The Conditions, Forms and Issues Regarding Becoming a Victim of Online Fraud Occurring in Thailand
Main Article Content
Abstract
The objectives of this research are: 1) to study the problems and patterns of online fraud crimes occurring in Thailand; 2) to examine the factors and conditions that lead individuals to become victims of online fraud. The findings reveal issues related to the nature and patterns of online fraud in Thailand. This is a qualitative study conducted through document analysis and in-depth interviews with key informants. Group 1 consists of 20 citizens who have experienced being victims of online fraud. Group 2 includes 20 police officers from metropolitan and provincial police stations across Regions 1-9. Additionally, a focus group discussion was held with 8 police officers from agencies dedicated to preventing and combating online crime or other related organizations. The data collection tool used was structured in-depth interviews, and the data were analyzed using descriptive content analysis. The findings indicate that 1) the problems and patterns of online fraud crimes are difficult to detect offenders, Public’s exacerbated by a lack of digital literacy, delays in crime tracking systems, and the existence of 17 different types of online fraud, reflecting the diversity and dynamism of criminal behavior in the digital age. Six conditions contribute to individuals becoming victims of online fraud: 1) The victim's internal motivations. 2) Ignorance of technology. 3) Access to the victim's personal information. 4) Social and cultural beliefs 5) Economic conditions. and 6) Limitations in accessing funding sources. Delays and constraints within the justice system also play a role. Furthermore, the study explores operational challenges and obstacles faced by law enforcement officers in enforcing laws regarding online crime. Based on these insights, two approaches to prevent online fraud are proposed: 1) for law enforcement officers, enhancing knowledge of legal procedures through online learning materials such as video lectures delivered by experts, allowing for flexible learning anytime and anywhere; 2) for the general public, raising awareness through entertaining short video clips with easily understandable content, filmed in a “Two-shot frame style”. At the end of each video, law enforcement officers summarize the situation to enhance credibility.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
- The published article is copyrighted by the MCU Journal of Buddhist Studies Review.
- Any text that appears in an article that has been published in a journal. It is the responsibility of the article author. And those comments are not considered the views and responsibilities of the editorial team of the MCU Buddhist Review Journal.
References
กรกนก นิลดำ. (2563). วิธีการกลโกง ช่องทางการสื่อสาร และประสบการณ์ในการถูกมิจฉาชีพออนไลน์หลอกลวงของผู้สูงอายุในจังหวัดเชียงราย. วารสารการสื่อสาร มหาวิทยาลัยราชภัฏเชียงราย. 3(3), 50-67.
กระทรวงดิจิทัลเพื่อเศรษฐกิจและสังคม. (21 มกราคม 2565). ดีอีเอส เปิดสถิติ 15 ปัญหา ซื้อขายทางออนไลน์ ในรอบปี 64. กระทรวงดิจิทัลเพื่อเศรษฐกิจและสังคม. สืบค้น 2 มิถุนายน 2568 จาก https://www.mdes.go.th/news/detail/5176
คณะนิติศาสตร์. (3 มีนาคม 2566). ปัญหากฎหมายไทยกับการฉ้อโกงออนไลน์. ผ่านงาน สัมมนาวิชาการเรื่อง “ฉ้อโกง ขายของทางออนไลน์”. มหาวิทยาลัยธรรมศาสตร์. สืบค้น 5 มีนาคม 2568 จาก https://www.law.tu.ac.th/tulawinfographic09/
คณาธิป ทองรวีวงศ์. (2564). การปรับใช้พระราชบัญญัติว่าด้วยการกระทำความผิดเกี่ยวกับคอมพิวเตอร์พ.ศ. 2550 แก้ไขเพิ่มเติม พ.ศ. 2560 กับการหลอกลวงเกี่ยวกับความสัมพันธ์เชิงความรักที่กระทำทางระบบคอมพิวเตอร์. วารสารรัชต์ภาคย์. 15(39), 230-239.
จอมเดช ตรีเมฆ. (2558). The Rangsit Crime Survey: A Feasibility Study to inaugurate The Rangsit Crime Survey. Journal of Thai Justice System. 8(1), 67-85,
วนัสนันท์ กันทะวงศ์. (2563). อาชญากรรมเศรษฐกิจ: การหลอกลวงการเก็งกําไรอัตราแลกเปลี่ยนเงินตราต่างประเทศ. วารสารสังคมศาสตร์ มหาวิทยาลัยศรีนครินทรวิโรฒ. 23(1), 133-144.
เสกสัณ เครือคำ. (2558). อาชญากรรม อาชญาวิทยาและงานยุติธรรมทางอาญา. ม.ป.ท.: เพชรเกษมการพิมพ์.
Abas, S. N., Bhimrajkar, S., & Raina, C. K. (2017). Social Engineering. International Journal of Scientific Research in Computer Science. 2(6), 1109–1114.
Atul, B., Lhato, J, & Alka, R. (2018). Information Security: Exploring the Association between IT Receptivity and Cyber Crime Victimization. FIIB Business Review. 4(1), 55-63.
Bandler, J. & Merzon, A. (2020). Cybercrime Investigations a Comprehensive Resource for Everyone. Taylor & Francis Group. -(-), 1-20. Retrieved 20 July 2024 from https://doi. org/10.1201/9781003033523
Benoît, D. & Chad, W. (2021). Enhancing relationships between criminology and cybersecurity. Journal of Criminology. 54(1), 76-92.
Boss, S. R. et al., (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly. 39(4), 837-864.
Burkell, J. (2006). Anonymity in Behavioural Research: Not Being Unnamed, But Being Unknown. Faculty of Information and Media Studies. The University of Western Ontario.
