251
Views
2
CrossRef citations to date
0
Altmetric
Research Article

Exploring the Influence of Sociodemographic Backgrounds on Money Mule Recruitment Types in South Korea: An Analysis of Probabilities from Machine Learning Classifiers

&
Pages 752-769 | Received 18 Jul 2023, Accepted 21 Sep 2023, Published online: 30 Sep 2023

References

  • Acikgoz, Y. and S. M. Bergman. 2016. “Social Media and Employee Recruitment: Chasing the Runaway Bandwagon.” Pp. 175–95 in Social Media in Employee Selection and Recruitment: Theory, Practice, and Current Challenges, edited by R. Landers and G. Schimidt. Switzerland: Springer International Publishing.
  • Arevalo, B. C. 2015. “Money Mules: Facilitators of Financial Crime.” Master thesis, Utrecht University. Netherlands.
  • Aston, M., S. McCombie, B. Reardon, and P. Watters. 2009. “A Preliminary Profiling of Internet Money Mules: An Australian Perspective.” Pp. 482–87 in Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, edited by R. Hsu and M. Denko. New Jersey: IEEE. doi:10.1109/UIC-ATC.2009.63.
  • Bekkers, L. M. J. and E. R. Leukfeldt. 2022. “Recruiting Money Mules on Instagram: A Qualitative Examination of the Online Involvement Mechanisms of Cybercrime.” Deviant Behavior 44(4):603–19. doi:10.1080/01639625.2022.2073298.
  • Bekkers, L. M. J., A. Moneva, and E. R. Leukfeldt. 2022. “Understanding Cybercrime Involvement: A Quasi-Experiment on Engagement with Money Mule Recruitment Ads on Instagram.” Journal of Experimental Criminology 1–20. doi:10.1007/s11292-022-09537-7.
  • Bekkers, L. M. J., Y. Van Houten, R. Spithoven, and E. R. Leukfeldt. 2023. “Money Mules and Cybercrime Involvement Mechanisms: Exploring the Experiences and Perceptions of Young People in the Netherlands.” Deviant Behavior 1–18. doi:10.1080/01639625.2023.2196365.
  • Custers, B. H., R. L. Pool, and R. Cornelisse. 2019. “Banking Malware and the Laundering of Its Profits.” European Journal of Criminology 16(6):728–45. doi:10.1177/1477370818788007.
  • Dunham, K. 2006. “Money Mules: An Investigative View.” Information Security Journal 15(1):6–10.
  • Europol. 2021. “Money Muling.” Retrieved June 20, 2023 (https://www.europol.europa.eu/operations-services-and-innovation/public-awareness-and-prevention-guides/money-muling).
  • Fan, S., Z. Zhao, Y. Zhang, H. Yu, C. Zheng, X. Huang, Z. Yang, M. Xing, Q. Lu, and Y. Luo. 2021. “Probability Calibration-Based Prediction of Recurrence Rate in Patients with Diffuse Large B-Cell Lymphoma.” BioData Mining 14(1):38. doi:10.1186/s13040-021-00272-9.
  • Federal Bureau of Investigation. 2021. “Don’t Be a Mule: Awareness Can Prevent Crime.” Retrieved June 20, 2023 (https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/money-mules)
  • Galdo, M. C., M. E. Tait, and L. E. Feldman. 2018. “Money Mules: Stopping Older Adults and Others from Participating in International Crime Schemes.” United States Attorneys’ Bulletin 66:79–94.
  • Gambo, S. and B. O. Özad. 2020. “The Demographics of Computer-Mediated Communication: A Review of Social Media Demographic Trends Among Social Networking Site Giants.” Computers in Human Behavior Reports 2:100016. doi:10.1016/j.chbr.2020.100016.
  • Golino, H. F., C. M. A. Gomes, and D. Andrade. 2014. “Predicting Academic Achievement of High-School Students Using Machine Learning.” Psychology 5(18):2046–57. doi:10.4236/psych.2014.518207.
  • Henry, D. B., P. H. Tolan, and D. Gorman-Smith. 2001. “Longitudinal Family and Peer Group Effects on Violence and Nonviolent Delinquency.” Journal of Clinical Child Psychology 30(2):172–86. doi:10.1207/S15374424JCCP3002_5.
  • Hong, D., S. Hong, and H. Kim. 2020. “A Study on the Participation Route of Voice Phishing Delivery.” The Journal of Police Science 20(1):97–131. doi:10.22816/POLSCI.2020.20.1.004.
  • Hong, S. and Y. Kim. 2020. “A Qualitative Study on Characteristics of Voice Phishing Crime ‘Delivery Man.” The Korean Association of Police Science Review 22(5):192–222. doi:10.24055/kaps.22.5.8.
  • Imai, K. and K. Khanna. 2016. “Improving Ecological Inference by Predicting Individual Ethnicity from Voter Registration Records.” Political Analysis 24(2):263–72. doi:10.1093/pan/mpw001.
  • Langford, J. and B. Zadrozny. 2005. “Estimating Class Membership Probabilities Using Classifier Learners.” Tenth International Workshop on Artificial Intelligence and Statistics, January 6, Bridgetown, Bardados. 198–205.
  • Lessmann, S. and S. Voß. 2010. “Customer-Centric Decision Support: A Benchmarking Study of Novel versus Established Classification Models.” Business & Information Systems Engineering 2(2):79–93. doi:10.1007/s12599-010-0094-8.
