Skip to main content

Wie gehen Verbraucher:innen mit Onlinebetrug um? – Eine Literaturübersicht

  • Living reference work entry
  • First Online:
Handbuch Cyberkriminologie

Zusammenfassung

Die Lebenswelt von Verbraucher:innen wird zunehmend digitalisiert. Ein wachsendes Problem ist dabei die Online-Kriminalität. Der vorliegende Beitrag gibt einen Überblick über die Literatur zu Onlinebetrug. Dabei beschreiben wir verschiedene Formen des Onlinebetrugs und legen dar, welche Verbraucher:innen besonders von dieser Form der Kriminalität betroffen sind. Desweitern gehen wir in diesem Beitrag auf mögliche Auswirkungen für Betroffene ein und skizzieren Bewältigungsstrategien sowie mögliche Ansatzpunkte für Hilfsangebote für Verbraucher:innen.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Notes

  1. 1.

    Der Begriff Dark Pattern beschreibt ein Benutzeroberflächendesign das darauf abzielt, die Benutze:innen zu Handlungen zu verleiten, die ihren Interessen zuwiderlaufen (Mathur et al., 2021). Ein Beispiel hierfür sind beispielsweise häufig auf Cookie-Bannern zu finden, bei denen es oft wesentlich einfacher ist, den gut sichtbaren „Zustimmen“ Knopf zu drücken, als sich durch halb-versteckte Untermenüs zu klicken, um der Datenanalyse zu widersprechen.

Literatur

  • Anderson, R., Barton, C., Böhme, R., Clayton, R., Van Eeten, M. J., Levi, M., Moore, T., & Savage, S. (2013). Measuring the cost of cybercrime. In The economics of information security and privacy (S. 265–300). Springer.

    Chapter  Google Scholar 

  • Bala, C., & Schuldzinski, W. (2016). Einleitung: Schöne neue Verbraucherwelt? Big Data, Scoring und das Internet der Dinge. In C. Bala & W. Schuldzinski (Hrsg.), Schöne neue Verbraucherwelt? Big Data, Scoring und das Internet der Dinge (Bd. 5, S. 7–20). Verbraucherzentrale Nordrhein-Westfalen e.V. https://doi.org/10.15501/978-3-86336-912-5_1

    Chapter  Google Scholar 

  • Beals, M., DeLiema, M., & Deevy, M. (2015). Framework for a taxonomy of fraud. Financial Fraud Research Center. https://www.finrafoundation.org/sites/finrafoundation/files/framework-taxonomy-fraud.pdf.

  • bitkom. (2013). Jeder Dritte hat Angst vor Betrug beim Online-Banking|Bitkom e.V., Zugegriffen am 11 Juli 2021. https://www.bitkom.org/Presse/Presseinformation/Jeder-Dritte-hat-Angst-vor-Betrug-beim-Online-Banking.html.

  • bitkom. (2020). Schon jeder Fünfte hat Betrug beim Online-Shopping erlebt|Bitkom e.V. https://www.bitkom.org/Presse/Presseinformation/Schon-jeder-Fuenfte-hat-Betrug-beim-Online-Shopping-erlebt.

  • Blum, S., Brow, M., & Silver, R. C. (2012). Coping. In Encyclopedia of human behavior (S. 596–601). Elsevier.

    Chapter  Google Scholar 

  • Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3(1), 400–420.

    Google Scholar 

  • Bowron, M., & Shaw, O. (2007). Fighting financial crime: A UK perspective. Economic Affairs, 27(1), 6–9.

    Article  Google Scholar 

  • Buchanan, T., & Whitty, M. T. (2014). The online dating romance scam: Causes and consequences of victimhood. Psychology, Crime & Law, 20(3), 261–283.

    Article  Google Scholar 

  • Bundesamt für Sicherheit in der Informationstechnik, & Polizei. (o. J.-a). BETRUG BEIM ONLINEBANKING: CHECKLISTE FÜR DEN ERNSTFALL. https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Checklisten/BSI-ProPK-Checkliste-Onlinebanking.pdf?—blob=publicationFile&v=1. Zugegriffen am 06.04.2021.