Catherine, D., M., George, E. H., & Melissa, L. R. (2010). Policing Possession of Child Pornography Online: Investigating the Training and Resources Dedicated to the Investigation of Cyber Crime. International Journal of Police Science & Management. 12(4), 516-525.
Chad, W. & Diarmaid, H. (2019). Civilianizing specialist units: Reflections on the policing of cyber-crime. Criminology & Criminal Justice. 22(4), 1-20.
Chrisje, B., Adam, J., & Tim, J. W. (2020). A Comparative Analysis of Anglo-Dutch Approaches to ‘Cyber Policing’: Checks and Balances Fit for Purpose?. The Journal of Criminal Law. 84(5), 451-473.
Danquah, P. & Longe, O. (2011). An empirical test of the space transition theory ofcyber criminality: Investigating cyber crime causation factors in Ghana. African Journal of Computing & ICT. 2(1), 37-48.
D'Arcy, J., Hovav, A., & Galletta, D. F. (2009). User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach. Information Systems Research. 20(1), 79-98.
Drew, J. M. (2020). A study of cybercrime victimization and prevention: exploring the use of online crime prevention behaviors and strategies. Journal of Criminological Research, Policy and Practice. 1–20. Retrieved 28 July 2024 from https://doi.org/10.1108/JCRPP-12-2019-0070
Emami, C., Smith, R. G., & Jorna, P. (2020). Predicting online fraud victimization in Australia. Trends & Issues in Crime & Criminal Justice. No.577, 1–19. Retrieved 25 July 2024 from https://www.aic.gov.au/sites/default/files/2020-05/ti577_predicting_online_fraud_vic timisati on_in_australia_0.pdf.
Haidee, T. (2018). Building Speaking Fluency with Multiword Expressions. TESL Canada Journal. 34(3), 26-53.
Hinnen, T. (2004). The Cyber-front in the War on Terrorism: Curbing Terrorist Use of the Internet. Science and Technology Law Review. 5(-), 1-42. Retrieved 30 July 2024 from https://doi.org/10.7916/stlr.v5i0.3636.
Holt, T. & Bossler, A. M. (2016). Cyber crime in Progress: Theory and Prevention of Technology-enabled Offenses. Abingdon, Oxon: Routledge.
Institutionalized Children Explorations and Beyond. (2020). Child Helpline Offers Protection against Cyber Crime. Institutionalized Children Explorations and Beyond. 3(2) 216.
Jaishankar, K. (2007). Cyber Criminology: Evolving a novel discipline with a new journal. International Journal of Cyber Criminology. 1(1), 1-6.
Jaishankar, K. (2008). Space Transition Theory of Cyber Crimes. Crimes of the Internet (pp. 283-301). N.P.: Pearson Publishers.
Kshetri, N. (2013). Cybercrime and cybersecurity in the global south. NY: Palgrave MacMillan Publishers.
Li, L., et al. (2019). The economics of cybercrime: The role of broadband and socioeconomic status. ACM Transactions on Management Information Systems. 10(4), 1-23.
Liang, H. & Xue, Y. (2010). Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective. Journal of the Association for Information Systems. 11(7), 1–16.
Maras, M. H. (2016). Cybercriminal. Oxford University Press.
McAfee & CSIS. (21 February 2018). Economic impact of cybercrime: No slowing down. Center for Strategic and International Studies. Retrieved 20 July 2024 from https://www. csis.org/analysis/economic-impact-cybercrime
Michail, G. (2014). Video-Based Learning and Open Online Courses. International Journal of Emerging Technologies in Learning (iJET). 9(1), 4-7.
Nazli, C. & Daniel, G. (2012). Lost in cyberspace: Harnessing the Internet, international relations, and global security. Bulletin of the Atomic Scientists. 68(2), 70-77.
Omernick, E. & Sood, S. O. (2013). The impact of anonymity in online communities. In Proceedings SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013 (pp. 526-535). Retrieved 20 July 2024 from https://www.scholars.northwestern.edu/en/publi cations/the-impact-of-anonymity-in-online-communities.
Patrick, H., Gianfranco, W., & Mark, C. (2022). Consumer Fear of Online Identity Theft: ScaleDevelopment and Validation. Journal of Interactive Marketing. 30(1), 1-19. .
Poungin, J. & Trimek, J. (2023). The Prevention of Property Crimes against the Elderly. RPCA Journal of Criminology and Social Sciences. 5(2), 81–96.
Rinwong, S. (2020). Tackling the problem of 'online trading' behind COVID TACTIC to win 2.2 billion cakes. Retrieved 26 July 2024 from https://www.bangkokbiznews. com/news/detail/886738
Sommestad, T., Karlzén, H., & Hallberg, J. (2015). A meta-analysis of studies on protection motivation theory and information security behaviour. International Journal of Information Security and Privacy. 9(1), 26-46.
Techsauce. (2023). Cyber Vaccine เครือข่ายยับยั้ง ป้องกัน และสร้างภูมิคุ้มกัน รู้ทันกลโกงอาชญากรรมออนไลน์. สืบค้น 10 เมษายน 2568 จาก https://techsauce.co/news/cyber-vaccine-protect-cybercrime
Tsikerdekis, M. & Zeadally, S. (2014). Online deception in social media. Commun ACM 2014. 57(9), 72-80.
Wu, L., Peng, Q., & Lemke, M. (2023). Research trends in cybercrime and cybersecurity: A review based on Web of Science core collection database. International Journal of Cybersecurity Intelligence and Cybercrime. 6(1), 5-28.
Wu, L., et al. (2022). Spatial social network research: A bibliometric analysis. Computational Urban Science. 2(1), 1-13.