<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2183-3176</journal-id>
<journal-title><![CDATA[Cadernos do Arquivo Municipal]]></journal-title>
<abbrev-journal-title><![CDATA[Cadernos do Arquivo Municipal]]></abbrev-journal-title>
<issn>2183-3176</issn>
<publisher>
<publisher-name><![CDATA[Arquivo Municipal de Lisboa / Câmara Municipal de Lisboa]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2183-31762024000200306</article-id>
<article-id pub-id-type="doi">10.48751/cam-2024-22380</article-id>
<title-group>
<article-title xml:lang="pt"><![CDATA[Burla romântica: Em torno de um conceito de vitimação]]></article-title>
<article-title xml:lang="en"><![CDATA[Romance fraud: Around a concept of victimization]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Guerreiro]]></surname>
<given-names><![CDATA[Ana]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
<xref ref-type="aff" rid="Aaf"/>
<xref ref-type="aff" rid="A a"/>
<xref ref-type="aff" rid="A3 "/>
<xref ref-type="aff" rid="Af4"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Costa]]></surname>
<given-names><![CDATA[Luís]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Carneiro]]></surname>
<given-names><![CDATA[Ana Teresa]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
<xref ref-type="aff" rid="Aaf"/>
<xref ref-type="aff" rid="A a"/>
<xref ref-type="aff" rid="A6 "/>
<xref ref-type="aff" rid="Af7"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Cruz]]></surname>
<given-names><![CDATA[Olga Souza]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
<xref ref-type="aff" rid="Aaf"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidade da Maia  ]]></institution>
<addr-line><![CDATA[Maia ]]></addr-line>
<country>Portugal</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidade do Porto Faculdade de Direito ]]></institution>
<addr-line><![CDATA[Porto ]]></addr-line>
<country>Portugal</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Universidade de Lisboa ISCSP Centro Interdisciplinar em Estudos de Género]]></institution>
<addr-line><![CDATA[Lisboa ]]></addr-line>
<country>Portugal</country>
</aff>
<aff id="Af4">
<institution><![CDATA[,Universidade do Porto Faculdade de Direito Centro de Investigação Interdisciplinar em Justiça]]></institution>
<addr-line><![CDATA[Porto ]]></addr-line>
<country>Portugal</country>
</aff>
<aff id="Af5">
<institution><![CDATA[,Universidade de Santiago de Compostela Grupo de Investigación en Dereito Penal e Criminoloxía ]]></institution>
<addr-line><![CDATA[Santiago de Compostela ]]></addr-line>
<country>Spain</country>
</aff>
<aff id="Af6">
<institution><![CDATA[,Universidade Católica Portuguesa Escola do Porto Faculdade de Direito]]></institution>
<addr-line><![CDATA[Porto ]]></addr-line>
<country>Portugal</country>
</aff>
<aff id="Af7">
<institution><![CDATA[,Universidade do Minho Escola de Direito JusGov]]></institution>
<addr-line><![CDATA[Braga ]]></addr-line>
<country>Portugal</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2024</year>
</pub-date>
<volume>ser2</volume>
<numero>22</numero>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.pt/scielo.php?script=sci_arttext&amp;pid=S2183-31762024000200306&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.pt/scielo.php?script=sci_abstract&amp;pid=S2183-31762024000200306&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.pt/scielo.php?script=sci_pdf&amp;pid=S2183-31762024000200306&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo O presente artigo pretende contribuir para a compreensão das relações sociais virtuais e a sua utilização maliciosa, contextualizando a burla romântica, também conhecida por romance fraud, enquanto fenómeno criminal emergente. Ao analisar a interconexão entre os aspetos legais, sociais e os mecanismos criminosos, e a partir de um destaque particular para os processos de vitimação subjacentes a este fenómeno criminal, procura-se fornecer uma base de conhecimento sólida para futuras pesquisas e intervenções, promovendo uma abordagem holística e informada ao romance fraud, de modo a que seja possível mitigar o seu impacto criminológico na sociedade contemporânea quer do ponto de vista nacional, quer internacional.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract This article aims to contribute for the understanding of virtual social relationships and their malicious use, contextualizing romantic fraud as an emerging criminal phenomenon. By analyzing the interconnection between social aspects and criminal mechanisms, and with a particular emphasis on the underlying victimization processes, we seek to provide a solid knowledge basis for future research and interventions, promoting a holistic and informed approach, so that it is possible to mitigate its criminological impact on contemporary society, nationally and internationally.]]></p></abstract>
<kwd-group>
<kwd lng="pt"><![CDATA[Burla romântica]]></kwd>
<kwd lng="pt"><![CDATA[Cibercrime]]></kwd>
<kwd lng="pt"><![CDATA[Vitimação]]></kwd>
<kwd lng="pt"><![CDATA[Relações Virtuais]]></kwd>
<kwd lng="en"><![CDATA[Romance fraud]]></kwd>
<kwd lng="en"><![CDATA[Cybercrime]]></kwd>
<kwd lng="en"><![CDATA[Victimization]]></kwd>
<kwd lng="en"><![CDATA[Virtual relationships]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Albuquerque]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Os objetos intangíveis na era da criminalidade informática]]></article-title>
<source><![CDATA[Espaço Jurídico]]></source>
<year>2006</year>
<volume>7</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>165-77</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Anderson]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Vogels]]></surname>
