Abstract
Objectives
Examine the level of engagement of young users with money mule recruitment ads on Instagram.
Methods
Three ads reflecting key cybercrime involvement mechanisms and targeting Dutch user clusters were run on two Instagram placements. By means of this quasi-experimental 3 × 2 factorial design, we were able to analyze the reach and views of the ads, click-through rates, gender of the participants, and temporal distributions of user engagement.
Results
Mimicking actual recruitment environments, analysis shows that up to 3% of young users engaged with the ads, especially those promoting a luxury lifestyle and using neutralization techniques. Men were more likely to engage, and click-through rates were higher at night.
Conclusions
Some young Instagram users seem prone to making money through their bank cards and risk becoming involved in cybercrime online. We encourage future research to explore further the use of social media in criminological studies.
Similar content being viewed by others
References
Andrews, D. A., & Bonta, J. (2010). Rehabilitating criminal justice policy and practice. Psychology, Public Policy, and Law, 16(1), 39–55. https://doi.org/10.1037/a0018362
Arevalo, B. C. (2015). Money mules: Facilitators of financial crime. An explorative research on money mules (Master’s Thesis). Utrecht University. Retrieved from https://d1wqtxts1xzle7.cloudfront.net/49127520/Money_Mule_Thesis_Brenda_Arevalo-with-cover-page-v2.pdf?Expires=1665745550&Signature=EsQ0x632iqoG7VwgeZrTdmqESLWw1LGOkZljS0bZ28ATTSrXjPSoCogrsd~u~B9wi26nRUmjjPoN7vQv1rdgxFhUSFs1Q2CigbhwCPm3H5nZ-lNIJFJzZSy7dg-Unbom~Qa7j9PQTTl2SUwqTD6zS2cfm69OI~UkXCeeL4tIoEQch2cIZXxyGtsuZqujHQ5R8N-4kdNYZZZaRjfSBXYksUXKFHrfCVe0UcqUl97uWRKBgdq-jSqbDGbRFz1GZZTDldlbsat6nuT76T4u0I2rF-2MoYmcDMaUw~vnKKKB3yTMt3aDXUx07mwSP0Z~fht8mFtH1A~5QxKCoa6Pvuu4SA__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
Aston, M., McCombie, S., Reardon, B., & Watters, P. (2009). A preliminary profiling of internet money mules: An Australian perspective. In 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing (pp. 482–487). Presented at the 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, Brisbane, Australia: IEEE. https://doi.org/10.1109/UIC-ATC.2009.63
Bakshy, E., Eckles, D., Yan, R., & Rosenn, I. (2012). Social influence in social advertising: Evidence from field experiments. In Proceedings of the 13th ACM Conference on Electronic Commerce - EC ’12 (p. 146). Presented at the the 13th ACM Conference, Valencia, Spain: ACM Press. https://doi.org/10.1145/2229012.2229027
Bekkers, L. M. J., & Leukfeldt, E. R. (2022). Recruiting money mules on Instagram: A qualitative examination of the online involvement mechanisms of cybercrime. Deviant Behavior, 1–17.https://doi.org/10.1080/01639625.2022.2073298
Bekkers, L. M. J., Schiks, J. A. M., & Leukfeldt, E. R. (2020). Naar een interventie tegen geldezels. Een pilot in de gemeente Haarlem (pp. 1–24). The Hague University of Applied Sciences. https://www.dehaagsehogeschool.nl/docs/default-source/documenten-onderzoek/expertisecentra/naar-een-interventie-tegen-geldezels_een-pilot-in-de-gemeente-haarlem.pdf?sfvrsn=930f4c56_2
Brake, M. (2013). Sociology of youth culture and youth subcultures (Routledge Revivals): Sex and Drugs and Rock “n” Roll.
