley.
Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47(3), 267–296.
Ratcliffe, J. H., & Guidetti, R. (2008). State police investigative structure and the adoption of intelligence-led policing. Policing: An International Journal of Police Strategies & Management, 31, 109.
Rege, A. (2009). What’s Love Got to Do with It? Exploring Online Dating Scams and Identity Fraud. International Journal of Cyber Criminology, 3(2), 494–512.
Rosoff, H., Cui, J., & John, R. (2014). Behavioral experiments exploring victims’ response to cyber-based financial fraud and identity theft scenario simulations. 10th Symposium On Usable Privacy and Security ({SOUPS} 2014), 10, 175–186.
Rothmann, S., & Coetzer, E. P. (2003). The big five personality dimensions and job performance. SA Journal of Industrial Psychology, 29(1), 68–74.
Schafer, S. (1968). The victim and his criminal: A study in functional responsibility (Bd. 34). Random House.
Schelling, H. R., & Seifert, A. (2010). Internet-Nutzung im Alter: Gründe der (Nicht-) Nutzung von Informations-und Kommunikationstechnologien (IKT) durch Menschen ab 65 Jahren in der Schweiz. Zürcher Schriften zur Gerontologie, 7.
Schoepfer, A., & Piquero, N. L. (2009). Studying the correlates of fraud victimization and reporting. Journal of Criminal Justice, 37(2), 209–215.
Slachtofferhulp.nl. (2017). Slachtofferhulp Home (4. Mai 2017). https://www.slachtofferhulp.nl/; Slachtofferhulp Nederland. https://www.slachtofferhulp.nl/.
Smith, R. G. (2007). Consumer scams in Australia: An overview. Trends & Issues in Crime & Criminal Justice, 331.
Smith, R. G. (2008). Coordinating individual and organisational responses to fraud. Crime, law and social change, 49(5), 379–396.
Spalek, B. (1999). Exploring the impact of financial crime: A study looking into the effects of the Maxwell scandal upon the Maxwell pensioners. International Review of Victimology, 6(3), 213–230.
Spalek, B. (2016). Crime victims: Theory, policy and practice. Macmillan International Higher Education.
Stajano, F., & Wilson, P. (2011). Understanding scam victims: Seven principles for systems security. Communications of the ACM, 54(3), 70–75.
Stevens, G., Boden, A., Winterberg, L., Gómez, J., & Bala, C. (2019). Digitaler Konsum: Herausforderungen und Chancen der Verbraucherinformatik. Wirtschaftsinformatik 2019 Proceedings. https://aisel.aisnet.org/wi2019/workshops/papers/6.
Third, A., Bellerose, D., Dawkins, U., Keltie, E., & Pihl, K. (2014). Children’s rights in the digital age: A download from children around the world. Young and Well Cooperative Research Centre.
Titus, R. M., Heinzelmann, F., & Boyle, J. M. (1995). Victimization of persons by fraud. Crime & Delinquency, 41(1), 54–72.
Van de Weijer, S. G., & Leukfeldt, E. R. (2017). Big five personality traits of cybercrime victims. Cyberpsychology, Behavior, and Social Networking, 20(7), 407–412.
Van Wilsem, J. (2013). ‚Bought it, but never got it‘ assessing risk factors for online consumer fraud victimization. European Sociological Review, 29(2), 168–178.
Van Wyk, J., & Benson, M. L. (1997). Fraud victimization: Risky business or just bad luck? American Journal of Criminal Justice, 21(2), 163–179.
Verbraucherzentrale. (2021). Online-Handel. Verbraucherzentrale NRW. https://www.verbraucherzentrale.nrw/wissen/digitale-welt/onlinehandel.
Vitaliano, P. P., Russo, J., Carr, J. E., Maiuro, R. D., & Becker, J. (1985). The ways of coping checklist: Revision and psychometric properties. Multivariate behavioral research, 20(1), 3–26.
Whitty, M. T. (2018). Do you love me? Psychological characteristics of romance scam victims. Cyberpsychology, Behavior, and Social Networking, 21(2), 105–109.
Whitty, M. T., & Buchanan, T. (2012). The online romance scam: A serious cybercrime. CyberPsychology, Behavior, and Social Networking, 15(3), 181–183.
Whitty, M. T., & Buchanan, T. (2016). The online dating romance scam: The psychological impact on victims – both financial and non-financial. Criminology & Criminal Justice, 16(2), 176–194.
Workman, M. (2007). Gaining access with social engineering: An empirical study of the threat. Information Systems Security, 16(6), 315–331.
Wu, Y., Ngai, E. W., Wu, P., & Wu, C. (2020). Fake online reviews: Literature review, synthesis, and directions for future research (S. 113280). Decision Support Systems.
Zindler, A., & Bolz, C. (2020). Digitalbarometer: Bürgerbefragung zur Cyber-Sicherheit. Bundesamt für Sicherheit in der Informationstechnik (BSI) und Polizeiliche Kriminalprävention der Länder und des Bundes (ProPK). https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Digitalbarometer/Digitalbarometer-ProPK-BSI_2020.pdf?__blob=publicationFile&v=1.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature
About this entry
Cite this entry
Stevens, G., Boden, A., Alizadeh, F., Jakobi, T., Walther, M., Krüger, J. (2022). Wie gehen Verbraucher:innen mit Onlinebetrug um? – Eine Literaturübersicht. In: Rüdiger, TG., Bayerl, P.S. (eds) Handbuch Cyberkriminologie. Springer VS, Wiesbaden. https://doi.org/10.1007/978-3-658-35450-3_42-1
Download citation
DOI: https://doi.org/10.1007/978-3-658-35450-3_42-1
Received:
Accepted:
Published:
Publisher Name: Springer VS, Wiesbaden
Print ISBN: 978-3-658-35450-3
Online ISBN: 978-3-658-35450-3
eBook Packages: Social Science and Law (German Language)