Search results

1 – 10 of 508
Open Access
Article
Publication date: 7 January 2019

Monica T. Whitty

This paper aims to develop a theoretical framework to predict susceptibility to cyber-fraud victimhood.

12399

Abstract

Purpose

This paper aims to develop a theoretical framework to predict susceptibility to cyber-fraud victimhood.

Design/methodology/approach

A survey was constructed to examine whether personality, socio-demographic characteristics and online routine activities predicted one-off and repeat victimhood of cyber-fraud. Overall, 11,780 participants completed a survey (one-off victims, N = 728; repeat victims = 329).

Findings

The final saturated model revealed that psychological and socio-demographic characteristics and online routine activities should be considered when predicting victimhood. Consistent with the hypotheses, victims of cyber-frauds were more likely to be older, score high on impulsivity measures of urgency and sensation seeking, score high on addictive measures and engage in more frequent routine activities that place them at great risk of becoming scammed. There was little distinction between one-off and repeat victims of cyber-frauds.

Originality/value

This work uniquely combines psychological, socio-demographic and online behaviours to develop a comprehensive theoretical framework to predict susceptibility to cyber-frauds. Importantly, the work here challenges the current utility of government websites to protect users from becoming scammed and provides insights into methods that might be used to protect users from becoming scammed.

Details

Journal of Financial Crime, vol. 26 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 1 April 2019

Monica T. Whitty

This paper aims to examine predictors (personality, belief systems, expertise and response time) of detecting online romance scams.

2435

Abstract

Purpose

This paper aims to examine predictors (personality, belief systems, expertise and response time) of detecting online romance scams.

Design/methodology/approach

The online study asked 261 participants to rate whether a profile was a scam or a genuine profile. Participants were also asked to complete a personality inventory, belief scales and demographic, descriptive questions. The online study was also designed to measure response time.

Findings

It was found that those who scored low in romantic beliefs, high in impulsivity, high in consideration of future consequences, had previously spotted a romance scam and took longer response times were more likely to accurately distinguish scams from genuine profiles. Notably, the research also found that it was difficult to detect scams. The research also found that it was important to adapt Whitty’s (2013) “Scammers Persuasive Techniques Model” to include a stage named: “human detection of scam versus genuine profiles”.

Originality/value

This is the first study, to the author’s knowledge, that examines predictors of human accuracy in detecting romance scams. Dating sites and government e-safety sites might draw upon these findings to help improve human detection and protect users from this financial and psychologically harmful cyberscam.

Details

Journal of Financial Crime, vol. 26 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 12 May 2021

Katelyn Wan Fei Ma and Tammy McKinnon

The emergence of the novel coronavirus (COVID-19) has threatened physical and mental health, and changed the behaviour and decision-making processes of individuals, organisations…

3425

Abstract

Purpose

The emergence of the novel coronavirus (COVID-19) has threatened physical and mental health, and changed the behaviour and decision-making processes of individuals, organisations, and institutions worldwide. As many services move online due to the pandemic, COVID-19-themed cyber fraud is also growing. This article explores cyber fraud victimization and cyber security threats during COVID-19 using psychological and traditional criminological theories. It also provides a COVID-19-themed cyber fraud typology using empirical evidence from institutional and agency reports. Through organizing COVID-19-themed cyber fraud into four different categorizations, we aim to offer classification insights to researchers and industry professionals so that stakeholders can effectively manage emerging cyber fraud risks in our current pandemic.

Design/methodology/approach

The approach the study take for this conceptual paper is typology.

Details

Journal of Financial Crime, vol. 29 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Expert briefing
Publication date: 3 July 2023

TikTok’s new campaign will piggyback on the region’s robust appetite for social media, and is intended to help offset revenue the company will likely lose due to increasing…

Details

DOI: 10.1108/OXAN-DB280237

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 8 August 2023

Wahyu Fahrul Ridho

The purpose of this study is to critically examine a prevalent online scam mechanism, with the aim of understanding its exploitation of behavioral finance principles and group…

Abstract

Purpose

The purpose of this study is to critically examine a prevalent online scam mechanism, with the aim of understanding its exploitation of behavioral finance principles and group dynamics and propose effective countermeasures.

Design/methodology/approach

This study uses a blend of case study and thematic analysis, drawing from behavioral finance, social psychology and criminology, using primary source testimonies of victims to provide a detailed exploration of the scam’s operations.

