{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T20:53:33Z","timestamp":1768683213751,"version":"3.49.0"},"publisher-location":"New York, New York, USA","reference-count":13,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"EPSRC","award":["Ep\/N028112\/1"],"award-info":[{"award-number":["Ep\/N028112\/1"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1145\/3041021.3053891","type":"proceedings-article","created":{"date-parts":[[2018,1,11]],"date-time":"2018-01-11T18:39:25Z","timestamp":1515695965000},"page":"1311-1314","source":"Crossref","is-referenced-by-count":1,"title":["Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF)"],"prefix":"10.1145","author":[{"given":"Monica","family":"Whitty","sequence":"first","affiliation":[{"name":"University of Warwick, Warwick, United Kingdom"}]},{"given":"Matthew","family":"Edwards","sequence":"additional","affiliation":[{"name":"University of Lancaster, Lancaster, United Kingdom"}]},{"given":"Michael","family":"Levi","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom"}]},{"given":"Claudia","family":"Peersman","sequence":"additional","affiliation":[{"name":"University of Lancaster, Lancaster, United Kingdom"}]},{"given":"Awais","family":"Rashid","sequence":"additional","affiliation":[{"name":"University of Lancaster, Lancaster, United Kingdom"}]},{"given":"Angela","family":"Sasse","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"Tom","family":"Sorell","sequence":"additional","affiliation":[{"name":"University of Warwick, Warwick, United Kingdom"}]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]}],"member":"320","reference":[{"key":"key-10.1145\/3041021.3053891-1","doi-asserted-by":"crossref","unstructured":"T. Buchanan and M. T. Whitty. The online dating romance scam: causes and consequences of victimhood. Psychology, Crime &#38; Law, 20(3):261--283, 2014.","DOI":"10.1080\/1068316X.2013.772180"},{"key":"key-10.1145\/3041021.3053891-2","unstructured":"G. Gu, P. A. Porras, V. Yegneswaran, M. W. Fong, and W. Lee. Bothunter: Detecting malware infection through ids-driven dialog correlation. In Usenix Security, volume 7, pages 1--16, 2007."},{"key":"key-10.1145\/3041021.3053891-3","doi-asserted-by":"crossref","unstructured":"J. T. Hancock, L. Curry, S. Goorha, and M. Woodworth. Automated linguistic analysis of deceptive and truthful synchronous computer-mediated communication. In System Sciences, 2005. HICSS'05. Proceedings of the 38th Annual Hawaii International Conference on, pages 22c--22c. IEEE, 2005.","DOI":"10.1109\/HICSS.2005.111"},{"key":"key-10.1145\/3041021.3053891-4","doi-asserted-by":"crossref","unstructured":"J. Huang, G. Stringhini, and P. Yong. Quit playing games with my heart: Understanding online dating scams. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pages 216--236. Springer, 2015.","DOI":"10.1007\/978-3-319-20550-2_12"},{"key":"key-10.1145\/3041021.3053891-5","unstructured":"S. Lea, P. Fischer, and K. M. Evans. The economic psychology of scams. International Association for Research in Economic Psychology and the Society for the Advancement of Behavioral Economics, Nova Scotia, Canada, 2009."},{"key":"key-10.1145\/3041021.3053891-6","doi-asserted-by":"crossref","unstructured":"D. Modic and R. J. Anderson. We will make you like our research: The development of a susceptibility-to persuasion scale. Social Science Research Network, 2014.","DOI":"10.2139\/ssrn.2446971"},{"key":"key-10.1145\/3041021.3053891-7","doi-asserted-by":"crossref","unstructured":"A. Rashid, K. Moore, C. May-Chahal, and R. Chitchyan. Managing emergent ethical concerns for software engineering in society. In Software Engineering (ICSE), 2015 IEEE\/ACM 37th IEEE International Conference on, volume 2, pages 523--526. IEEE, 2015.","DOI":"10.1109\/ICSE.2015.187"},{"key":"key-10.1145\/3041021.3053891-8","doi-asserted-by":"crossref","unstructured":"A. Sasse. Scaring and bullying people into security won't work. IEEE Security &#38; Privacy, 13(3):80--83, 2015.","DOI":"10.1109\/MSP.2015.65"},{"key":"key-10.1145\/3041021.3053891-9","doi-asserted-by":"crossref","unstructured":"D. Weirich and M. A. Sasse. Persuasive password security. In CHI'01 Extended Abstracts on Human Factors in Computing Systems, pages 139--140. ACM, 2001.","DOI":"10.1145\/634067.634152"},{"key":"key-10.1145\/3041021.3053891-10","doi-asserted-by":"crossref","unstructured":"M. T. Whitty. The scammers persuasive techniques model: Development of a stage model to explain the online dating romance scam. British Journal of Criminology, 53(4):665--684, 2013.","DOI":"10.1093\/bjc\/azt009"},{"key":"key-10.1145\/3041021.3053891-11","doi-asserted-by":"crossref","unstructured":"M. T. Whitty. Mass-marketing fraud: a growing concern. IEEE Security &#38; Privacy, 13(4):84--87, 2015.","DOI":"10.1109\/MSP.2015.85"},{"key":"key-10.1145\/3041021.3053891-12","doi-asserted-by":"crossref","unstructured":"M. T. Whitty and T. Buchanan. The online dating romance scam: The psychological impact on victims{both financial and non-financial. Criminology &#38; Criminal Justice, 16(2):176--194, 2016.","DOI":"10.1177\/1748895815603773"},{"key":"key-10.1145\/3041021.3053891-13","doi-asserted-by":"crossref","unstructured":"L. Zhou, J. K. Burgoon, J. F. Nunamaker, and D. Twitchell. Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications. Group decision and negotiation, 13(1):81--106, 2004.","DOI":"10.1023\/B:GRUP.0000011944.62889.6f"}],"event":{"name":"the 26th International Conference","location":"Perth, Australia","acronym":"WWW '17 Companion","number":"26","sponsor":["SIGWEB, ACM Special Interest Group on Hypertext, Hypermedia, and Web","IW3C2, International World Wide Web Conference Committee"],"start":{"date-parts":[[2017,4,3]]},"end":{"date-parts":[[2017,4,7]]}},"container-title":["Proceedings of the 26th International Conference on World Wide Web Companion - WWW '17 Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041021.3053891","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3053891&ftid=1865271&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:18Z","timestamp":1750215798000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3041021.3053891"}},"subtitle":[],"proceedings-subject":"World Wide Web Companion","short-title":[],"issued":{"date-parts":[[2017]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1145\/3041021.3053891","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}