    Google Scholar 

  • Bundesamt für Sicherheit in der Informationstechnik, & Polizei. (o. J.-b). INFEKTION MIT SCHADPROGRAMMEN: CHECKLISTE FÜR DEN ERNSTFALL. https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Checklisten/BSI-ProPK-Checkliste-Schadsoftware.pdf?—blob=publicationFile&v=1. Zugegriffen am 06.04.2021.

    Google Scholar 

  • Bundesamt für Sicherheit in der Informationstechnik, & Polizei. (o. J.-c). PHISHING: CHECKLISTE FÜR DEN ERNSTFALL. https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Checklisten/BSI-ProPK-Checkliste-Phishing.pdf?__blob=publicationFile&v=1. Zugegriffen am 06.04.2021.

  • Button, M. (2012). Cross-border fraud and the case for an „Interfraud“. Policing: An International Journal of Police Strategies & Management, 35, 285.

    Article  Google Scholar 

  • Button, M., & Cross, C. (2017). Cyber Frauds, Scams and their Victims. Routledge. https://doi.org/10.4324/9781315679877

    Book  Google Scholar 

  • Button, M., Lewis, C., & Tapley, J. (2009). A better deal for fraud victims: Research into victims’ needs and experiences. National Fraud Authority.

    Google Scholar 

  • Button, M., Gee, J., & Brooks, G. (2012). Measuring the cost of fraud: an opportunity for the new competitive advantage. Journal of Financial Crime, 19(1), 65–75.

    Google Scholar 

  • Button, M., Lewis, C., & Tapley, J. (2014). Not a victimless crime: The impact of fraud on individual victims and their families. Security Journal, 27(1), 36–54.

    Article  Google Scholar 

  • Clevenger, S., Navarro, J. N., Marcum, C. D., & Higgins, G. E. (2018). Understanding victimology: An active-learning approach. Routledge. https://doi.org/10.4324/9781315151571

    Book  Google Scholar 

  • Cross, C. (2013). „Nobody’s holding a gun to your head …“ examining current discourses surrounding victims of online fraud. Crime, Justice and Social Democracy: Proceedings of the 2nd International Conference, 1, 25–32.

    Google Scholar 

  • Cross, C. (2015). No laughing matter: Blaming the victim of online fraud. International Review of Victimology, 21(2), 187–204.

    Article  Google Scholar 

  • Cross, C. (2018). Expectations vs reality: Responding to online fraud across the fraud justice network. International Journal of Law, Crime and Justice, 55, 1–12.

    Article  Google Scholar 

  • Cross, C. (2019). Responding to individual fraud: Perspectives of the fraud justice network. The Human Factor of Cybercrime, 1, 359–388.

    Google Scholar 

  • Cross, C., & Blackshaw, D. (2015). Improving the police response to online fraud. Policing: A Journal of Policy and Practice, 9(2), 119–128.

    Article  Google Scholar 

  • Cross, C., Richards, K., & Smith, R. (2016). The reporting experiences and support needs of victims of online fraud. Trends and Issues in Crime and Criminal Justice, 518, 1–14.

    Google Scholar 

  • Cross, C., Smith, R. G., & Richards, K. (2014). Challenges of responding to online fraud victimisation in Australia. Trends and Issues in Crime and Criminal Justice, 474, 1.

    Google Scholar 

  • Cullen, F. T. (1994). Social support as an organizing concept for criminology: Presidential address to the Academy of Criminal Justice Sciences. Justice Quarterly, 11(4), 527–559.

    Article  Google Scholar 

  • De Kimpe, L., Ponnet, K., Walrave, M., Snaphaan, T., Pauwels, L., & Hardyns, W. (2020). Help, I need somebody: Examining the antecedents of social support seeking among cybercrime victims. Computers in Human Behavior, 108, 106310.

