{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T19:06:07Z","timestamp":1772823967344,"version":"3.50.1"},"reference-count":147,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Social Science Fund of China","award":["18BSH021"],"award-info":[{"award-number":["18BSH021"]}]},{"name":"social co-governance"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Eng. Manage."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tem.2020.3002784","type":"journal-article","created":{"date-parts":[[2020,7,14]],"date-time":"2020-07-14T21:01:06Z","timestamp":1594760466000},"page":"3726-3738","source":"Crossref","is-referenced-by-count":9,"title":["Organized Cyber-Racketeering: Exploring the Role of Internet Technology in Organized Cybercrime Syndicates Using a Grounded Theory Approach"],"prefix":"10.1109","volume":"69","author":[{"given":"Jie","family":"Jian","sequence":"first","affiliation":[{"name":"Chongqing University of Posts and Telecommunications, Chongqing, China"}]},{"given":"Siqi","family":"Chen","sequence":"additional","affiliation":[{"name":"Chongqing University of Posts and Telecommunications, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0122-7293","authenticated-orcid":false,"given":"Xin","family":"Luo","sequence":"additional","affiliation":[{"name":"The University of New Mexico, Albuquerque, NM, USA"}]},{"given":"Tien","family":"Lee","sequence":"additional","affiliation":[{"name":"San Francisco State University, San Francisco, CA, USA"}]},{"given":"Xiaoming","family":"Yu","sequence":"additional","affiliation":[{"name":"Chongqing University of Posts and Telecommunications, Chongqing, China"}]}],"member":"263","reference":[{"key":"ref39","author":"jia","year":"2015","journal-title":"Network Fraud Crime Research"},{"key":"ref38","first-page":"24","article-title":"Out of the beta phase: Obstacles, challenges, and promising paths in the study of cyber criminology","volume":"9","author":"brown","year":"2015","journal-title":"International Journal of Cyber Criminology"},{"key":"ref33","first-page":"1","article-title":"An extended model of cybercrime investigations","volume":"3","author":"ciardhu\u00e1in","year":"2004","journal-title":"International Journal of Digital Evidence"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654816"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.08.004"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s12117-008-9038-9"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10611-007-9072-6"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260308"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.1987.tb00826.x"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/BF00988593"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2014.1001257"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1013202.1013203"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.09.009"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.48"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1108\/13639510610684674"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1111\/j.1751-9020.2008.00172.x"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/S0033-3182(68)71872-7"},{"key":"ref23","first-page":"1","article-title":"An analysis of the nature of groups engaged in cyber crime","volume":"8","author":"broadhurst","year":"2014","journal-title":"International Journal of Cyber Criminology"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ICMIT.2016.7605037"},{"key":"ref26","first-page":"31","article-title":"Grounded theory in historical perspective: An epistemological account","author":"bryant","year":"2010","journal-title":"The Handbook of Grounded Theory"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/1498765.1498782"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1201\/1078\/45099.22.2.20050301\/87278.7"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2011.940293"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.24"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.2307\/2391262"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1108\/JMLC-10-2014-0035"},{"key":"ref59","first-page":"289","article-title":"A control theory of delinquency","volume":"1969","author":"hirschi","year":"1969","journal-title":"Criminol Theory Sel Classic Read"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2835375"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.09.032"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222280208"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.08.002"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s11417-007-9034-z"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(07)70021-0"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0015-z"},{"key":"ref40","first-page":"783","article-title":"User behaviour based phishing websites detection","author":"dong","year":"2008","journal-title":"Proc IEEE Int Multiconf Comput Sci Inf Technol"},{"key":"ref4","first-page":"1","volume":"20","author":"ajzen","year":"1987","journal-title":"Attitudes Traits and Actions Dispositional Prediction of Behavior in Personality and Social Psychology[M]\/\/Advances in Experimental Social Psychology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1037\/h0076477"},{"key":"ref6","first-page":"508","article-title":"Social engineering in social networking sites: Affect-based model","author":"algarni","year":"2013","journal-title":"Proc IEEE 8th Int Conf Internet Technol Secured Trans"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32699-3_2"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0053"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2005.10.004"},{"key":"ref9","article-title":"Analysis of delinquency and aggression","author":"erlbaum","year":"1976"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1108\/09685220410530799"},{"key":"ref45","author":"finklea","year":"2009","journal-title":"Organized Crime in the United States Trends and Issues for Congress"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1080\/10658980601144915"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1080\/08870440903194015"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1257\/jep.10.1.43"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1086\/260058"},{"key":"ref44","first-page":"119","author":"felson","year":"2017","journal-title":"Linking Criminal Choices Routine Activities Informal Control and Criminal Outcomes"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1080\/15567281.2010.536731"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/2019599.2019606"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2472993"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222270111"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701788165"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3003147"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1334499"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.32"},{"key":"ref71","first-page":"1","article-title":"Cyber criminology: Evolving a novel discipline with a new journal","volume":"1","author":"jaishankar","year":"2007","journal-title":"International Journal of Cyber Criminology"},{"key":"ref128","first-page":"26","article-title":"Lexon insurance: Cyberfraud&#x2014;A serious ongoing risk","volume":"40","author":"young","year":"2020","journal-title":"Proctor"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.032213.00009"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.002"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.12.001"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222250205"},{"key":"ref75","article-title":"Study on the international judicial cooperation