<given-names><![CDATA[E. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Turner]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[The virtues and downsides of online dating]]></source>
<year>2020</year>
<publisher-name><![CDATA[Pew Research Center]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Anesa]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Lovextortion: Persuasion strategies in romance cybercrime]]></article-title>
<source><![CDATA[Discourse, Context &amp; Media]]></source>
<year>2020</year>
<volume>35</volume>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bilz]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Shepherd]]></surname>
<given-names><![CDATA[L. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Johnson]]></surname>
<given-names><![CDATA[G. I.]]></given-names>
</name>
</person-group>
<source><![CDATA[Tainted Love: A systematic review of online romance fraud]]></source>
<year>2023</year>
<publisher-name><![CDATA[ArXivLabs]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Buchanan]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Whitty]]></surname>
<given-names><![CDATA[M. T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The online dating romance scam: Causes and consequences of victimhood]]></article-title>
<source><![CDATA[Psychology, Crime &amp; Law]]></source>
<year>2014</year>
<volume>20</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>261-83</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Buil-Gil]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Zeng]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Meeting you was a fake: Investigating the increase in romance fraud during COVID-19]]></article-title>
<source><![CDATA[Journal of Financial Crime]]></source>
<year>2022</year>
<volume>29</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>460-75</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Button]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Cross]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyber Frauds, Scams and their Victims]]></source>
<year>2017</year>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="">
<collab>Canadian Resource Centre for Victims of Crime</collab>
<source><![CDATA[The Impact of Victimization]]></source>
<year>2005</year>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carlen]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Women, crime and poverty]]></source>
<year>1988</year>
<publisher-name><![CDATA[Open University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carlen]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Worral]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Analysing women&#8217;s imprisonment]]></source>
<year>2004</year>
<publisher-name><![CDATA[Taylor &amp; Francis]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carter]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Distort, exort, deceive and exploit: Exploring the inner workings of romance fraud]]></article-title>
<source><![CDATA[The British Journal of Criminology]]></source>
<year>2021</year>
<volume>61</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>283-302</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cassiman]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Spiders on the World Wide Web: cyber trickery and gender fraud among youth in an Accra zongo]]></article-title>
<source><![CDATA[Social Anthropology]]></source>
<year>2019</year>
<volume>27</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>486-500</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chawki]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Darwish]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Khan]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Tyagi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cybercrime, Digital Forensics and Jurisdiction]]></source>
<year>2015</year>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cohen]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Miller]]></surname>
<given-names><![CDATA[T. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Rossman]]></surname>
<given-names><![CDATA[S. B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The costs and consequences of violent behavior in the United States]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Reiss]]></surname>
<given-names><![CDATA[A. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Roth]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Understanding and preventing violence]]></source>
<year>1994</year>
<page-range>67-166</page-range><publisher-name><![CDATA[National Research Council]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Costa]]></surname>
<given-names><![CDATA[A. C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Comentário Conimbricense do Código Penal]]></source>
<year>2022</year>
<volume>I</volume>
<publisher-name><![CDATA[Gestlegal]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cross]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Romance Fraud]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Holt]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Bossler]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Palgrave Handbook of Internacional Cybercrime and Cyberdeviance]]></source>
<year>2020</year>
