Crypto-Cognitive Exploitation: Integrating Cognitive, Social, and Technological perspectives on cryptocurrency fraud

IF 7.6 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE
Arif Perdana , Hee Jhee Jiow
{"title":"Crypto-Cognitive Exploitation: Integrating Cognitive, Social, and Technological perspectives on cryptocurrency fraud","authors":"Arif Perdana ,&nbsp;Hee Jhee Jiow","doi":"10.1016/j.tele.2024.102191","DOIUrl":null,"url":null,"abstract":"<div><div>The rising prominence of cryptocurrency in global finance has unfortunately rendered it a prime target for scams, leading to significant financial losses. This study employs Cognitive Vulnerability Theory and the Social Engineering Approach to examine the dimensions, consequences, and prevention strategies of cryptocurrency scams. We analyzed data from the U.S. Department of Financial Protection and Innovation (DFPI), focusing on the dimensions of scams within the digital landscape and the efficacy of digital strategies and regulations in mitigating them. Our findings reveal seven critical dimensions of cryptocurrency scams and introduce the “Crypto-Cognitive Exploitation Model” (CCEM), which integrates theoretical insights with the unique aspects of these scams. Quantitative analysis indicates that fraudulent trading platform scams are the most prevalent, often intertwined with pig butchering scams, highlighting the complex, multifaceted nature of these fraudulent activities. We demonstrate the practical application of our recommendations, bridging theory and practice in scam mitigation. The study concludes with strategic recommendations for tailored digital approaches and enhanced regulatory mechanisms to combat evolving deceptive practices.</div></div>","PeriodicalId":48257,"journal":{"name":"Telematics and Informatics","volume":"95 ","pages":"Article 102191"},"PeriodicalIF":7.6000,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Telematics and Informatics","FirstCategoryId":"91","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0736585324000959","RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INFORMATION SCIENCE & LIBRARY SCIENCE","Score":null,"Total":0}
引用次数: 0

Abstract

The rising prominence of cryptocurrency in global finance has unfortunately rendered it a prime target for scams, leading to significant financial losses. This study employs Cognitive Vulnerability Theory and the Social Engineering Approach to examine the dimensions, consequences, and prevention strategies of cryptocurrency scams. We analyzed data from the U.S. Department of Financial Protection and Innovation (DFPI), focusing on the dimensions of scams within the digital landscape and the efficacy of digital strategies and regulations in mitigating them. Our findings reveal seven critical dimensions of cryptocurrency scams and introduce the “Crypto-Cognitive Exploitation Model” (CCEM), which integrates theoretical insights with the unique aspects of these scams. Quantitative analysis indicates that fraudulent trading platform scams are the most prevalent, often intertwined with pig butchering scams, highlighting the complex, multifaceted nature of these fraudulent activities. We demonstrate the practical application of our recommendations, bridging theory and practice in scam mitigation. The study concludes with strategic recommendations for tailored digital approaches and enhanced regulatory mechanisms to combat evolving deceptive practices.
加密认知剥削:将认知、社会和技术视角与加密货币欺诈结合起来
加密货币在全球金融中的地位日益突出,不幸的是,它已成为诈骗的主要目标,导致重大经济损失。本研究采用认知脆弱性理论和社会工程学方法来研究加密货币诈骗的维度、后果和预防策略。我们分析了美国金融保护和创新部(DFPI)的数据,重点关注数字环境中的欺诈行为的各个层面,以及数字策略和法规在减少欺诈行为方面的功效。我们的研究结果揭示了加密货币骗局的七个关键方面,并引入了 "加密认知利用模型"(CCEM),该模型将理论见解与这些骗局的独特方面相结合。定量分析表明,欺诈性交易平台骗局最为普遍,往往与 "杀猪 "骗局交织在一起,凸显了这些欺诈活动的复杂性和多面性。我们展示了我们建议的实际应用,在减少诈骗的理论和实践之间架起了桥梁。本研究最后提出了一些战略性建议,以量身定制的数字方法和强化的监管机制来打击不断演变的欺骗行为。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Telematics and Informatics
Telematics and Informatics INFORMATION SCIENCE & LIBRARY SCIENCE-
CiteScore
17.00
自引率
4.70%
发文量
104
审稿时长
24 days
期刊介绍: Telematics and Informatics is an interdisciplinary journal that publishes cutting-edge theoretical and methodological research exploring the social, economic, geographic, political, and cultural impacts of digital technologies. It covers various application areas, such as smart cities, sensors, information fusion, digital society, IoT, cyber-physical technologies, privacy, knowledge management, distributed work, emergency response, mobile communications, health informatics, social media's psychosocial effects, ICT for sustainable development, blockchain, e-commerce, and e-government.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信