{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:24:50Z","timestamp":1743009890500,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":50,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819605699"},{"type":"electronic","value":"9789819605705"}],"license":[{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0570-5_29","type":"book-chapter","created":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:47:30Z","timestamp":1732927650000},"page":"402-415","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Reporting Social Media Fraud: Motivations, Barriers, and Reporting Mechanism"],"prefix":"10.1007","author":[{"given":"Eiman A.","family":"Al-Hamad","sequence":"first","affiliation":[]},{"given":"Aiman","family":"Erbad","sequence":"additional","affiliation":[]},{"given":"Raian","family":"Ali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,30]]},"reference":[{"key":"29_CR1","unstructured":"Statista, Value of E-Commerce Losses to Online Payment Fraud Worldwide from 2020 to 2023, vol. 2024. https:\/\/www.Statista.Com\/Statistics\/1273177\/Ecommerce-Payment-Fraud-Losses-Globally\/"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Marin, I.A., Burda, P., Zannone, N., Allodi, L.: The influence of human factors on the intention to report phishing emails. In: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 23 April 2023","DOI":"10.1145\/3544548.3580985"},{"key":"29_CR3","unstructured":"Morgan, A., Dowling, C., Brown, R., Mann, M., Voce, I., Smith, M.: Evaluation of the Australian cybercrime online reporting network, October 2016"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Bossler, A.M., Berenblum, T.: Introduction: new directions in cybercrime research. J. Crime Justice 42, 495\u2013499 (2019)","DOI":"10.1080\/0735648X.2019.1692426"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Van De Weijer, S.G.A., Leukfeldt, R., Bernasco, W.: Determinants of reporting cybercrime: a comparison between identity theft, consumer fraud, and hacking. Eur. J. Criminol. 16, 486\u2013508 (2018)","DOI":"10.1177\/1477370818773610"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Trozze, A., et al.: Cryptocurrencies and future financial crime. Crime Sci. 11(1) (2022)","DOI":"10.1186\/s40163-021-00163-8"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Cross, C., Richards, K., Smith, R.G.: \u201cThe Reporting Experiences and Support Needs of Victims of Online Fraud,\u201d Trends and Issues in Crime and Criminal Justice, pp. 1\u201314, 1 August 2016","DOI":"10.52922\/ti148355"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Cross, C.: Expectations vs reality: responding to online fraud across the fraud justice network. Int. J. Law Crime Justice 55, 1\u201312 (2018)","DOI":"10.1016\/j.ijlcj.2018.08.001"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Cross, C., Layt, R.: \u201cI Suspect That the Pictures are Stolen\u201d: romance fraud, identity crime, and responding to suspicions of inauthentic identities. Soc. Sci. Comput. Rev. 40, 955\u2013973 (2021)","DOI":"10.1177\/0894439321999311"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Parti, K., Tahir, F.: \u201cIf We Don\u2019t Listen to Them, We Make Them Lose More than Money:\u201d exploring reasons for underreporting and the needs of older scam victims. Soc. Sci. 12, 264 (2023)","DOI":"10.3390\/socsci12050264"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Reyns, B.W., Randa, R.: Victim reporting behaviors following identity theft victimization: results from the national crime victimization survey. Crime Delinquency 63, 814\u2013838 (2015)","DOI":"10.1177\/0011128715620428"},{"key":"29_CR12","unstructured":"GLACY project, Good practice study Cybercrime Reporting Mechanisms, 9 September 2014"},{"key":"29_CR13","unstructured":"United States Government Accountability Office, Reporting Mechanisms Vary, and Agencies Face Challenges in Developing Metrics Report to Congressional Committees, June 2023"},{"key":"29_CR14","unstructured":"Sikra, J., Renaud, K.V., Thomas, D.R.: UK Cybercrime, Victims and Reporting: A Systematic Review (2023)"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Button, M., Nicholls, C.M., Kerr, J., Owen, R.: Online frauds: learning from victims why they fall for these scams. Aust. New Zealand J. Criminol. 