Findings

This research uncovers the strategic use of four key principles: loss aversion, overconfidence, scarcity bias and social proof, within the scam operation. These tendencies are manipulated to induce victims to progressively invest into the fraudulent scheme, even amid growing suspicions.

Research limitations/implications

While the research elucidates on the workings of one specific online scam, it is necessary to explore if and how these principles are used in various other online fraudulent schemes, to develop comprehensive countermeasures.

Practical implications

The findings underscore the urgent need for enhanced public awareness, stronger corporate responsibility and robust regulatory oversight. There is a call for concerted efforts encompassing public education campaigns, fortified security protocols and strong legal frameworks for preventing such scams.

Social implications

The research emphasizes the need for collective action in ensuring a safe online space. This involves the individual user’s prudence, businesses’ proactive education initiatives and stringent legal actions against fraudulent activities.

Originality/value

This research offers novel insights into the nuanced manipulation of behavioral finance principles within online scams, based on empirical data from victim testimonials. These findings contribute to the understanding of the psychological mechanisms at play in online scams and are instrumental in formulating effective preventive strategies.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 13 May 2021

Monica T. Whitty

The purpose of this paper is to gain in-depth understandings of the stages involved in the case of a romance scam victim who was unknowingly used as a drug mule. The work compares…

Abstract

Purpose

The purpose of this paper is to gain in-depth understandings of the stages involved in the case of a romance scam victim who was unknowingly used as a drug mule. The work compares this case with established research in this field. It also seeks to learn more about the strategies used by these cybercriminals.

Design/methodology/approach

The research presents a case study of a victim of a romance scam who was arrested for drug trafficking. The research involves a grounded theory analysis of interviews with the victim, legal team and family members and analysis of her instant messenger chat logs and email communications.

Findings

The analysis identified a variation on previous stage models of romance scams and re-names this as the “romance scammers” strategy model. It also replicates previous work on scammers’ techniques and highlights some new strategies, including positively and negatively framing messages, unconditional positive regard, activating norms of romantic relationships, cognitive immersion, manipulating role, sleep deprivation and signing is believing.

Practical implications

These findings could be used to help guide future similar court cases. Moreover, they can be drawn upon to advance future research on romance scams, as well as scams in general.

Originality/value

This is the first in-depth case study of a romance scam victim involved in drug trafficking and is the first research on romance scams to examine in depth a case, taking into account textual exchanges. While not undermining previous research, this paper provides valuable insights that are lacking in previous qualitative work on cyber scam victims.

Details

Journal of Financial Crime, vol. 30 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 17 October 2022

Ojeifoh Okosun and Uchenna Ilo

The purpose of this paper is to critically examine the evolution of a particular variant of cyber fraud known as the Nigerian prince scam and to demonstrate its socio-cultural…

Abstract

Purpose

The purpose of this paper is to critically examine the evolution of a particular variant of cyber fraud known as the Nigerian prince scam and to demonstrate its socio-cultural impact. These scams are also referred to as yahoo scams. This paper traces the history of the Nigerian prince scam and how the scheme has evolved over the years to become more sophisticated, audacious and damaging to its victims.

Design/methodology/approach

The analytic approach is conceptual, drawing on institutional anomie theory, social learning theory and routine activity theory to explain this unique typology of cybercrime. Data were collected and analysed from books, journal articles, newspaper articles and other electronic Web sources.

Findings

The ineffective political leadership of Nigeria’s present elected and past military leaders could be attributed to creating culturally induced pressures to secure monetary success by the scammers. A significant number of people involved in this malfeasance justify these crimes with the argument of being owed reparations for colonisation, which might explain why international and local agencies may not be effective at eradicating this crime problem.

Originality/value

Despite the continued perpetration of the Nigerian prince scam, current research has not presented an evolutionary view of this fraudulent operation. This paper adds to the literature by explaining the origins of the scam, how they have developed over time and how internet technology has advanced the sophistication of the scam.

