Linguistic deception of Chinese cyber fraudsters
Cybercrimes are on the increase in China and ‘QQ’, an instant messenger platform, is frequently exploited for these crimes. Fraudsters manipulate language to deceive users into revealing their bank accounts or depositing sums in the cheats’ accounts. Employing the theoretical framework that includ...
| Main Authors: | Tan, Kim Hua, Guilani, Mohammad Abdollahi, Chen, Chenzi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit Universiti Kebangsaan Malaysia
2017
|
| Online Access: | http://journalarticle.ukm.my/12846/ http://journalarticle.ukm.my/12846/1/17542-60013-1-PB.pdf |
Similar Items
Exploring recipients' perceptions of impression management in the workplace : insights from comparing fraudster and non-fraudster executives
by: Sheridan, Terry A.
Published: (2010)
by: Sheridan, Terry A.
Published: (2010)
A cyber-consumer protection framework for prevention of online deceptive advertising
by: Al Adwan, Ahmad
Published: (2012)
by: Al Adwan, Ahmad
Published: (2012)
Application of binomials in English and Persian
by: Guilani, Mohammad Abdollahi, et al.
Published: (2017)
by: Guilani, Mohammad Abdollahi, et al.
Published: (2017)
Linguistic cues of deception in Malaysian online investment scams’ promotional materials
by: Ameiruel Azwan Ab Aziz,, et al.
Published: (2023)
by: Ameiruel Azwan Ab Aziz,, et al.
Published: (2023)
Deceptive Marketing
by: Firdaus, Humairah Fahima Hairanil, et al.
Published: (2020)
by: Firdaus, Humairah Fahima Hairanil, et al.
Published: (2020)
Deception and communication media
by: Brundell, Patrick Robert
Published: (2013)
by: Brundell, Patrick Robert
Published: (2013)
Deception and self-awareness
by: Lawson, Glyn, et al.
Published: (2011)
by: Lawson, Glyn, et al.
Published: (2011)
Negativity as criteria for newsworthiness in Malaysian newspaper sports corpus
by: Kim, Hua Tan, et al.
Published: (2017)
by: Kim, Hua Tan, et al.
Published: (2017)
A Comparative analysis of conditional clauses in english and persian: text analysis
by: Mohammad Abdollahi-Guilani,, et al.
Published: (2012)
by: Mohammad Abdollahi-Guilani,, et al.
Published: (2012)
Unethical University Operations: Deception in Disguise
by: Ansah, Richard Hannis, et al.
Published: (2017)
by: Ansah, Richard Hannis, et al.
Published: (2017)
Gender and cultural differences in self-deception
by: Che Roslan, Che Nurul Herdawatti, et al.
Published: (2014)
by: Che Roslan, Che Nurul Herdawatti, et al.
Published: (2014)
A classification of deception in operations and supply chain management: A case study of deception in Australian souvenir markets
by: Plant, Amy, et al.
Published: (2019)
by: Plant, Amy, et al.
Published: (2019)
Consumers’ behavioral intentions after experiencing deception or cognitive dissonance caused by deceptive packaging, package downsizing or slack filling’
by: Wilkins, Stephen, et al.
Published: (2016)
by: Wilkins, Stephen, et al.
Published: (2016)
Investigating the act of deception in
online-Islamic content
by: Mahmud, Murni, et al.
Published: (2014)
by: Mahmud, Murni, et al.
Published: (2014)
Deception & manipulation: Argyrodinae spiders as parasites and hosts
by: Deutsch, Ella K.
Published: (2022)
by: Deutsch, Ella K.
Published: (2022)
Bir nisan aldatmacası (The deception of April fool)
by: Kayadibi, Saim
Published: (2008)
by: Kayadibi, Saim
Published: (2008)
Liability for misleading or deceptive conduct in the banking industry
by: Dechent, Susanna
Published: (2009)
by: Dechent, Susanna
Published: (2009)
Linguistic Word Taboos in Chinese Culture
by: Andrew, Yau-hau Tse
Published: (2011)
by: Andrew, Yau-hau Tse
Published: (2011)
Exploring supply chain deception, sustainability, and customer perceptions
by: Hammadi, Adil, et al.
Published: (2018)
by: Hammadi, Adil, et al.