  • Leukfeldt, E. R. 2014. “Cybercrime and Social Ties: Phishing in Amsterdam.” Trends in Organized Crime 17(4):231–49. doi:10.1007/s12117-014-9229-5.
  • Leukfeldt, E. R. and J. Jansen. 2015. “Cyber Criminal Networks and Money Mules: An Analysis of Low-Tech and High-Tech Fraud Attacks in the Netherlands.” International Journal of Cyber Criminology 9(2):173–84. doi:10.5281/zenodo.56210.
  • Leukfeldt, E. R. and E. R. Kleemans. 2019. “Cybercrime, Money Mules and Situational Crime Prevention: Recruitment, Motives and Involvement Mechanisms.” Pp. 75–89 in Criminal Networks and Law Enforcement, edited by S. Hufnagel and A. Moiseienko. London: Routledge
  • Leukfeldt, E. R., E. R. Kleemans, E. W. Kruisbergen, and R. A. Roks. 2019. “Criminal Networks in a Digitized World: On the Nexus of Borderless Opportunities and Local Embeddedness.” Trends in Organized Crime 22:324–45. doi:10.1007/s12117-019-09366-7.
  • Leukfeldt, E. R. and R. A. Roks. 2021. “Cybercrimes on the Streets of the Netherlands? An Exploration of the Intersection of Cybercrimes and Street Crimes.” Deviant Behavior 42(11):1458–69. doi:10.1080/01639625.2020.1755587.
  • Loggen, J. and E. R. Leukfeldt. 2022. “Unraveling the Crime Scripts of Phishing Networks: An Analysis of 45 Court Cases in the Netherlands.” Trends in Organized Crime 25(2):205–25. doi:10.1007/s12117-022-09448-z.
  • Matsueda, R. L. and K. Anderson. 1998. “The Dynamics of Delinquent Peers and Delinquent Behavior.” Criminology 36(2):269–308. doi:10.1111/j.1745-9125.1998.tb01249.x.
  • Neumann, M., M. Wirtz, N. Ernstmann, O. Ommen, A. Längler, F. Edelhäuser, C. Scheffer, D. Tauschel, and H. Pfaff. 2011. “Identifying and Predicting Subgroups of Information Needs Among Cancer Patients: An Initial Study Using Latent Class Analysis.” Supportive Care in Cancer 19(8):1197–209. doi:10.1007/s00520-010-0939-1.
  • Odinot, G., M. A. Verhoeven, R. L. D. Pool, and C. J. De Poot. 2017. “Organised Cybercrime in the Netherlands: Empirical Findings and Implications for Law Enforcement.” Retrieved July 10, 2023 (https://repository.wodc.nl/handle/20.500.12832/179?show=full).
  • Perrin, A. (2015). Social Media Usage: 2005-2015. Pew Research Center: Internet, Science & Tech. Retrieved July 10, 2023 (http://www.pewinternet.org/2015/10/08/social-networking-usage-2005-2015/).
  • Pickles, R. 2021. “‘Money Mules’: Exploited Victims or Collaborators in Organised Crime?” Irish Probation 18:231–43.
  • Polikar, R. 2012. “Ensemble Learning.” pp. 1–34 in Ensemble Machine Learning: Methods and Applications, edited by C. Zhang and Y. MA. New York: Springer.
  • Rani, M. I. A., S. Zolkaflil, and S. N. F. S. M. Nazri. 2022. “The Money Mule Red Flags in Anti-Money Laundering Transaction Monitoring Investigation.” International Journal of Business and Economy 4(1):150–63.
  • Raza, M. S., Q. Zhan, and S. Rubab. 2020. “Role of Money Mules in Money Laundering and Financial Crimes: A Discussion Through Case Studies.” Journal of Financial Crime 27(3):911–31. doi:10.1108/JFC-02-2020-0028.
  • Roks, R. A., E. R. Leukfeldt, and J. A. Densley. 2021. “The Hybridization of Street Offending in the Netherlands.” The British Journal of Criminology 61(4):926–45. doi:10.1093/bjc/azaa091.
  • Tarek, S., R. Abd Elwahab, and M. Shoman. 2017. “Gene Expression Based Cancer Classification.” Egyptian Informatics Journal 18(3):151–59. doi:10.1016/j.eij.2016.12.001.
  • Vedamanikam, M., S. D. M. Chethiyar, and N. Che Mohd Nasir. 2020. “Model for Money Mule Recruitment in Malaysia: Awareness Perspective.” International Journal of Social Sciences 6(2):379–92. doi:10.20319/pijss.2020.62.379392.
  • Warr, M. and M. Stafford. 1991. “The Influence of Delinquent Peers: What They Think or What They Do?” Criminology 29(4):851–66. doi:10.1111/j.1745-9125.1991.tb01090.x.
  • Yang, S., D. Kim, J. Lim, and J. Yoo. 2021. “Analysis System of School Life Records Based on Data Mining for College Entrance.” The Journal of the Korea Contents Association 21(2):49–58.
  • Zadrozny, B. and C. Elkan. 2002. “Transforming Classifier Scores into Accurate Multiclass Probability Estimates.” Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 694–99. doi:10.1145/775047.775151.
  • Zottoli, M. A. and J. P. Wanous. 2000. “Recruitment Source Research: Current Status and Future Directions.” Human Resource Management Review 10(4):353–82. doi:10.1016/S1053-4822(00)00032-2.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.