<?xml version="1.0"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-05-19T01:45:58Z</responseDate><request verb="GetRecord" metadataPrefix="oai_dc">https://keep.lib.asu.edu/oai/request</request><GetRecord><record><header><identifier>oai:keep.lib.asu.edu:node-201595</identifier><datestamp>2025-05-12T19:35:22Z</datestamp><setSpec>oai_pmh:all</setSpec><setSpec>oai_pmh:repo_items</setSpec></header><metadata><oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><dc:identifier>201595</dc:identifier>
          <dc:identifier>https://hdl.handle.net/2286/R.2.N.201595</dc:identifier>
                  <dc:rights>http://rightsstatements.org/vocab/InC/1.0/</dc:rights>
          <dc:rights>All Rights Reserved</dc:rights>
                  <dc:date>2025</dc:date>
                  <dc:format>146 pages</dc:format>
                  <dc:type>Doctoral Dissertation</dc:type>
          <dc:type>Academic theses</dc:type>
                  <dc:language>en</dc:language>
                  <dc:contributor>Bitaab, Marzieh</dc:contributor>
          <dc:contributor>Doupe, Adam</dc:contributor>
          <dc:contributor>Shoshitaishvili, Yan</dc:contributor>
          <dc:contributor>Bao, Tiffany</dc:contributor>
          <dc:contributor>Boghrati, Reihane</dc:contributor>
          <dc:contributor>Arizona State University</dc:contributor>
                  <dc:description>Partial requirement for: Ph.D., Arizona State University, 2025</dc:description>
          <dc:description>Field of study: Computer Science</dc:description>
          <dc:description>In an era marked by the unprecedented proliferation of the internet, this research delves into the complex realm of cybercrime, with a particular focus on the rise of phishing and fraudulent e-commerce websites. These cyber threats have significantly intensified in the wake of the COVID-19 pandemic, which has catalyzed the digital transformation of society and, concurrently, the sophistication of online scams. The primary objective of this study is to comprehensively map the current cyber threat landscape, employing a data-driven approach to analyze trends and identify prevailing vulnerabilities.

Methodologically, the research utilizes an amalgamation of quantitative and qualitative analysis, encompassing a wide array of cyber threat incidents. This approach facilitates a nuanced understanding of the tactics and techniques employed by cybercriminals, enabling the identification of emerging patterns in cyber attacks. The study also critically examines the efficacy of existing cybersecurity measures, offering insights into their strengths and limitations in the face of evolving digital threats.

The findings reveal a dynamic and ever-evolving cyber threat environment. Key trends include the increasing use of sophisticated phishing techniques, the exploitation of new vulnerabilities in e-commerce platforms, and the adaptation of cybercriminal strategies in response to changing digital behaviors during the pandemic. The research underscores the inadequacy of traditional cybersecurity approaches in addressing these modern challenges, advocating for a more holistic and adaptive strategy. This strategy encompasses not only technological solutions but also emphasizes the importance of user education and the implementation of robust cybersecurity policies.

This study makes a significant contribution to the field of cybersecurity by offering a detailed analysis of the current challenges and proposing a multi-faceted approach to combat cyber threats. It underscores the urgency for continuous innovation in cybersecurity strategies to safeguard the digital ecosystem in an increasingly interconnected world. The findings and recommendations of this research are particularly relevant for cybersecurity professionals, policymakers, and researchers, providing them with critical insights and tools to enhance digital security in the face of a rapidly evolving cyber threat landscape.

</dc:description>
                  <dc:subject>Computer Science</dc:subject>
                  <dc:title>A Study of Fraudulent e-Commerce Website Modus Operandi</dc:title></oai_dc:dc></metadata></record></GetRecord></OAI-PMH>