in criminal matters in fighting against cross-border telecommunications fraud crime: A case study of &#x201C;9.27&#x201D; cross-border telecommunications fraud","author":"kai","year":"2017"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1080\/10580530701585823"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1111\/hojo.12123"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1002\/sec.331"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s11623-006-0141-2"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242659"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.intman.2005.09.009"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1177\/1748895808096470"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.4324\/9781315679877"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1007\/s10611-016-9649-z"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.7249\/RR610"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2016.1205924"},{"key":"ref139","article-title":"Internet Organised Crime Threat Assessment (IOCTA 2017)","year":"2017"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1080\/14789949.2011.617540"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063197"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2009.12"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.2.08"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/s10611-016-9645-3"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.09.005"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/6091702"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2010.11.001"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azv011"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.110"},{"key":"ref143","article-title":"The discovery of grounded theory: Strategies for qualitative research","volume":"46","author":"glaser","year":"1967","journal-title":"Social Forces"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2428556.2428563"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1080\/17440572.2012.759508"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2307\/3250951"},{"key":"ref69","year":"0"},{"key":"ref145","first-page":"80","article-title":"The role of basic need gratification in psychological theory","author":"maslow","year":"1954","journal-title":"Motivationa and Personality"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2014.1001260"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1063315"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1296747"},{"key":"ref108","first-page":"268","article-title":"Dismantling the internet mafia: RICO's applicability to cyber crime","volume":"41","author":"salvador","year":"2015","journal-title":"Rutgers Comput Technol Law J"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.2307\/249774"},{"key":"ref107","first-page":"202","article-title":"Cyber-crimes and their impacts: A review","volume":"2","author":"saini","year":"2012","journal-title":"Int J Eng Res Appl"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime.2011.6151979"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1177\/0001839216678842"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1177\/160940690600500103"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2410795"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/s10611-007-9059-3"},{"key":"ref104","article-title":"Understanding the influence of cybercrime risk on the e-service adoption of European Internet users","author":"riek","year":"2014","journal-title":"Proc 13th Workshop Econ Inf Secur"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1207\/s15326985ep2403_4"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.68"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0174"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.04.005"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1177\/104398629300900306"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.08.019"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222250206"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1080\/01972240802191670"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/MAHC.2007.15"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(01)01021-5"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2307\/25148792"},{"key":"ref11","first-page":"228","article-title":"Vicarious and self-reinforcement processes","author":"bandura","year":"1971","journal-title":"Nature of Reinforcement"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.44.9.1175"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.52.1.1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0122"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1177\/104973239300300207"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2014.995535"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0965-2590(09)70057-X"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2016.1267528"},{"key":"ref117","first-page":"18","article-title":"Cyberrisk landscape","volume":"65","author":"tuttle","year":"2018","journal-title":"Risk Manage"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2016.1205918"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/s12117-018-9342-y"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(01)00604-6"},{"key":"ref84","first-page":"3","article-title":"Traditional crime networking: imputation obstacles, criminal law response and doctrine limitation","volume":"2","author":"liang","year":"2017","journal-title":"The Law"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1080\/10658980601051458"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2307\/3250921"},{"key":"ref83","article-title":"Research on the influencing factors of formation of cross-border telecommunication network fraud","author":"xinxin","year":"2019"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1080\/10580530802384639"},{"key":"ref113","first-page":"192","article-title":"Escalation of organized cybercrime activities","author":"stancu","year":"2018","journal-title":"Proc Int Conf Educ Creativity Knowl Soc"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222220405"},{"key":"ref80","article-title":"Pulling fraud out of the shadows: Global Economic Crime and Fraud Survey 2018","year":"2018"},{"key":"ref115","first-page":"497","article-title":"A survey of digital evidences forensic and cybercrime investigation procedure","volume":"17","author":"sun","year":"2015","journal-title":"Int J Netw Secur"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2677113"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2.3.173"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2012.2208392"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.31"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2014.931491"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1177\/105649269653008"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701576412"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2014.2377295"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.07.003"}],"container-title":["IEEE Transactions on Engineering Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/17\/9993768\/09140036.pdf?arnumber=9140036","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,22]],"date-time":"2022-12-22T17:26:00Z","timestamp":1671729960000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9140036\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":147,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tem.2020.3002784","relation":{},"ISSN":["0018-9391","1558-0040"],"issn-type":[{"value":"0018-9391","type":"print"},{"value":"1558-0040","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}