{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T11:40:19Z","timestamp":1767008419114,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":46,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"EU (FP7-SEC-2013)","award":["607642"],"award-info":[{"award-number":["607642"]}]},{"name":"EPSRC","award":["EP\/N028112\/2"],"award-info":[{"award-number":["EP\/N028112\/2"]}]},{"name":"Petroleum Technology Development Fund"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1145\/3041021.3053892","type":"proceedings-article","created":{"date-parts":[[2018,1,11]],"date-time":"2018-01-11T18:39:25Z","timestamp":1515695965000},"page":"1301-1310","source":"Crossref","is-referenced-by-count":7,"title":["Flipping 419 Cybercrime Scams"],"prefix":"10.1145","author":[{"given":"Gibson","family":"Mba","sequence":"first","affiliation":[{"name":"Royal Holloway, University of London, London, United Kingdom"}]},{"given":"Jeremiah","family":"Onaolapo","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"Lorenzo","family":"Cavallaro","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, London, United Kingdom"}]}],"member":"320","reference":[{"unstructured":"L. Ablon and A. A. Libicki, M. C.and Golay. Markets for Cybercrime Tools and Stolen Data: Hacker's Bazzar. http:\/\/www.rand.org\/content\/dam\/rand\/pubs\/research_reports\/RR600\/RR610\/RAND_RR610.pdf, 2014. Accessed: 2014-07-24.","key":"key-10.1145\/3041021.3053892-1"},{"unstructured":"A. Adeniran. The Internet and Emergence of Yahooboys sub-Culcture in Nigeria. International Journal of Cyber Criminology, 2(2):368--381, July-December 2008.","key":"key-10.1145\/3041021.3053892-2"},{"unstructured":"C. C. Aggarwal and C. Zhai. A Survey of Text Clustering Algorithms. https:\/\/pdfs.semanticscholar.org\/88c2\/5e2481ba49cbac75575485cba1759fa4ebcc.pdf, 2012. Accessed: 2016-05-03.","key":"key-10.1145\/3041021.3053892-3"},{"unstructured":"C. Akwaja. NCC Fines MTN Nigeria N1.04trn for SIM Deactivation Default. The Leadership, 26 October 2015. http:\/\/www.leadership.ng\/news\/469815\/ncc-fines-mtn-nigeria-n1-04trn-for-sim-deactivation-default.","key":"key-10.1145\/3041021.3053892-4"},{"unstructured":"R. Anderson, C. Barton, R. Bohme, R. Clayton, M. Eeten, M. Levi, R. Clayton, and S. Savage. Measuring the Cost of Cybercrime. http:\/\/weis2012.econinfosec.org\/papers\/Anderson_WEIS2012.pdf, 2012. Accessed: 2012--11-05.","key":"key-10.1145\/3041021.3053892-5"},{"doi-asserted-by":"crossref","unstructured":"M. Bastian, S. Heymann, and M. Jacomy. Gephi: An open source software for exploring and manipulating networks, 2009.","key":"key-10.1145\/3041021.3053892-6","DOI":"10.1609\/icwsm.v3i1.13937"},{"doi-asserted-by":"crossref","unstructured":"B. E. Boser, I. M. Guyon, and V. N. Vapnik. A Training Algorithm for Optimal Margin Classiers. In Proceedings of the Fifth Annual Workshop on Computational Learning Theory 5, 1992.","key":"key-10.1145\/3041021.3053892-7","DOI":"10.1145\/130385.130401"},{"unstructured":"J. Buchanan and A. J. Grant. Investigating and Prosecuting Nigerian Fraud. United States Attorney's Bulletin, 49(6):39--47, 2001.","key":"key-10.1145\/3041021.3053892-8"},{"unstructured":"N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer. Smote: Synthetic Minority Over-sampling Technique. Journal of Artificial Intelligence Research, 16:321--357, 2002.","key":"key-10.1145\/3041021.3053892-9"},{"unstructured":"N. Christin, S. S. Yanagihara, and K. Kamataki. Dissecting one click frauds. Carnegie Mellon University Technical Report Carnegie Mellon University-CyLab-10-011, 2010. https:\/\/www.andrew.cmu.edu\/user\/nicolasc\/publications\/TR-Carnegie Mellon University-CyLab-10-011.pdf.","key":"key-10.1145\/3041021.3053892-10"},{"unstructured":"N. C. Commission. Sim Registration. http:\/\/www.ncc.gov.ng\/index.php?option=com_content&#38;view=article&#38;id=122&#38;Itemid=113, 2011. Accessed: 2013-07-24.","key":"key-10.1145\/3041021.3053892-11"},{"unstructured":"N. C. Commission. 