<page-range>1-22</page-range><publisher-name><![CDATA[Palgrave Macmillan]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cross]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Dragiewicz]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Richards]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Understanding romance fraud: Insights from domestic violence research]]></article-title>
<source><![CDATA[The British Journal of Criminology]]></source>
<year>2018</year>
<volume>58</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1303-22</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cross]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Holt]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The use of military profiles in romance fraud schemes]]></article-title>
<source><![CDATA[Victims and Offenders]]></source>
<year>2021</year>
<volume>16</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>385-406</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cross]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Holt]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Holt]]></surname>
<given-names><![CDATA[T. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[To pay or not to pay: An exploratory analysis of sextortion in the context of romance fraud]]></article-title>
<source><![CDATA[Criminology &amp; Criminal Justice]]></source>
<year>2023</year>
<volume>10</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>110-26</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cross]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Layt]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;I Suspect That the Pictures Are Stolen&#8221;: Romance Fraud, Identity crime, and Responding to Suspicions of Inauthentic Identities]]></article-title>
<source><![CDATA[Social Science Computer Review]]></source>
<year>2022</year>
<volume>40</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>955-73</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dias]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A problemática da investigação do cibercrime]]></article-title>
<source><![CDATA[Data Venia]]></source>
<year>2012</year>
<volume>1</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>64-87</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dibble]]></surname>
<given-names><![CDATA[J. L.]]></given-names>
</name>
<name>
<surname><![CDATA[McDaniel]]></surname>
<given-names><![CDATA[B. T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Romance and dating in the digital age: Impacts of computer-mediated communication and a global pandemic]]></article-title>
<source><![CDATA[Cyberpsychology, Behavior and Social Networking]]></source>
<year>2021</year>
<volume>24</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>437-8</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dickinson]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Neutralizations, altercasting, and online romance fraud victimizations]]></article-title>
<source><![CDATA[CRIMRXIV]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="book">
<collab>Europol</collab>
<source><![CDATA[Internet Organised Crime Threat Assessment 2018]]></source>
<year>2018</year>
<publisher-name><![CDATA[Europol]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="">
<collab>Europol</collab>
<source><![CDATA[Online Fraud Schemes: A web of deceit (IOCTA 2023)]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="book">
<collab>FBI</collab>
<source><![CDATA[Internet Crime Report 2022]]></source>
<year>2022</year>
<publisher-name><![CDATA[Federal Bureau of Investigation]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Forkuor]]></surname>
<given-names><![CDATA[J. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Buari]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Aheto]]></surname>
<given-names><![CDATA[C. K. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Breaking barriers: The experiences of women in male dominated informal sector occupations in urban Ghana]]></article-title>
<source><![CDATA[Gender Issues]]></source>
<year>2020</year>
<volume>37</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>25-43</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Furnell]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybercrime: Vandalizing the information society]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Lovelle]]></surname>
<given-names><![CDATA[J. M. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[B. M. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Gayo]]></surname>
<given-names><![CDATA[J. E. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Ruiz]]></surname>
<given-names><![CDATA[M. del Puerto Paule]]></given-names>
</name>
<name>
<surname><![CDATA[Aguilar]]></surname>
<given-names><![CDATA[L. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[International Conference, ICWE 2003, Oviedo, Spain, July 14-18, 2003. Proceedings]]></source>
<year>2003</year>
<volume>2722</volume>
<page-range>8-16</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Geraldes]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Covid-19 e cibersegurança: A mente humana como infraestrutura crítica]]></article-title>
<source><![CDATA[idn brief]]></source>
<year>2020</year>
<page-range>9-10</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gillespie]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The electronic Spanish prisoner: Romance frauds on the internet]]></article-title>
<source><![CDATA[Journal of Criminal Law]]></source>
<year>2017</year>
<volume>81</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>217-31</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Goddard]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyber security statistics 2020]]></source>