Published: (2018)
Trapped in deception: Corporate culture, sustainability, and project lifecycle
by: Reiners, Torsten, et al.
Published: (2019)
by: Reiners, Torsten, et al.
Published: (2019)
Detecting deceptive reviews using lexical and syntactic features
by: Shojaee, Somayeh, et al.
Published: (2013)
by: Shojaee, Somayeh, et al.
Published: (2013)
Exploring deception using automatically detected facial action units
by: Vinkemeier, Doratha
Published: (2020)
by: Vinkemeier, Doratha
Published: (2020)
Discovery of tetrasubstituted pyrazines as semiochemicals in a sexually deceptive orchid
by: Bohman, B., et al.
Published: (2012)
by: Bohman, B., et al.
Published: (2012)
Conflict and Cyber-espionage: Ridding the World of Cyber War?
by: Ford, Shannon
Published: (2014)
by: Ford, Shannon
Published: (2014)
Identifying cues to deception in Islamic websites text-based content and design
by: Ahmed Mohamed, Fatima, et al.
Published: (2018)
by: Ahmed Mohamed, Fatima, et al.
Published: (2018)
Malaysian consumers' experience with deceptive marketing practices of sellers: an Islamic perspective
by: Abdullah, Kalthom, et al.
Published: (2011)
by: Abdullah, Kalthom, et al.
Published: (2011)
Convergent specialization - the sharing of pollinators by sympatric genera of sexually deceptive orchids
by: Phillips, R., et al.
Published: (2013)
by: Phillips, R., et al.
Published: (2013)
Cyber cafe management system
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)
Cyber-physical systems for smart grid
by: Dillon, Tharam S., et al.
Published: (2010)
by: Dillon, Tharam S., et al.
Published: (2010)
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Cyber hygiene during Covid-19 to avoid cyber attacks
by: Lee, Yvonne Yi Jin
Published: (2022)
by: Lee, Yvonne Yi Jin
Published: (2022)
Evolutionary relationships among pollinators and repeated pollinator sharing in sexually deceptive orchids
by: Phillips, R., et al.
Published: (2017)
by: Phillips, R., et al.
Published: (2017)
Mismatch in the distribution of floral ecotypes and pollinators: insights into the evolution of sexually deceptive orchids
by: Philllips, R., et al.
Published: (2015)
by: Philllips, R., et al.
Published: (2015)
The linguistics structure and implication of Chinese Malaysian wedding dish names
by: Ang, Lay Hoon, et al.
Published: (2016)
by: Ang, Lay Hoon, et al.
Published: (2016)
Analysis of bacterial communities of King George and Deception Islands, Antarctica using high-throughput sequencing
by: Chua, C. Y., et al.
Published: (2018)
by: Chua, C. Y., et al.
Published: (2018)
Cyber Safety in Malaysia
by: Soon , Seng Thah
Published: (2017)
by: Soon , Seng Thah
Published: (2017)
Islam and the cyber world
by: Shuriye, Abdi Omar, et al.
Published: (2014)
by: Shuriye, Abdi Omar, et al.
Published: (2014)
Cyber law in Malaysia
by: Ibrahim, Azmuddin
Published: (2009)
by: Ibrahim, Azmuddin
Published: (2009)
Cyber Identity Theft
by: Roberts, Lynne
Published: (2009)
by: Roberts, Lynne
Published: (2009)
The unique Chinese innovation pathways: lessons from Chinese small and medium sized manufacturing firms
by: Chung, Leanne, et al.
Published: (2017)
by: Chung, Leanne, et al.
Published: (2017)
Similar Items
-
Exploring recipients' perceptions of impression management in the workplace : insights from comparing fraudster and non-fraudster executives
by: Sheridan, Terry A.
Published: (2010) -
A cyber-consumer protection framework for prevention of online deceptive advertising
by: Al Adwan, Ahmad
Published: (2012) -
Application of binomials in English and Persian
by: Guilani, Mohammad Abdollahi, et al.
Published: (2017) -
Linguistic cues of deception in Malaysian online investment scams’ promotional materials
by: Ameiruel Azwan Ab Aziz,, et al.
Published: (2023) -
Deceptive Marketing
by: Firdaus, Humairah Fahima Hairanil, et al.
Published: (2020)