    Article  Google Scholar 

  • Doig, A., Johnson, S., & Levi, M. (2001). New public management, old populism and the policing of fraud. Public Policy and Administration, 16(1), 91–113.

    Article  Google Scholar 

  • Eigenberg, H., & Garland, T. (2008). Victim blaming. In Controversies in victimology (S. 33–48). Routledge.

    Google Scholar 

  • Endler, N. S., & Parker, J. D. (1994). Assessment of multidimensional coping: Task, emotion, and avoidance strategies. Psychological assessment, 6(1), 50.

    Article  Google Scholar 

  • EVZ. (o. J.). Lotto-Betrug. https://www.evz.de/einkaufen-internet/vorsicht-falle/lotto-betrug.html. Zugegriffen am 02.03.2021.

  • Fraudehelpdesk.nl. (2021). Home. Fraudehelpdesk. https://www.fraudehelpdesk.nl/.

  • Freud, A. (1937). The ego and the mechanisms of defence. Routledge.

    Google Scholar 

  • Gorby, D. M. (2013). The failure of traditional measures of police performance and the rise of broader measures of performance. Policing: A Journal of Policy and Practice, 7(4), 392–400.

    Article  Google Scholar 

  • Green, D. L., Choi, J. J., & Kane, M. N. (2010). Coping strategies for victims of crime: Effects of the use of emotionfocused, problem-focused, and avoidance-oriented coping. Journal of Human Behavior in the Social Environment, 20(6), 732–743.

    Google Scholar 

  • Hindelang, M. J., Gottfredson, M. R., & Garofalo, J. (1978). Victims of personal crime: An empirical foundation for a theory of personal victimization. Ballinger.

    Google Scholar 

  • Hirschi, T., & Gottfredson, M. (1993). Commentary: Testing the general theory of crime. Journal of Research in Crime and Delinquency, 30(1), 47–54.

    Article  Google Scholar 

  • Jakobi, T., Patil, S., Randall, D., Stevens, G., & Wulf, V. (2019). It is about what they could do with the data: A user perspective on privacy in smart metering. ACM Transactions on Computer-Human Interaction, 26(1), 2:1–2:44. https://doi.org/10.1145/3281444

    Article  Google Scholar 

  • Janoff-Bulman, R. (1985). Criminal vs. non-criminal victimization: Victims’ reactions. Victimology, 10(1–4), 498–511.

    Google Scholar 

  • Jansen, J., & Leukfeldt, R. (2018). Coping with cybercrime victimization: An exploratory study into impact and change. Journal of Qualitative Criminal Justice and Criminology, 6(2), 205–228.

    Google Scholar 

  • Lazarus, R. S., & Folkman, S. (1984). Stress, appraisal, and coping. Springer Publishing Company.

    Google Scholar 

  • Lazarus, R. S., & Launier, R. (1978). Stress-related transactions between person and environment. In Perspectives in interactional psychology (S. 287–327). Springer.

    Chapter  Google Scholar 

  • Leukfeldt, R. (2017). Research Agenda the Human Factor in Cybercrime and Cybersecurity. Eleven International Publishing.

    Google Scholar 

  • Li, Y., Yazdanmehr, A., Wang, J., & Rao, H. R. (2019). Responding to identity theft: A victimization perspective. Decision Support Systems, 121, 13–24.

    Article  Google Scholar 

  • Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33, 71–90.

    Article  Google Scholar 

  • Liang, H., & Xue, Y. L. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 1.

    Article  Google Scholar 

  • Mason, K. A., & Benson, M. L. (1996). The effect of social support on fraud victims’ reporting behavior: A research note. Justice Quarterly, 13(3), 511–524.

    Article  Google Scholar 

  • Mathur, A., Kshirsagar, M., & Mayer, J. (2021). What makes a dark pattern … Dark? Design attributes, normative considerations, and measurement methods. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, 1–18. https://doi.org/10.1145/3411764.3445610

  • McNeeley, S. (2015). Lifestyle-routine activities and crime events. Journal of Contemporary Criminal Justice, 31(1), 30–52.