Details

Journal of Financial Crime, vol. 30 no. 6
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 27 September 2023

Sharon Wilson, Nor Azlili Hassan, Kheng Kia Khor, Santhidran Sinnappan, Afi Roshezry Abu Bakar and Soon Aun Tan

Scams are indeed malicious attempts to influence people and can take many forms, including online scams. With the increasing availability of technology, scammers have more tools…

Abstract

Purpose

Scams are indeed malicious attempts to influence people and can take many forms, including online scams. With the increasing availability of technology, scammers have more tools at their disposal to create convincing and sophisticated communications that appear to come from legitimate sources, such as emails, text messages or social media posts. These scams can be designed to trick individuals into clicking on malicious links, downloading malware or ransomware or providing sensitive information such as login information, financial information or personal details. Scammers often use social engineering techniques to persuade their targets to take specific actions, such as creating a sense of urgency, offering a reward or prize or posing as a trusted authority. These tactics can be highly effective, particularly if the target is unaware of the warning signs of a scam or is unfamiliar with how to protect themselves from online fraud. This paper aims to explore the extent and nature of this problem and evokes the concern that the general public is vulnerable and susceptible to scams if they are not resilient and aware. This paper also explores why victims fall for online scams and uncovers preventive measures to enable a direction in tacitly strategizing ways to create more impactful and effective awareness campaigns.

Design/methodology/approach

This study explores these aspects through a holistic qualitative approach. Using in-depth interview techniques with six victims, six non-victims, four law enforcement officers, four scammers and seven stakeholders from various agencies such as banks, telecommunication agencies and the Malaysian Communications and Multimedia Commission involved in combating the issue of scams.

Findings

The findings generally revealed that participants who were victims of scams felt Malaysians were susceptible to scams, easily fooled and had a nonchalant attitude. Most participants also highlighted that public safety is important for ensuring a high quality of life for citizens that should work closely between the government and non-government agencies, including effective law enforcement and crime prevention strategies.

Originality/value

The uniqueness of this study is the feedback from scammers themselves and their input towards authority and victims. Overall, the respondents provide their views drawing strength from the ever-changing technological background as well as the susceptibility of security features and vulnerability of human engagement.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 3 October 2008

Esharenana E. Adomi and Stella E. Igun

The purpose of this paper is to describe cyber crime and techniques adopted for combating it in Nigeria.

4885

Abstract

Purpose

The purpose of this paper is to describe cyber crime and techniques adopted for combating it in Nigeria.

Design/methodology/approach

Reviews the state of cyber crime in Nigeria, and how it is being stemmed in the country.

Findings

The types of cyber crime in Nigeria are revealed together with the efforts geared towards combating/preventing cyber crime in the country. The paper also draws attention to the possibility of libraries that offer public internet access service being victims of cyber crime as well as unknown perpetrators. The paper recommends how cyber crime can be brought under control.

Originality/value

It reveals factors that contribute to perpetration of cyber crime in Nigeria and efforts being made to combat it. This will enable various countries, in developing and developed world, to be sensitized to the menace of cyber crime and take relevant steps to fight against it.

Details

The Electronic Library, vol. 26 no. 5
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 31 August 2022

Yi Yong Lee, Chin Lay Gan and Tze Wei Liew

The purpose of this paper is to understand the influence of exposure to motivated offenders who may alter the vulnerability levels to phishing victimization. This is particularly…

Abstract

Purpose

The purpose of this paper is to understand the influence of exposure to motivated offenders who may alter the vulnerability levels to phishing victimization. This is particularly focused on explaining the influences of individuals’ online lifestyles and attitudes toward information sharing online on phishing susceptibility.

Design/methodology/approach

This conceptual paper explores the risk of phishing victimization using criminological theories. The authors draw on empirical evidence from existing cybercrime literature and revisit routine activities theory (RAT) and lifestyle RAT (LRAT) to elucidate the risk of phishing victimization. This paper proposes that cyber-RAT, which was developed from RAT and LRAT, could interpret phishing victimization. Grounded on the intervention-based theory against cybercrime phishing, this study suggests that an attitude toward precautionary behavior (information sharing online) is essential to mitigate the phishing victimization risk.

Findings

This paper aims to provide a clear insight into the understanding of phishing victimization risk using theoretical and empirical evidence.

Originality/value

The theoretical perspective outlined provides the understanding of the impacts of online routine activities on a phishing attack which in turn will increase the awareness of phishing threats. The important role of the precautionary countermeasure, that is, attitudes toward information sharing online is highlighted to reconcile the phishing victimization risk.

Details

The Journal of Adult Protection, vol. 24 no. 3/4
Type: Research Article
ISSN: 1466-8203

Keywords

1 – 10 of 508