2013 Year End Subscriber\/Network Data Report for Telecommunications Operating Companies in Nigeria. http:\/\/www.ncc.gov.ng\/index.php?option=com_docman&#38;task=doc_download&#38;gid=563&#38;Itemid=, 2013. Accessed: 2015-11-17.","key":"key-10.1145\/3041021.3053892-12"},{"doi-asserted-by":"crossref","unstructured":"A. Costin, J. Isachenkova, M. Balduzzi, A. Francillon, and D. Balzarotti. The Role of Phone Numbers in Understanding Cyber-Crime Schemes. In Annual Conference on Privacy, Security, and Trust (PST), PST 13, July 2013.","key":"key-10.1145\/3041021.3053892-13","DOI":"10.1109\/PST.2013.6596056"},{"unstructured":"Custominsight.com. Random Samples and Statistical Accuracy. http:\/\/www.custominsight.com\/articles\/random-sampling.asp, 2014. Accessed: 2014-03-03.","key":"key-10.1145\/3041021.3053892-14"},{"unstructured":"Detica. The Cost of Cybercrime. https:\/\/www.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/60942\/THE-COST-OF-CYBER-CRIME-SUMMARY-FINAL.pdf, 2011. Accessed: 2013-03-03.","key":"key-10.1145\/3041021.3053892-15"},{"unstructured":"M. A. Dyrud. I brought you a good news: An analysis of Nigerian 419 letters. In Proceedings of the 2005 Association for Business Communication Annual Convention, 2005.","key":"key-10.1145\/3041021.3053892-16"},{"unstructured":"M. Ester, H.-P. Kriegel, J. Sander, and X. Xu. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. In Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, KDD-96, 1996.","key":"key-10.1145\/3041021.3053892-17"},{"unstructured":"M. C. for Strategic and I. Studies. Net Losses: Estimating the Cost of Cybercrime - Economic Impact of Cybercrime ii. http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-economic-impact-cybercrime2.pdf, 2014. Accessed: 2014-07--23.","key":"key-10.1145\/3041021.3053892-18"},{"unstructured":"Forbes. Africa's 50 Richest. http:\/\/www.forbes.com\/profile\/aliko-dangote\/, 2014. Accessed: 2013-07-24.","key":"key-10.1145\/3041021.3053892-19"},{"doi-asserted-by":"crossref","unstructured":"Y. Gao and G. Zhao. Knowledge-based Information Extraction: a Case Study of Recognizing Emails of Nigerian Frauds. In Natural Language Processing and Information Systems, pages 161--172. Springer, 2005.","key":"key-10.1145\/3041021.3053892-20","DOI":"10.1007\/11428817_15"},{"doi-asserted-by":"crossref","unstructured":"P. Grabosky. The evolution of cybercrime, 2004-2014. RegNet Working Paper, No. 58, Regulatory Institutions Network, 2014.","key":"key-10.1145\/3041021.3053892-21","DOI":"10.2139\/ssrn.2535605"},{"unstructured":"L. Gu. The mobile cybercriminal underground market in china. Trend Micro Research Paper - Cybercriminal Underground Economy Series, 2014. http:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/white-papers\/wp-the-mobile-cybercriminal-underground-market-in-china.pdf.","key":"key-10.1145\/3041021.3053892-22"},{"unstructured":"J. Herhalt. Cyber crime - a growing challenge for governments. KPMG