Uneingeschränkter Zugang

Weaponization of Conscience in Cybercrime and Online Fraud: A Novel Systems Theory


Zitieren

Bizer, G.Y., Larsen, J.T., & Petty, R.E. (2011). Exploring the valence-framing effect: Negative framing enhances attitude strength: Valence framing. Political Psychology, Vol. 32, Issue 1, 59-80. Search in Google Scholar

Cornelissen, J. (2017). Editor’s comments: Developing propositions, a process model, or a typology? Addressing the challenges of writing theory without a boilerplate. Academy of Management Review, Vol. 42, Issue 1, 1-9. Search in Google Scholar

Cross, C. (2020). ‘Oh we can’t actually do anything about that’: The problematic nature of jurisdiction for online fraud victims. Criminology & Criminal Justice: The International Journal of Policy and Practice, Vol. 20, Issue 3, 358-375. Search in Google Scholar

Darii, A., & Meleca, M. (2022). Trafficking in human beings. ASEM. Search in Google Scholar

Doyle, N. (2022). Elder Financial Exploitation and Scam Activities Targeting Elderly Victims. Available at: https://repository.stcloudstate.edu/cjs_etds/17/. Search in Google Scholar

Espinoza, M.D. (2024). A Qualitative Analysis of Challenges in Online Fraud Detection and Investigation. In Change Dynamics in Healthcare, Technological Innovations, and Complex Scenarios (pp. 158-170). IGI Global. Search in Google Scholar

Forrester, J.W. (2003). Dynamic models of economic systems and industrial organizations. System Dynamics Review, Vol. 19, Issue 4, 329-345. Search in Google Scholar

Gentili, P.L. (2021). Why is Complexity Science valuable for reaching the goals of the UN 2030 Agenda? Rendiconti Lincei. Scienze Fisiche e Naturali, Vol. 32, Issue 1, 117-134. Search in Google Scholar

Greene, J.D. (2009). Dual-process morality and the personal/impersonal distinction: A reply to McGuire, Langdon, Coltheart, and Mackenzie. Journal of Experimental Social Psychology, Vol. 45, Issue 3, 581-584. Search in Google Scholar

Hardin, G. (1968). The tragedy of the commons. The population problem has no technical solution; it requires a fundamental extension in morality. Science (New York, N.Y.), 162(3859), 1243-1248. Search in Google Scholar

Health and Human Services Department. (2024). Safeguarding the Rights of Conscience as Protected by Federal Statutes. In Federal Register (No. 2024–00091; Vol. 89, pp. 2078-2109). Available at: https://www.federalregister.gov/documents/2024/01/11/2024-00091/safeguarding-the-rights-of-conscience-as-protected-by-federal-statutes. Search in Google Scholar

Hwang, T., & Rosen, L. (2019). Harder, Better, Faster, Stronger: International Law and the Future of Online PsyOps. demtech.oii.ox.ac.uk. Available at: https://demtech.oii.ox.ac.uk/wp-content/uploads/sites/12/2017/02/Comprop-Working-Paper-Hwang-and-Rosen.pdf. Search in Google Scholar

Jaakkola, E. (2020). Designing conceptual articles: four approaches. AMS Review, 10 (1-2), 18-26. Search in Google Scholar

Kshetri, N. (2017). Cybercrime Firms’ Internationalization Strategy and Tactics: An Exploratory Framework. AMCIS 2017 Proceedings. Available at: https://aisel.aisnet.org/amcis2017/Global/Presentations/12/. Search in Google Scholar

Linebarger, P. (1950, March 1). Psychological Warfare. Naval War College Information Services for Officers. Naval War College Press. Available at: https://orangelabel.co/wp-content/uploads/2023/08/1951-Psychological-Warfare-US-Navy-War-College.pdf. Search in Google Scholar

Maksymenko, S.D., & Derkach, L.M. (2023). Understanding modern cognitive ware in the global dimension, its genesis in the Ukrainian context: A review and directions for future research: Cognitive warfare and social impact operations. Defense & Strategy/Obrana a Strategie, Vol. 23, Issue 1. Search in Google Scholar

Malyuk, A.A. (2022). Socio-psychological techniques of information warfare. Bezopasnost Informacionnyh Tehnology, Vol. 29, Issue 3, 18-37. Search in Google Scholar

Masakowski, Y.R., & Blatny, J.M. (2023). Mitigating and responding to cognitive warfare. North Atlantic Treaty Organization (NATO), Tech. Rep. Available at: https://apps.dtic.mil/sti/citations/trecms/AD1200226. Search in Google Scholar

Neculcea, C.-A., & Răpan, F. (2022). Information operations – comparative doctrinal analysis. Strategic Impact, Vol. 85, No. 3-4, 68-79. Search in Google Scholar

Nobles, C. (2018). Botching human factors in cybersecurity in business organizations. HOLISTICA – Journal of Business and Public Administration, Vol. 9, Issue 3, 71-88. Search in Google Scholar

Office for Civil Rights (OCR). (2010, October 14). Conscience and Religious Nondiscrimination. Hhs.gov; US Department of Health and Human Services. Available at: https://www.hhs.gov/conscience/conscience-protections/index.html. Search in Google Scholar

Onushi, K. (2023). Toward clarifying the gap between prohibited perfidy and ruses: A role for the principle of good faith? Doshisha Law, Vol. 74, Issue 8. Available at: https://doshisha.repo.nii.ac.jp/record/29547/files/028004340003.pdf. Search in Google Scholar

Ragins, B.R. (2012). Reflections on the craft of clear writing. Academy of Management Review, Vol. 37, 493-501. Search in Google Scholar

Rutherford, J.R. (2017). A Holistic Approach Using Honey Communities For Cyber Event Detection and Protection in Communities and Large Distributed Organizations (G. B. White, Ed.) [The University of Texas at San Antonio]. Available at: http://proxymu.wrlc.org/login?url=https://www.proquest.com/dissertations-theses/holistic-approach-using-honey-communities-cyber/docview/1902262409/se-2. Search in Google Scholar

Salih, K., & Dabagh, N. (2023). Digital forensic tools: A literature review. Journal of Education and Science, Vol. 32, Issue 1, 109-124. Search in Google Scholar

Samoilenko, S., & Osei-Bryson, K.-M. (2007). Chaos Theory as a Meta-theoretical Perspective for IS Strategy: Discussion of the Insights and Implications. Available at: https://aisel.aisnet.org/sais2007/45/. Search in Google Scholar

Starcke, K., & Brand, M. (2012). Decision making under stress: a selective review. Neuroscience and Biobehavioral Reviews, Vol. 36, Issue 4, 1228-1248. Search in Google Scholar

US Department of Defense. (2010). Joint publication on psychological operations. Available at: https://irp.fas.org/doddir/dod/jp3-13-2.pdf. Search in Google Scholar

Wake, S., Wormwood, J., & Satpute, A.B. (2020). The influence of fear on risk taking: a meta-analysis. Cognition & Emotion, Vol. 34, Issue 6, 1143–1159. Search in Google Scholar

Wang, L., Chen, S., & Xiao, W. (2023). Effect of real-world fear on risky decision-making in medical school-based students: A quasi-experimental study. Frontiers in Behavioral Neuroscience, Vol. 17, 1030098. Search in Google Scholar