47, 391\u2013408 (2014)","DOI":"10.1177\/0004865814521224"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Lavena, C.F.: Whistle-blowing. Am. Rev. Public Adm. 46, 113\u2013136 (2014)","DOI":"10.1177\/0275074014535241"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Reyns, B.W., Englebrecht, C.M.: Informal and formal help-seeking decisions of stalking victims in the United States. Crim. Justice Behav. 41, 1178\u20131194 (2014)","DOI":"10.1177\/0093854814541441"},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Cross, C.: No laughing matter. Int. Rev. Victimol. 21, 187\u2013204 (2015)","DOI":"10.1177\/0269758015571471"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Bidgoli, M., Grossklags, J.: \u201cHello. This is the IRS calling.\u201d A Case Study on Scams, Extortion, Impersonation, and Phone Spoofing (2017)","DOI":"10.1109\/ECRIME.2017.7945055"},{"key":"29_CR20","doi-asserted-by":"crossref","unstructured":"Cross, C.: Victims\u2019 motivations for reporting to the \u2018fraud justice network. Police Pract. Res. 19, 550\u2013564 (2018)","DOI":"10.1080\/15614263.2018.1507891"},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Cross, C.: Reflections on the reporting of fraud in Australia. PIJPSM 43, 49\u201361 (2019)","DOI":"10.1108\/PIJPSM-08-2019-0134"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Van De Weijer, S., Leukfeldt, R., Van Der Zee, S.: Reporting cybercrime victimization: determinants, motives, and previous experiences. PIJPSM 43, 17\u201334 (2020)","DOI":"10.1108\/PIJPSM-07-2019-0122"},{"key":"29_CR23","doi-asserted-by":"crossref","unstructured":"Kemp, S.: Fraud reporting in Catalonia in the Internet era: determinants and motives. Eur. J. Criminol. 19, 994\u20131015 (2020)","DOI":"10.1177\/1477370820941405"},{"key":"29_CR24","doi-asserted-by":"crossref","unstructured":"Cross, C., Lee, M.: Exploring fear of crime for those targeted by romance fraud. Victims Offenders 17, 735\u2013755 (2022)","DOI":"10.1080\/15564886.2021.2018080"},{"key":"29_CR25","doi-asserted-by":"crossref","unstructured":"Fonseca, C., Moreira, S., Guedes, I.: Online consumer fraud victimization and reporting: a quantitative study of the predictors and motives. Victims Offenders 17, 756\u2013780 (2022)","DOI":"10.1080\/15564886.2021.2015031"},{"key":"29_CR26","doi-asserted-by":"crossref","unstructured":"Cross, C.: :I knew it was a scam\u201d: understanding the triggers for recognizing romance fraud. Criminol. Public Policy 22, 613\u2013637 (2023)","DOI":"10.1111\/1745-9133.12645"},{"key":"29_CR27","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1002\/hbe2.195","volume":"2","author":"I Ajzen","year":"2020","unstructured":"Ajzen, I.: The theory of planned behavior: frequently asked questions. Hum. Behav. Emerg. Technol. 2, 314\u2013324 (2020)","journal-title":"Hum. Behav. Emerg. Technol."},{"key":"29_CR28","doi-asserted-by":"crossref","unstructured":"Sommer, L.: The theory of planned behaviour and the impact of past behavior (2011)","DOI":"10.19030\/iber.v10i1.930"},{"key":"29_CR29","doi-asserted-by":"crossref","unstructured":"Latan, H., Chiappetta Jabbour, C.J., Lopes de Sousa Jabbour, A.B.: To blow or not to blow the whistle: the role of rationalization in the perceived seriousness of threats and wrongdoing. J. Bus. Ethics 169, 517\u2013535 (2021)","DOI":"10.1007\/s10551-019-04287-5"},{"key":"29_CR30","unstructured":"Baird, J.E., Zelin, R., Olson, K.C.: Occupational Fraud: A Comparison of Perceptions of Law Enforcement Majors, Accounting Majors, and Other Business Majors, vol. 8 (2016)"},{"key":"29_CR31","unstructured":"Apadore, K., et al.: Factors affecting whistleblowing intention: an empirical study, vol. 15 (2018)"},{"key":"29_CR32","doi-asserted-by":"crossref","unstructured":"Abbas, N., Ashiq, U.: Why I don\u2019t Blow the Whistle? Perceived barriers by the university teachers to report wrongngs. Liberal Arts Soc. Sci. Int. J. 4, 84\u201397 (2020)","DOI":"10.47264\/idea.lassij\/4.2.8"},{"key":"29_CR33","doi-asserted-by":"crossref","unstructured":"Jeon, S.H.: Where to report wrongngs? Exploring the determinants of internal versus external whistleblowing. Int. Rev. Public Adm. 22, 153\u2013171 (2017)","DOI":"10.1080\/12294659.2017.1315235"},{"key":"29_CR34","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.protcy.2013.12.068","volume":"9","author":"S Ramingwong","year":"2013","unstructured":"Ramingwong, S., Snansieng, S.: A survey on mum effect and its influencing factors. Procedia Technol. 