INTERNATIONAL: Issues Monitor - Government on Cyber Crime, 8, 2011.","key":"key-10.1145\/3041021.3053892-23"},{"unstructured":"C. Herley. Why do Nigerian Scammers Say They are from Nigeria? http:\/\/research.microsoft.com\/pubs\/167719\/whyfromnigeria.pdf, 2012. Accessed: 2014-07-24.","key":"key-10.1145\/3041021.3053892-24"},{"doi-asserted-by":"crossref","unstructured":"T. Holz, M. Engelberth, and F. Freiling. Learning more about the underground economy: A case-study of keyloggers and dropzones. In 14th European Symposium on Research in Computer Security, ESORICS 2009, September 2009.","key":"key-10.1145\/3041021.3053892-25","DOI":"10.1007\/978-3-642-04444-1_1"},{"unstructured":"A. Huang. Similarity Measures for Text Document Clustering. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.332.4480&#38;rep=rep1&#38;type=pdf, 2008. Accessed: 2016-05-03.","key":"key-10.1145\/3041021.3053892-26"},{"doi-asserted-by":"crossref","unstructured":"J. Huang, G. Stringhini, and P. Yong. Quit playing games with my heart; understanding online dating scams. In To be Presented In DIMVA 2015, July 2015.","key":"key-10.1145\/3041021.3053892-27","DOI":"10.1007\/978-3-319-20550-2_12"},{"doi-asserted-by":"crossref","unstructured":"J. Isacenkova, O. Thonnard, A. Costin, D. Balzarotti, and A. Francillon. Inside the Scam Jungle: A Closer Look at 419 Scam Email Operations. In Proceedings of the International Workshop on Cyber Crime (co-located with S&#38;P), IWCC 13. IEEE, May 2013.","key":"key-10.1145\/3041021.3053892-28","DOI":"10.1109\/SPW.2013.15"},{"unstructured":"J. Isacenkova, O. Thonnard, A. Costin, A. Francillon, and D. Balzarotti. Inside the Scam Jungle: a Closer Look at 419 Scam Email Operations. http:\/\/jis.eurasipjournals.com\/content\/pdf\/1687-417X-2014-4.pdf, 2014. Accessed: 2014-07-24.","key":"key-10.1145\/3041021.3053892-29"},{"unstructured":"Z. Jianwei, T. Holz, C. Song, J. Guo, X. Han, and W. Zou. Studying malicious websites and the underground economy on the chinese web. In In Proceedings of the 7th Workshop on the Economics of Information Security (WEIS'08), WEIS'08, June 2008.","key":"key-10.1145\/3041021.3053892-30"},{"unstructured":"Z. Jianwei, G. Liang, and D. Haixin. Investigating China's Online Underground Economy. In Conference on the Political Economy of Information Security in China, April 2012.","key":"key-10.1145\/3041021.3053892-31"},{"unstructured":"T. Joachims. Text categorization with support vector machines: Learning with many relevant features. http:\/\/www.cs.cornell.edu\/people\/tj\/publications\/joachims_98a.pdf, 1998. Accessed: 2013-01-24.","key":"key-10.1145\/3041021.3053892-32"},{"unstructured":"KDD. 2014 SIGKDD Test of Time Award. http:\/\/www.kdd.org\/News\/view\/2014-sigkdd-test-of-time-award, 2014. Accessed: 2016-05-03.","key":"key-10.1145\/3041021.3053892-33"},{"doi-asserted-by":"crossref","unstructured":"R. V. Krejcie and D. W. Morgan. Determining Sample Size for Research Activities. Educational and Psychological Measurement, 30:607--610, 1970.","key":"key-10.1145\/3041021.3053892-34","DOI":"10.1177\/001316447003000308"},{"unstructured":"A. A. Kumar and S. Chandrasekhar. Text Data Pre-processing and Dimensionality Reduction Techniques for Document Clustering. International Journal of Engineering Research and Technology (IJERT), 1, 2012.","key":"key-10.1145\/3041021.3053892-35"},{"unstructured":"F. Merc&#234;s. The brazilian underground market: The market for cybercriminal wannabes' Trend Micro Research Paper - Cybercriminal Underground Economy Series, 2014. http:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/white-papers\/wp-the-brazilian-underground-market.pdf.","key":"key-10.1145\/3041021.3053892-36"},{"unstructured":"N. B. of Statistics. 