<year>2021</year>
<publisher-name><![CDATA[ITChronicles]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gouveia]]></surname>
<given-names><![CDATA[L. B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Covid-19 e desafios para a cibersegurança num tempo pós-pandemia]]></article-title>
<source><![CDATA[idn brief]]></source>
<year>2020</year>
<page-range>6-7</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guedes]]></surname>
<given-names><![CDATA[I. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Moreira]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Cardoso]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cibercrime: conceptualização, desafios e perceções públicas]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Guedes]]></surname>
<given-names><![CDATA[I. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Gomes]]></surname>
<given-names><![CDATA[M. A. de M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cibercriminalidade: novos desafios, ofensas e soluções]]></source>
<year>2021</year>
<page-range>3-23</page-range><publisher-name><![CDATA[PACTOR - Edições de Ciências Sociais, Forenses e da Educação]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kashdan]]></surname>
<given-names><![CDATA[T. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Dewall]]></surname>
<given-names><![CDATA[C. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Masten]]></surname>
<given-names><![CDATA[C. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Pond Jr.]]></surname>
<given-names><![CDATA[R. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Powell]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Combs]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Schurtz]]></surname>
<given-names><![CDATA[D. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Farmer]]></surname>
<given-names><![CDATA[A. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Who is most vulnerable to social rejection? The toxic combination of low self-esteem and lack of negative emotion differentiation on neural responses to rejection]]></article-title>
<source><![CDATA[PLoS One]]></source>
<year>2014</year>
<volume>9</volume>
<numero>3</numero>
<issue>3</issue>
<publisher-name><![CDATA[Article e90651]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kemp]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Buil-Gil]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Moneva]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Miró-Llinares]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Díaz-Castaño]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Empty streets, busy internet: A time-series analysis of cybercrime and fraud trends during COVID-19]]></article-title>
<source><![CDATA[Journal of Contemporary Criminal Justice]]></source>
<year>2021</year>
<volume>37</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>480-501</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Klymenko]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Gustsalyuk]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Savchenko]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Combater o cibercrime como pré-requisito para o desenvolvimento da sociedade digital]]></article-title>
<source><![CDATA[JANUS.NET]]></source>
<year>2020</year>
<volume>11</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>19-31</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Koon]]></surname>
<given-names><![CDATA[T. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Yoong]]></surname>
<given-names><![CDATA[D. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Preying on lonely hearts: A systematic deconstruction of an internet romance scammer&#8217;s online lover persona]]></article-title>
<source><![CDATA[Journal of Modern Languages]]></source>
<year>2013</year>
<volume>23</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>28-40</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kopp]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Layton]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Sillitoe]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Gondal]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The role of love stories in romance scams: A qualitative analysis of fraudulent profiles]]></article-title>
<source><![CDATA[International Journal of Cyber Criminology]]></source>
<year>2015</year>
<volume>9</volume>
<page-range>205-17</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Krumbiegel]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Maertens]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Wollni]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Can employment empower women? Female workers in the pineapple sector in Ghana]]></article-title>
<source><![CDATA[Journal of Rural Studies]]></source>
<year>2020</year>
<volume>80</volume>
<page-range>76-90</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lazarus]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Birds of a Feather Flock Together: The Nigerian Cyber Fraudsters (Yahoo Boys) and Hip-Hop Artists]]></article-title>
<source><![CDATA[Criminology, Criminal Justice, Law &amp; Society]]></source>
<year>2018</year>
<volume>19</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>63-80</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lazarus]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Button]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Tweets and reactions: Revealing the geographies of cybercrime perpetrators and the North-South divide]]></article-title>
