Skip to main content

Fraud and its PREY: Conceptualising Social Engineering Tactics and its Impact on Financial Literacy Outcomes

  • Chapter
Financial Literacy and the Limits of Financial Decision-Making

Abstract

An unexpected finding within the financial literacy debate centres on the relationship between financial literacy levels and fraud victimisation. It has often been assumed that increasing financial literacy levels would also act as a protective factor for individuals falling victim to financial and investment fraud. While some support for this assumption has been found (for example, Gamble et al, 2012; Lusardi, 2012), a number of researchers have in fact reported that financial literacy is associated with higher levels of victimisation (NASD, 2006; American Association of Retired Persons (AARP), 2007, 2008, 2011; Australian Crime Commission (ACC) and Australian Institute of Criminology (AIC), 2012). The NASD Investor Education Foundation (now FINRA Investor Education Foundation), concluded that ‘financial literacy programs are necessary but probably not sufficient to prevent fraud’ (NASD, 2006, p. 6). This represents a major challenge for the financial literacy agenda.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Abraham, S. and Chengular-Smith, I. (2010) An overview of social engineering malware: Trends, tactics and implications. Technology in Society 32(3): 183–196.

    Article  Google Scholar 

  • American Association of Retired Persons (AARP) (2007) Stolen futures: An AARP Washington survey of investors and victims of investment fraud. http://assets.aarp.org/rgcenter/consume/wa_fraud_07.pdf, accessed 23 February 2013.

  • American Association of Retired Persons (2008) Consumer fraud: A 2008 survey of AARP Colorado members’ experiences and opinions, http://assets.aarp.org/rgcenter/consume/co_fraud_08.pdf, accessed 23 February 2013.

  • American Association of Retired Persons (2011) AARP Foundation national fraud victim survey, http://assets.aarp.org/rgcenter/econ/fraud-victims-ll.pdf, accessed 23 February 2013.

  • Applegate, S. (2009) Social engineering: Hacking the wetware’. Information Security Journal: A Global Perspective 18(1): 40–46.

    Google Scholar 

  • Australia and New Zealand Banking Group Limited (ANZ) (2011) Adult financial literacy in Australia, http://www.anz.com.au/resources/f/9/f9fc9800493e8ac695c3d7fc8cff90cd/2011-Adult-Financial-Literacy-Full.pdf.pdf?CACHEID=f9fc9800493e8ac695c3d7fc8cff90cd, accessed 20 May 2013.

  • Australian Crime Commission (ACC) and Australian Institute of Criminology (AIC) (2012) Serious and Organised Investment Fraud in Australia. Canberra, Australia: Australian Crime Commission and Australian Institute of Criminology.

    Google Scholar 

  • Australian Securities and Investment Commission (ASIC) (2002a) International Cold Calling Investment Scams. Canberra, Australia: Australian Securities and Investment Commission.

    Google Scholar 

  • Australian Securities and Investment Commission (2002b) Hook, Line and Sinker: Who Takes the Bait in Cold Calling Scams? Canberra, Australia: Australian Securities and Investment Commission.

    Google Scholar 

  • Bakhshi, T., Papadaki, M. and Furnell, S. (2009) Social engineering: Assessing vulnerabilities in practice. Information Management and Computer Security 17(1): 53–63.

    Article  Google Scholar 

  • Beaver, K. (2009) Social engineering. Security Technology Executive (April): 35–36.

    Google Scholar 

  • Button, M., Lewis, C. and Tapley, J. (2009) Fraud Typologies and Victims of Fraud: Literature Review. London: Centre for Counter Fraud Studies.

    Google Scholar 

  • Deevy, M., Lucich, S. and Beals, M. (2012) Scams, schemes and swindles: A review of consumer financial fraud research, Financial Fraud Research Center, http://fraudresearchcenter.org/wp-content/uploads/2012/ll/Scams-Schemes-Swindles-FINAL_11.20.121.pdf, accessed 23 February 2013.

  • Gamble, K., Boyle, P., Yu, L. and Bennett, D. (2012) Aging, financial literacy and fraud. Social Science Research Network, http://ssrn.com/abstract=2165564 or http://dx.doi.org/10.2139/ssrn.2165564, accessed 25 February 2013.

  • Joo, S. (2008) Personal financial wellness. In: J.J. Xiao (ed.) Handbook of consumer finance research. New York: Springer.

    Google Scholar 

  • Lusardi, A. (2012) Financial literacy and financial decision making in older adults. Journal of the American Society on Aging 36(2): 25–32.

    Google Scholar 

  • Malone, K., Stewart, S.D., Wilson, J. and Korsching, P.F. (2010) Perceptions of financial well-being among American women in diverse families. Journal of Family and Economic Issues 31(1): 63–81.

    Article  Google Scholar 

  • Manske, K. (2000) An introduction to social engineering. Information Systems Security 9(5): 53–59.

    Article  Google Scholar 

  • Mitnick, K. and Simon, W. (2002) The Art of Deception: Controlling the Human Element of Security. Indianapolis, IN: Wiley.

    Google Scholar 

  • NASD Investor Education Foundation (2006) Investor fraud study: Final report, http://www.sec.gov/news/press/extra/seniors/nasdfraudstudy051206.pdf, accessed 25 January 2013.

  • National Fraud Authority (2012) Annual Fraud Indicator. London: Home Office.

    Google Scholar 

  • Okenyi, P. and Owens, T. (2007) On the anatomy of human hacking. Information Systems Security 16(6): 302–314.

    Article  Google Scholar 

  • Peltier, T. (2006) Social engineering: Concepts and solutions. Information Security and Risk Management 15(3): 13–21.

    Google Scholar 

  • Power, R. and Forte, D. (2006) Social engineering: Attacks have evolved but countermeasures have not. Computer Fraud and Security 2006(10): 17–20.

    Article  Google Scholar 

  • Rusch, J. (1999) The social engineering of internet fraud, http://www.isoc.org/inet99/proceedings/3g/3g_2.htm, accessed 25 February 2013.

  • Sagarin, B.J., Cialdini, R.B., Rice, W.E. and Serna, S.B. (2002) Dispelling the illusion of invulnerability: The motivations and mechanisms of resistance to persuasion. Journal of Personality and Social Psychology 83(3): 526–541.

    Article  Google Scholar 

  • Taskforce on Financial Literacy (2010) Canadians and their money: Building a brighter financial future, http://www.financialliteracyincanada.com/pdf/canadians-and-their-money-4-rec-eng.pdf, accessed 25 February 2013.

  • Thompson, S. (2006) Helping the Hacker? Library information, security and social engineering. Information Technology and Libraries 25(4): 222–225.

    Article  Google Scholar 

  • Workman, M. (2007a) Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security. Journal of the American Society for Information Science and Technology 59(4): 662–674.

    Article  Google Scholar 

  • Workman, M. (2007b) Gaining access with social engineering: An empirical study of the threat. Information Systems Security 16(6): 315–331.

    Article  Google Scholar 

  • Workman, M. (2008) A test of security interventions for security threats from social engineering. Information Management and Computer Security 16(5): 463–483.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 The Editor(s)

About this chapter

Cite this chapter

Drew, J.M., Cross, C. (2016). Fraud and its PREY: Conceptualising Social Engineering Tactics and its Impact on Financial Literacy Outcomes. In: Harrison, T. (eds) Financial Literacy and the Limits of Financial Decision-Making. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-30886-9_16

Download citation

Publish with us

Policies and ethics