9, 618\u2013626 (2013)","journal-title":"Procedia Technol."},{"key":"29_CR35","doi-asserted-by":"crossref","unstructured":"Khan, J., et al.: Examining whistleblowing intention: the influence of rationalization on wrongdoing and threat of retaliation. Int. J. Environ. Res. Public Health 19, 1752 (2022)","DOI":"10.3390\/ijerph19031752"},{"key":"29_CR36","unstructured":"Zawawi, S., Jusoff, K., Rahman, R.A., Idris, K.M.: Behavioural intention for fraudulent reporting behaviour using cognitive theory (2008)"},{"key":"29_CR37","unstructured":"Keller, P.H., Miller, M.K.: Using the theory of planned behavior to predict crime reporting intent (2022)"},{"key":"29_CR38","unstructured":"Australian Cyber Security Center, \u201cReport Cyber\u201d (2024)"},{"key":"29_CR39","unstructured":"National anti-scam centre, \u201cScamwatch\u201d (2024)"},{"key":"29_CR40","unstructured":"National Fraud & Cybercrime Reporting Center, \u201cActionFraud\u201d (2024)"},{"key":"29_CR41","unstructured":"Internet Crime Complaint Center, \u201cInternet Crime Complaint Centre (IC3)\u201d (2024)"},{"key":"29_CR42","doi-asserted-by":"crossref","unstructured":"Delhey, J., Newton, K.: Who trusts? The origins of social trust in seven societies. Eur. Soc. 5, 93\u2013137 (2003)","DOI":"10.1080\/1461669032000072256"},{"key":"29_CR43","unstructured":"Tamilina, L.: Theories of social trust formation: a brief literature overview, 1 January 2018"},{"key":"29_CR44","doi-asserted-by":"crossref","unstructured":"Opp, K.: Self-control theory. In: Analytical Criminology, pp. 155\u2013169, 27 September 2020","DOI":"10.4324\/9780429026980-12"},{"key":"29_CR45","doi-asserted-by":"crossref","unstructured":"Gottfredson, M., Criminology: Self-control theory and crime, 27 July 2017","DOI":"10.1093\/acrefore\/9780190264079.013.252"},{"key":"29_CR46","doi-asserted-by":"crossref","unstructured":"Uher, I., Cholewa, J., Kunicki, M., Cimbolakov\u00e1, I., Ka\u0161ko, D.: motivation and its basic theories. JPFMTS 1(5) (2018)","DOI":"10.19080\/JPFMTS.2018.01.555572"},{"key":"29_CR47","doi-asserted-by":"crossref","unstructured":"Nanayakkara, K., Wilkinson, S.: Organisational culture theories. In: A Handbook of Theories on Designing Alignment between People and the Office Environment, pp. 132\u2013147 (2021)","DOI":"10.1201\/9781003128830-12"},{"key":"29_CR48","unstructured":"Hansson, S.O.: An Overview of Decision Theory (1991)"},{"key":"29_CR49","doi-asserted-by":"crossref","unstructured":"Turpin, S.M., Marais, M.A.: Decision-making: theory and practice. ORiON 20(2), 143\u2013160 (2004). http:\/\/www.orssa.za","DOI":"10.5784\/20-2-12"},{"key":"29_CR50","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1080\/1463922x.2023.2166623","volume":"25","author":"S Fleury","year":"2023","unstructured":"Fleury, S., Chaniaud, N.: Multi-user centered design: acceptance, user experience, user research, and user testing. Theor. Issues Ergon. Sci. 25, 209 (2023). https:\/\/doi.org\/10.1080\/1463922x.2023.2166623","journal-title":"Theor. Issues Ergon. Sci."}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0570-5_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T01:08:11Z","timestamp":1732928891000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0570-5_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,30]]},"ISBN":["9789819605699","9789819605705"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0570-5_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,30]]},"assertion":[{"value":"30 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Doha","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qatar","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wise2024-qatar.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}