{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:30:18Z","timestamp":1757453418772,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:00:00Z","timestamp":1604534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:00:00Z","timestamp":1604534400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:00:00Z","timestamp":1604534400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,5]]},"DOI":"10.1109\/besc51023.2020.9348307","type":"proceedings-article","created":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T22:37:40Z","timestamp":1619131060000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Contextualised Cyber Security Awareness Approach for Online Romance Fraud"],"prefix":"10.1109","author":[{"given":"Sara","family":"Dickerson","sequence":"first","affiliation":[{"name":"Faculty of Science and Technology, Bournemouth University,Poole,United Kingdom"}]},{"given":"Edward","family":"Apeh","sequence":"additional","affiliation":[{"name":"Faculty of Science and Technology, Bournemouth University,Poole,United Kingdom"}]},{"given":"Gail","family":"Ollis","sequence":"additional","affiliation":[{"name":"Faculty of Science and Technology, Bournemouth University,Poole,United Kingdom"}]}],"member":"263","reference":[{"journal-title":"Bias in Psychological Research ? Boundless Psychology","year":"0","key":"ref33"},{"journal-title":"Scamalytics ? Stop Scammers Automatically","year":"2019","key":"ref32"},{"journal-title":"Action Fraud data now available to dating services via Scamalytics ? Scamalytics","year":"2018","key":"ref31"},{"journal-title":"ODA ? Date Safe","year":"2017","key":"ref30"},{"journal-title":"Uses and Benefits of the Framework ? Nist","year":"0","key":"ref34"},{"journal-title":"Online dating fraud victim numbers at record high","year":"2017","author":"cacciottolo","key":"ref10"},{"journal-title":"Over half of those looking for love online vulnerable to romance scams ? UK Finance","year":"2020","author":"finance","key":"ref11"},{"journal-title":"victims in 63% of romance scams","year":"2019","author":"peachey","key":"ref12"},{"journal-title":"Online dating romance scam - causes and consequences of victimhood","year":"2012","author":"buchanan","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11896-019-09334-5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2017.00588"},{"journal-title":"Do You Love Me? Psychological Characteristics of Romance Scam Victims","year":"2017","author":"whitty","key":"ref16"},{"key":"ref17","first-page":"116","article-title":"Online Daters and the Use of Technology for Surveillance and Risk Management","volume":"9","author":"couch","year":"2011","journal-title":"Int J Emerg Technol Soc"},{"journal-title":"Zero Trust Security - Cisco","year":"2020","key":"ref18"},{"journal-title":"Britons less trusting of social media than other major nations ? World news ? The Guardian","year":"2019","author":"hern","key":"ref19"},{"journal-title":"Check if you can get your money back after a scam - Citizens Advice","year":"2020","key":"ref28"},{"journal-title":"The Online Dating Romance Scam A Serious Crime","year":"2012","author":"whitty","key":"ref4"},{"journal-title":"Banks disagree on how to pay for fraud refunds - BBC News","year":"2019","key":"ref27"},{"key":"ref3","article-title":"Fall for the person, not the profile","author":"fraud","year":"0","journal-title":"ActionFraud"},{"journal-title":"The online dating romance scam The psychological impact on victims - both financial and non-financial","year":"2016","author":"whitty","key":"ref6"},{"journal-title":"How to get your money back after a scam","year":"2020","key":"ref29"},{"journal-title":"Mass Marketing Fraud","year":"2017","key":"ref5"},{"journal-title":"Quit Playing Games With My Heart Understanding Online Dating Scams","year":"2015","author":"huang","key":"ref8"},{"journal-title":"Cyber Kill Chain&#x00AE; Lockheed Martin","year":"2020","key":"ref7"},{"journal-title":"Romance fraud","year":"0","key":"ref2"},{"journal-title":"The scammers persuasive techniques model development of a stage model to explain the online dating romance scam - WRAP Warwick Research Archive Portal","year":"2013","author":"whitty","key":"ref9"},{"journal-title":"Don't invest your heart in a fauxmance victims lose over &#x00A3;50 million to romance fraud ? Action Fraud","year":"2019","author":"fraud","key":"ref1"},{"journal-title":"Romance fraud ? Action Fraud","year":"2020","author":"fraud","key":"ref20"},{"journal-title":"ODA ? Homepage","year":"2017","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/aps.42"},{"journal-title":"Tinder Introduces Safety-Focused Updates","year":"2020","key":"ref24"},{"journal-title":"ODA ? Framework for User Safety","year":"2017","key":"ref23"},{"journal-title":"Scam victims to be refunded by banks - BBC News","year":"2020","author":"peachey","key":"ref26"},{"journal-title":"Deepfake technology Can you spot what's real? - BBC News","year":"2020","key":"ref25"}],"event":{"name":"2020 7th International Conference on Behavioural and Social Computing (BESC)","start":{"date-parts":[[2020,11,5]]},"location":"Bournemouth, United Kingdom","end":{"date-parts":[[2020,11,7]]}},"container-title":["2020 7th International Conference on Behavioural and Social Computing (BESC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9348100\/9348278\/09348307.pdf?arnumber=9348307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:48:59Z","timestamp":1656452939000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9348307\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,5]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/besc51023.2020.9348307","relation":{},"subject":[],"published":{"date-parts":[[2020,11,5]]}}}