    Article  Google Scholar 

  • Meier, R. F., & Miethe, T. D. (1993). Understanding theories of criminal victimization. Crime and Justice, 17, 459–499.

    Article  Google Scholar 

  • Meld.nl. (2021). Meld.nl | Centraal Meldpunt Nederland. Meld.nl. https://meld.nl/.

  • Mouton, F., Leenen, L., & Venter, H. S. (2016). Social engineering attack examples, templates and scenarios. Computers & Security, 59, 186–209.

    Article  Google Scholar 

  • Mouton, F., Malan, M. M., Leenen, L., & Venter, H. S. (2014). Social engineering attack framework. Information Security for South Africa, 2014, 1–9.

    Google Scholar 

  • Nhan, J., Kinkade, P., & Burns, R. (2009). Finding a pot of gold at the end of an Internet rainbow: Further examination of fraudulent email solicitation. International Journal of Cyber Criminology, 3(1), 452.

    Google Scholar 

  • Parker, J. D., & Endler, N. S. (1996). Coping and defense: A historical overview. In Handbook of coping: Theory, research, applications (S. 3–23). Wiley.

    Google Scholar 

  • Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47(3), 267–296.

    Article  Google Scholar 

  • Ratcliffe, J. H., & Guidetti, R. (2008). State police investigative structure and the adoption of intelligence-led policing. Policing: An International Journal of Police Strategies & Management, 31, 109.

    Article  Google Scholar 

  • Rege, A. (2009). What’s Love Got to Do with It? Exploring Online Dating Scams and Identity Fraud. International Journal of Cyber Criminology, 3(2), 494–512.

    Google Scholar 

  • Rosoff, H., Cui, J., & John, R. (2014). Behavioral experiments exploring victims’ response to cyber-based financial fraud and identity theft scenario simulations. 10th Symposium On Usable Privacy and Security ({SOUPS} 2014), 10, 175–186.

    Google Scholar 

  • Rothmann, S., & Coetzer, E. P. (2003). The big five personality dimensions and job performance. SA Journal of Industrial Psychology, 29(1), 68–74.

    Article  Google Scholar 

  • Schafer, S. (1968). The victim and his criminal: A study in functional responsibility (Bd. 34). Random House.

    Google Scholar 

  • Schelling, H. R., & Seifert, A. (2010). Internet-Nutzung im Alter: Gründe der (Nicht-) Nutzung von Informations-und Kommunikationstechnologien (IKT) durch Menschen ab 65 Jahren in der Schweiz. Zürcher Schriften zur Gerontologie, 7.

    Google Scholar 

  • Schoepfer, A., & Piquero, N. L. (2009). Studying the correlates of fraud victimization and reporting. Journal of Criminal Justice, 37(2), 209–215.

    Article  Google Scholar 

  • Slachtofferhulp.nl. (2017). Slachtofferhulp Home (4. Mai 2017). https://www.slachtofferhulp.nl/; Slachtofferhulp Nederland. https://www.slachtofferhulp.nl/.

  • Smith, R. G. (2007). Consumer scams in Australia: An overview. Trends & Issues in Crime & Criminal Justice, 331.

    Google Scholar 

  • Smith, R. G. (2008). Coordinating individual and organisational responses to fraud. Crime, law and social change, 49(5), 379–396.

    Article  Google Scholar 

  • Spalek, B. (1999). Exploring the impact of financial crime: A study looking into the effects of the Maxwell scandal upon the Maxwell pensioners. International Review of Victimology, 6(3), 213–230.

    Article  Google Scholar 

  • Spalek, B. (2016). Crime victims: Theory, policy and practice. Macmillan International Higher Education.

    Book  Google Scholar 

  • Stajano, F., & Wilson, P. (2011). Understanding scam victims: Seven principles for systems security. Communications of the ACM, 54(3), 70–75.

