Be a Curious Romantic: Understanding how Romance Fraud Works with Linguistic Analysis
Cybercrimeology15 Joulu 2021

Be a Curious Romantic: Understanding how Romance Fraud Works with Linguistic Analysis

About Our Guest:

Dr Elisabeth Carter

https://www.linkedin.com/in/elisabeth-carter-8b372444

Papers mentioned in this Episode:

Carter, E. (2021). Distort, extort, deceive and exploit: Exploring the inner workings of a romance fraud. The British Journal of Criminology, 61(2), 283-302.

https://doi.org/10.1093/bjc/azaa072

Carter, E. (2015). Laughing matters: A conversation analytic account the use of laughter by suspects and officers in the police interview. Essex Graduate Journal of Sociology, 7(1), 99-113.

https://bucks.repository.guildhe.ac.uk/id/eprint/9401/1/Carter,%20Elisabeth%20Laughing%20matters.pdf

Carter, E. (2015). The anatomy of written scam communications: An empirical analysis. Crime, Media, Culture, 11(2), 89-103.

https://journals.sagepub.com/doi/pdf/10.1177/1741659015572310

A Guide to Spotting Romance Fraudsters

https://www.thamesvalley.police.uk/police-forces/thames-valley-police/areas/c/2020/a-guide-to-spotting-romance-fraudsters

TinEye is a reverse image search tool. You can search with an image for other similar images.

https://tineye.com/

If you can't access that then, you can also reverse image search on google.

https://www.google.com/imghp?hl=en

About our Expert Guest:

Dr. Joshua James

https://dfir.science/

https://www.youtube.com/DFIRScience

What we learned:

What happens where there is a difference in analysis between digital forensics investigators ?

Like physical evidence there is little room for differences regarding the facts of a case. There might be a different in explanation of the meaning of a piece of evidence depending on the story they are presenting. The tools are an instrument of interpreting the meaning of information on a device and tools can make mistakes. Using multiple tools that extract and analyze data from devices reduces the chance of this happening.

Other:

Thanks very much to my neighbours for assisting with the voice over for this episode. I do hope the human/furniture couples ballroom dancing and hollering team goes well in whichever competition you are preparing for. Also thanks to my audio editing software for deciding to have a meltdown and give me the opportunity to do the final mastering twice.

This episode's track is called 'curious diamonds'. Not all of the songs for podcast episodes get a name, but it did this time.

Jaksot(129)

Public Interest Technology: Making Sense of Security in an AI World

Public Interest Technology: Making Sense of Security in an AI World

Notes: The conversation begins with his path into teaching public policy, despite never having planned a conventional academic career, and why translating technical subjects for non-technical studen...

1 Touko 34min

Who You Gonna Call?: Cybercrime Types and Expectations of Police Response

Who You Gonna Call?: Cybercrime Types and Expectations of Police Response

Notes: Cybercrime is often treated as a distinct phenomenon, but there are strong continuities with offline crime that are frequently overlooked. Digital technologies change behaviour and scale, bu...

1 Huhti 30min

Disordered Sense-Making: Conflict Narratives in the Digital Era

Disordered Sense-Making: Conflict Narratives in the Digital Era

Notes: Dr Samuel Tanner began his doctoral research examining war crimes and armed militias involved in mass violence in the Balkans, conducting extensive fieldwork and interviews with participants ...

1 Maalis 36min

Beyond “The Cybercriminal”: Understanding Diversity in Cyber Offenders

Beyond “The Cybercriminal”: Understanding Diversity in Cyber Offenders

Notes:Dr Bekkers describes his academic pathway from psychology to criminology and explains why his research focus has consistently been on offenders and their behaviour rather than on offences or tec...

1 Helmi 25min

Systematically Improving Cybersecurity Training

Systematically Improving Cybersecurity Training

Notes:Julia Prümmer describes her transition from legal psychology into cybersecurity research and how psychological methods shape her approach to cybersecurity training.The discussion explores the ro...

1 Tammi 49min

The Human beneath the Hoodie: Profiling pathways into cybercrime

The Human beneath the Hoodie: Profiling pathways into cybercrime

otes:Melissa completed her PhD after two decades of operational work, bringing a pracademic perspective to cyber profiling and offender pathways.Her research focuses on understanding the human behind ...

1 Joulu 202533min

Courses, Clicks and Consequences: Empiricizing Enterprise Security

Courses, Clicks and Consequences: Empiricizing Enterprise Security

Episode Notes:Dr Ho describes an empirical research agenda focused on how security actually operates in organisations. He explains his experience with getting this research off the ground to allow the...

1 Marras 20251h 4min

The many minds of MITRE: building multidisciplinary human insider-risk research

The many minds of MITRE: building multidisciplinary human insider-risk research

Trigger warning: This episode includes discussion of suicide in the context of researching measurable predictive indicators and the lack thereof in the context of cyber. Episode NotesDr Caputo's path ...

1 Loka 202544min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
psykopodiaa-podcast
voi-hyvin-meditaatiot-2
adhd-podi
rss-niinku-asia-on
rss-liian-kuuma-peruna
rss-rahamania
jari-sarasvuo-podcast
psykologia
rss-valo-minussa-2
rss-tietoinen-yhteys-podcast-2
kesken
rss-arkea-ja-aurinkoa-podcast-espanjasta
rss-narsisti
rss-vapaudu-voimaasi
rahapuhetta
filocast-filosofian-perusteet
ihminen-tavattavissa-tommy-hellsten-instituutti
kehossa
rss-psykalab