Broockman, D. E., & Green, D. P. (2014). Do online advertisements increase political candidates’ name recognition or favorability? Evidence from randomized field experiments. Political Behavior, 36(2), 263–289. https://doi.org/10.1007/s11109-013-9239-z
Brunton-Smith, I., & McCarthy, D. J. (2016). Explaining young people’s involvement in online piracy: An empirical assessment using the offending crime and justice survey in England and Wales. Victims & Offenders, 11(4), 509–533. https://doi.org/10.1080/15564886.2015.1121943
Bulanova-Hristova, G., Kasper, K., Odinot, G., Verhoeven, M., Pool, R., de Poot, C., et al. (2016). Cyber-OC – scope and manifestations in selected EU member states (No. 50) (pp. 1–298). Bundeskriminalamt Criminalistic Institute. https://eucpn.org/sites/default/files/document/files/52._cyber-oc_-_scope_and_manifestations_in_selected_eu_member_states.pdf
Calderoni, F., Campedelli, G. M., Communale, T., Marchesi, M., & Savona, E. (2020). Recruitment into organised criminal groups: A systematic review. Australian Institute of Criminology. https://doi.org/10.52922/ti04183
Calderoni, F., Campedelli, G. M., Szekely, A., Paolucci, M., & Andrighetto, G. (2022). Recruitment into organized crime: An agent-based approach testing the impact of different policies. Journal of Quantitative Criminology, 38(1), 197–237. https://doi.org/10.1007/s10940-020-09489-z
Campedelli, G. M., Calderoni, F., Comunale, T., & Meneghini, C. (2021). Life-course criminal trajectories of mafia members. Crime & Delinquency, 67(1), 111–141. https://doi.org/10.1177/0011128719860834
Clarke, R. V. (1980). “Situational” crime prevention: Theory and practice. The British Journal of Criminology, 20(2), 136–147. https://doi.org/10.1093/oxfordjournals.bjc.a047153
Clarke, R. V. (2017). Situational crime prevention. In R. Wortley & M. Townsley (Eds.), Environmental criminology and crime analysis (2nd ed., pp. 1–25). London, UK; New York, NY: Routledge, Taylor & Francis Group.
Coppock, A., Green, D. P., & Porter, E. (2022). Does digital advertising affect vote choice? Evidence from a randomized field experiment. Research & Politics, 9(1), 205316802210769. https://doi.org/10.1177/20531680221076901
Cornish, D. B., & Clarke, R. V. (2003). Opportunities, precipitators and criminal decisions: A reply to Wortley´s critique of situational crime prevention. In M. J. Smith & D. B. Cornish (Eds.), Theory for practice in situational crime prevention (pp. 41–96). New York, NY: Criminal Justice.
Custers, B. H. M., Pool, R. L. D., & Cornelisse, R. (2019). Banking malware and the laundering of its profits. European Journal of Criminology, 16(6), 728–745. https://doi.org/10.1177/1477370818788007
de Boer, H., Ferwerda, H., & Kuppens, J. (2022). Do or don’t. Kennissynthese ingroeimechanismen en rekruteringsprocessen van jongeren in de georganiseerde criminaliteit (pp. 1–69). Ministerie van Justitie en Veiligheid, Wetenschappelijk Onderzoek- en Documentatiecentrum (WODC). https://repository.wodc.nl/bitstream/handle/20.500.12832/3154/3203-do-or-don%27t-volledige-tekst.pdf
Dunham, K. (2006). Money mules: An investigative view. Information Systems Security, 15(1), 6–10. https://doi.org/10.1201/1086.1065898X/45926.15.1.20060301/92679.2
Europol. (2021). Money muling. https://www.europol.europa.eu/operations-services-and-innovation/public-awareness-and-prevention-guides/money-muling
Federal Bureau of Investigation. (2022). Money mules. How We Can Help You. https://www.fbi.gov/how-we-can-help-you/safety-resources/scams-and-safety/common-scams-and-crimes/money-mules
Felson, M. (2003). The process of co-offending. Crime Prevention Studies, 16, 149–167.
Gendreau, P., Little, T., & Goggin, C. (1996). A meta-analysis of the predictors of adult offender recidivism: What works! Criminology, 34(4), 575–608. https://doi.org/10.1111/j.1745-9125.1996.tb01220.x
Goldsmith, A., & Wall, D. S. (2022). The seductions of cybercrime: Adolescence and the thrills of digital transgression. European Journal of Criminology, 19(1), 98–117. https://doi.org/10.1177/1477370819887305
Gordon, B. R., Zettelmeyer, F., Bhargava, N., & Chapsky, D. (2019). A comparison of approaches to advertising measurement: Evidence from big field experiments at Facebook. Marketing Science, 38(2), 193–225. https://doi.org/10.1287/mksc.2018.1135
Herbert, S. (1998). Police subculture reconsidered. Criminology, 36(2), 343–370. https://doi.org/10.1111/j.1745-9125.1998.tb01251.x
Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28(2), 171–198. https://doi.org/10.1080/01639620601131065
Holt, T. J. (2020). Computer hacking and the hacker subculture. In T. J. Holt & A. M. Bossler (Eds.), The Palgrave Handbook of International Cybercrime and Cyberdeviance (pp. 725–742). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-78440-3_31
Hutchings, A., & Holt, T. J. (2015). A crime script analysis of the online stolen data market. British Journal of Criminology, 55(3), 596–614. https://doi.org/10.1093/bjc/azu106
Ianni, F. A. J., & Reuss-Ianni, E. (1972). A family business: Kinship and social control in organized crime. Russell Sage Foundation.