    Article  Google Scholar 

  • Stevens, G., Boden, A., Winterberg, L., Gómez, J., & Bala, C. (2019). Digitaler Konsum: Herausforderungen und Chancen der Verbraucherinformatik. Wirtschaftsinformatik 2019 Proceedings. https://aisel.aisnet.org/wi2019/workshops/papers/6.

  • Third, A., Bellerose, D., Dawkins, U., Keltie, E., & Pihl, K. (2014). Children’s rights in the digital age: A download from children around the world. Young and Well Cooperative Research Centre.

    Google Scholar 

  • Titus, R. M., Heinzelmann, F., & Boyle, J. M. (1995). Victimization of persons by fraud. Crime & Delinquency, 41(1), 54–72.

    Article  Google Scholar 

  • Van de Weijer, S. G., & Leukfeldt, E. R. (2017). Big five personality traits of cybercrime victims. Cyberpsychology, Behavior, and Social Networking, 20(7), 407–412.

    Article  Google Scholar 

  • Van Wilsem, J. (2013). ‚Bought it, but never got it‘ assessing risk factors for online consumer fraud victimization. European Sociological Review, 29(2), 168–178.

    Article  Google Scholar 

  • Van Wyk, J., & Benson, M. L. (1997). Fraud victimization: Risky business or just bad luck? American Journal of Criminal Justice, 21(2), 163–179.

    Article  Google Scholar 

  • Verbraucherzentrale. (2021). Online-Handel. Verbraucherzentrale NRW. https://www.verbraucherzentrale.nrw/wissen/digitale-welt/onlinehandel.

  • Vitaliano, P. P., Russo, J., Carr, J. E., Maiuro, R. D., & Becker, J. (1985). The ways of coping checklist: Revision and psychometric properties. Multivariate behavioral research, 20(1), 3–26.

    Article  Google Scholar 

  • Whitty, M. T. (2018). Do you love me? Psychological characteristics of romance scam victims. Cyberpsychology, Behavior, and Social Networking, 21(2), 105–109.

    Article  Google Scholar 

  • Whitty, M. T., & Buchanan, T. (2012). The online romance scam: A serious cybercrime. CyberPsychology, Behavior, and Social Networking, 15(3), 181–183.

    Article  Google Scholar 

  • Whitty, M. T., & Buchanan, T. (2016). The online dating romance scam: The psychological impact on victims – both financial and non-financial. Criminology & Criminal Justice, 16(2), 176–194.

    Article  Google Scholar 

  • Workman, M. (2007). Gaining access with social engineering: An empirical study of the threat. Information Systems Security, 16(6), 315–331.

    Article  Google Scholar 

  • Wu, Y., Ngai, E. W., Wu, P., & Wu, C. (2020). Fake online reviews: Literature review, synthesis, and directions for future research (S. 113280). Decision Support Systems.

    Google Scholar 

  • Zindler, A., & Bolz, C. (2020). Digitalbarometer: Bürgerbefragung zur Cyber-Sicherheit. Bundesamt für Sicherheit in der Informationstechnik (BSI) und Polizeiliche Kriminalprävention der Länder und des Bundes (ProPK). https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Digitalbarometer/Digitalbarometer-ProPK-BSI_2020.pdf?__blob=publicationFile&v=1.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexander Boden .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Stevens, G., Boden, A., Alizadeh, F., Jakobi, T., Walther, M., Krüger, J. (2022). Wie gehen Verbraucher:innen mit Onlinebetrug um? – Eine Literaturübersicht. In: Rüdiger, TG., Bayerl, P.S. (eds) Handbuch Cyberkriminologie. Springer VS, Wiesbaden. https://doi.org/10.1007/978-3-658-35450-3_42-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-35450-3_42-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer VS, Wiesbaden

  • Print ISBN: 978-3-658-35450-3

  • Online ISBN: 978-3-658-35450-3

  • eBook Packages: Social Science and Law (German Language)

Publish with us

Policies and ethics