8卷 第1期
Defense Strategies for Sales-based Wire Fraud
Defense Strategies for Sales-based Wire Fraud
- 2024年8卷第1期 页码:56-62
纸质出版日期: 2024-06-30
DOI:10.47297/wspjclrWSP2516-249708.20240801
Scan QR Code
8卷 第1期
Guangdong Zhengping Tiancheng Law Firm
纸质出版日期: 2024-06-30 ,
Scan QR Code
(2024). Defense Strategies for Sales-based Wire Fraud. 商事法律评论(英文版), 8(1), 56-62.
Yang Ma.Defense Strategies for Sales-based Wire Fraud[J].Critical Theory,2024,08(01):56-62.
(2024). Defense Strategies for Sales-based Wire Fraud. 商事法律评论(英文版), 8(1), 56-62. DOI: 10.47297/wspjclrWSP2516-249708.20240801.
Yang Ma.Defense Strategies for Sales-based Wire Fraud[J].Critical Theory,2024,08(01):56-62. DOI: 10.47297/wspjclrWSP2516-249708.20240801.
With the diversification and complexity trend of telecommunication fraud
the sales-based telecommunication fraud crime
as a new type of crime pattern
challenges the formulation of traditional criminal defense. This paper provides an in-depth analysis of the criminal overview of sales-type telecommunication fraud
behavioral characteristics and similarities and differences with ordinary civil fraud
focusing on the behavioral characteristics of false propaganda
exaggerated product effects and the transaction process. In the development of defense strategies
in-depth analysis of the definition of intent and subjective malice
analysis of the elements of the establishment of the crime of criminal fraud
as well as effective defense strategies in court are proposed. Meanwhile
through the discussion of legal issues
it is suggested to strengthen the protection of consumer rights and interests
clarify the boundaries of criminal legal liability
as well as address the inadequacies of the legal system for sales-based telecommunication fraud. Ultimately
this paper aims to provide new perspectives and theoretical support in the field of criminal defense
and to promote a more scientific and fair response to sales-based telecommunication fraud crimes in the legal community.
CrimeDefense strategy
Gao Yuan (2021). Factors affecting college students' susceptibility to online fraud: psychological traits, experiential factors and cue processing. Master's thesis, Hangzhou: Zhejiang University.
ZHAO Lei, CHEN Hongmin (2022). A study on the influencing factors and formation mechanism of young people being deceived in telecommunication fraud. China Youth Social Science, 41(3), 102-112. [3]Alseadoon, I., Othman, M. F. I., & Chan, T. (2015). What Is the Influence of Users' Characteristics on Their Ability to Detect Phishing Emails? In H. A. Sulaiman,
M. A. Othman, M. F. I. Othman, Y. Abd Rahim, & N. C. Pee (Eds.), Advanced Computer and Communication Engineering Technology (pp. 949-962). Springer International Publishing. [4]Buller, D. B., & Burgoon, J. K. (1996). Interpersonal Deception Theory. Communication Theory, 6, 203-242.
Button M., Lewis C., & Tapley J. (2009). Fraud Typolo-gies and the Victims of Fraud: Literature Review. National Fraud Authority.
Langenderfer J., & Shimp T. A. (2001). Consumer Vulnerability to Scams, Swindles, and Fraud: A New Theory of Visceral Influences on Persuasion. Psychology and Mar-keting, 18, 763-783.
Dove M. (2018). Predicting Individual Differences in Vulnerability to Fraud. Doctoral Dissertation, University of Portsmouth.
Norris G., & Brookes A. (2021). Personality, Emotion and Individual Differences in Response to Online Fraud. Personality and Individual Differences, 169, Article 109847. [9]Ferguson, A. J. (2005). Fos-tering Email Security Awareness: The West Point Carronade. EDUCAUSE Quarterly, 28, 54-57.
Neupane A., Saxena N., Kuruvilla K., Georgescu M., & Kana R. K. (2014). Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings. In Proceedings of the Network and Distributed System Security Symposium (NDSS) (pp. 1-16). [11]Grazioli, S. (2004). Where Did They Go Wrong? An Analysis of the Failure of Knowledgeable Internet Consumers to Detect Deception over the Internet. Group Decision and Negotiation, 13, 149-172.
Khalifa H. K. H. (2022). A Conceptual Review on Heu-ristic Systematic Model in Mass Communication Studies. International Journal of Media and Mass Communication, 4, 164- 175.
Modic D., & Lea S. E. (2011). How Neurotic Are Scam Victims, Really? The Big Five and Internet Scams. In 2011 Conference of the International Confederation for the Advancement of Behavioral Economics and Economic Psychology (pp. 1-24).
Loewenstein G. (1996). Out of Control: Visceral Influ-ences on Behavior. Organizational Behavior and Human Decision Processes, 65, 272-292.
Luo X. R., Zhang W., Burd S., & Seazzu A. (2013). Investigating Phishing Victimization with the Heuristic-Systematic Model: A Theoretical Framework and an Exploration. Computers and Security, 38, 28-38.
Related Articles
Related Author
Related Institution