<source><![CDATA[Cyberpsychology, Behaviour and Social Networking]]></source>
<year>2022</year>
<volume>25</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>504-11</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lazarus]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Okolorie]]></surname>
<given-names><![CDATA[G. U.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The bifurcation of the Nigerian cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) agents]]></article-title>
<source><![CDATA[Telematics and Informatics]]></source>
<year>2019</year>
<volume>40</volume>
<page-range>14-26</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lazarus]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Whittaker]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[McGuire]]></surname>
<given-names><![CDATA[M. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Platt]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[What do we know about online romance fraud studies? A systematic review of the empirical literature (2000 to 2021)]]></article-title>
<source><![CDATA[Journal of Economic Criminology]]></source>
<year>2023</year>
<volume>2</volume>
<page-range>1-17</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Santos]]></surname>
<given-names><![CDATA[M. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Leal-Henriques]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Código Penal Anotado Parte Especial]]></source>
<year>2023</year>
<edition>5ª</edition>
<publisher-name><![CDATA[Rei dos Livros]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sinclair]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Bland]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Savage]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Dating hot spot to fraud hot spot: Targeting the social characteristics of romance fraud victims in England and Wales]]></article-title>
<source><![CDATA[Criminology &amp; Public Policy]]></source>
<year>2023</year>
<volume>22</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sorell]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Whitty]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Online romance scams and victimhood]]></article-title>
<source><![CDATA[Security Journal]]></source>
<year>2019</year>
<volume>32</volume>
<page-range>342-61</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sprigings]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Brown]]></surname>
<given-names><![CDATA[C. J.]]></given-names>
</name>
<name>
<surname><![CDATA[ten Brinke]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deception is associated with reduced social connection]]></article-title>
<source><![CDATA[Communications Psychology]]></source>
<year>2023</year>
<volume>19</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="">
<collab>Statista</collab>
<source><![CDATA[Number of romance scam cases in the United States in 2023, by State]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="book">
<collab>SSI - Sistema de Segurança Interna</collab>
<source><![CDATA[Relatório Anual de Segurança Interna 2022]]></source>
<year>2023</year>
<publisher-name><![CDATA[Sistema de Segurança Interna, Gabinete do Secretário-Geral]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="book">
<collab>SSI - Sistema de Segurança Interna</collab>
<source><![CDATA[Relatório Anual de Segurança Interna 2023]]></source>
<year>2024</year>
<publisher-name><![CDATA[Sistema de Segurança Interna, Gabinete do Secretário-Geral]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Thompson]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[In Defence of the &#8216;Gold-Digger&#8217;]]></article-title>
<source><![CDATA[Oñati Socio-legal Series]]></source>
<year>2016</year>
<volume>6</volume>
<page-range>1225-48</page-range></nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Whitty]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The scammers persuasive techniques model: Development of a stage model to explain the online dating romance scam]]></article-title>
<source><![CDATA[The British Journal of Criminology]]></source>
<year>2013</year>
<volume>53</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>665-84</page-range></nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Whitty]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Do you love me? Psychological characteristics of romance scam victims]]></article-title>
<source><![CDATA[Cyberpsychology, Behavior, and Social Networking]]></source>
<year>2018</year>
<volume>21</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>105-9</page-range></nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Whitty]]></surname>
<given-names><![CDATA[M. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Buchanan]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The online romance scam: A serious cybercrime]]></article-title>
<source><![CDATA[Cyberpsychology, Behavior, and Social Networking]]></source>
<year>2012</year>
<volume>15</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>181-3</page-range></nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Whitty]]></surname>
<given-names><![CDATA[M. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Buchanan]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The online dating romance scam: The psychological impact on victims - both financial and non-financial]]></article-title>
<source><![CDATA[Criminology &amp; Criminal Justice]]></source>
<year>2016</year>
<volume>16</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>176-94</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