2011 Annual Socio-Economic Report. http:\/\/nigerianstat.gov.ng\/pages\/download\/38, 2011. Accessed: 2013-07-24.","key":"key-10.1145\/3041021.3053892-37"},{"unstructured":"F. Pan, W. Wang, A. K. H. Tung, and J. Yang. Finding Representative Set from Massive Data. In Fifth IEEE International Conference on Data Mining, ICDM'05. IEEE, November 2005.","key":"key-10.1145\/3041021.3053892-38"},{"unstructured":"F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12:2825--2830, 2011.","key":"key-10.1145\/3041021.3053892-39"},{"doi-asserted-by":"crossref","unstructured":"N. Shah and S. Mahajan. Document Clustering: A Detailed Review. International Journal of Applied Information Systems (IJAIS), 4, 2012.","key":"key-10.1145\/3041021.3053892-40","DOI":"10.5120\/ijais12-450691"},{"doi-asserted-by":"crossref","unstructured":"A. Smith. Nigerian scam e-mails and the charms of capital. Cultural Studies, 3(2):27--47, 2009.","key":"key-10.1145\/3041021.3053892-41","DOI":"10.1080\/09502380802016162"},{"doi-asserted-by":"crossref","unstructured":"B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your botnet is my botnet: Analysis of a botnet takeover. In 16th ACM Conference on Computer and Communications Security, CCS 2009, November 2009.","key":"key-10.1145\/3041021.3053892-42","DOI":"10.1145\/1653662.1653738"},{"unstructured":"O. Tade and I. Aliyu. Social Organization of Internet Fraud among University Undergraduates in Nigeria. International Journal of Cyber Criminology, 5(2):860--875, July-December 2011.","key":"key-10.1145\/3041021.3053892-43"},{"unstructured":"C. Tive. 419 Scam: Exploits of the Nigerian Con Man. iUniverse, 2002.","key":"key-10.1145\/3041021.3053892-44"},{"doi-asserted-by":"crossref","unstructured":"Y. Yang and X. Liu. A re-examination of text categorization methods. http:\/\/www2.hawaii.edu\/ chin\/702\/sigir99.pdf, 1999. Accessed: 2013-01--24.","key":"key-10.1145\/3041021.3053892-45","DOI":"10.1145\/312624.312647"},{"unstructured":"M. Yip. An investigation into chinese cybercrime and the applicability of social network analysis. In In ACM WebSci '11, June 2011.","key":"key-10.1145\/3041021.3053892-46"}],"event":{"number":"26","sponsor":["SIGWEB, ACM Special Interest Group on Hypertext, Hypermedia, and Web","IW3C2, International World Wide Web Conference Committee"],"acronym":"WWW '17 Companion","name":"the 26th International Conference","start":{"date-parts":[[2017,4,3]]},"location":"Perth, Australia","end":{"date-parts":[[2017,4,7]]}},"container-title":["Proceedings of the 26th International Conference on World Wide Web Companion - WWW '17 Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041021.3053892","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3053892&ftid=1865275&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:18Z","timestamp":1750215798000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3041021.3053892"}},"subtitle":["Targeting the Weak and the Vulnerable"],"proceedings-subject":"World Wide Web Companion","short-title":[],"issued":{"date-parts":[[2017]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1145\/3041021.3053892","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}