Jilke, S., Lu, J., Xu, C., & Shinohara, S. (2019). Using large-scale social media experiments in public administration: Assessing charitable consequences of government funding of nonprofits. Journal of Public Administration Research and Theory, 29(4), 627–639. https://doi.org/10.1093/jopart/muy021
Kleemans, E. R., & de Poot, C. J. (2008). Criminal careers in organized crime and social opportunity structure. European Journal of Criminology, 5(1), 69–98. https://doi.org/10.1177/1477370807084225
Kleemans, E. R., & van Koppen, V. (2020). Organized crime and criminal careers. Crime and Justice, 49, 385–423. https://doi.org/10.1086/707318
Leukfeldt, E. R. (2014). Phishing for suitable targets in The Netherlands: Routine activity theory and phishing victimization. Cyberpsychology, Behavior, and Social Networking, 17(8), 551–555. https://doi.org/10.1089/cyber.2014.0008
Leukfeldt, E. R., & Holt, T. J. (2022). Cybercrime on the menu? Examining cafeteria-style offending among financially motivated cybercriminals. Computers in Human Behavior, 126, 106979. https://doi.org/10.1016/j.chb.2021.106979
Leukfeldt, E. R., & Kleemans, E. R. (2019). Cybercrime, money mules and situational crime prevention: Recruitment, motives and involvement mechanisms. In S. Hufnagel & A. Moiseienko (Eds.), Criminal networks and law enforcement: global perspectives on illegal enterprise (pp. 75–89). London ; New York: Routledge, Taylor & Francis Group. https://research.vu.nl/ws/portalfiles/portal/85076479/Cybercrime_money_mules_and_situational_crime_prevention.pdf
Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017). Cybercriminal networks, social ties and online forums: Social ties versus digital ties within phishing and malware networks. British Journal of Criminology, 57(3), 704–722. https://doi.org/10.1093/bjc/azw009
Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017). Origin, growth and criminal capabilities of cybercriminal networks. An international empirical analysis. Crime, Law and Social Change, 67(1), 39–53. https://doi.org/10.1007/s10611-016-9663-1
Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017). A typology of cybercriminal networks: From low-tech all-rounders to high-tech specialists. Crime, Law and Social Change, 67(1), 21–37. https://doi.org/10.1007/s10611-016-9662-2
Lipsey, M. W., & Cullen, F. T. (2007). The effectiveness of correctional rehabilitation: A review of systematic reviews. Annual Review of Law and Social Science, 3(1), 297–320. https://doi.org/10.1146/annurev.lawsocsci.3.081806.112833
Madarie, R., & Kruisbergen, E. W. (2020). Traffickers in transit: Analysing the logistics and involvement mechanisms of organised crime at logistical nodes in the Netherlands: Empirical results of the Dutch organised crime monitor. In D. Weisburd, E. U. Savona, B. Hasisi, & F. Calderoni (Eds.), Understanding Recruitment to Organized Crime and Terrorism (pp. 277–308). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-030-36639-1_12
Maimon, D., & Louderback, E. R. (2019). Cyber-dependent crimes: An interdisciplinary review. Annual Review of Criminology, 2(1), 191–216. https://doi.org/10.1146/annurev-criminol-032317-092057
Maruna, S., & Copes, H. (2005). What have we learned from five decades of neutralization research? Crime and Justice, 32, 221–320. https://doi.org/10.1086/655355
Maruna, S., & Mann, R. E. (2006). A fundamental attribution error? Rethinking cognitive distortions†. Legal and Criminological Psychology, 11(2), 155–177. https://doi.org/10.1348/135532506X114608
Meta. (2022a). Help center. Help Center. https://help.instagram.com/
Meta. (2022b). How Facebook distributes content. Meta Business Help Center. https://www.facebook.com/business/help/718033381901819?id=208060977200861
Meta. (2022c). About estimated, in-development metrics and third-party metrics. Meta Business Help Center. https://www.facebook.com/business/help/181058782494426#estimated
Moffitt, T. E. (1993). Adolescence-limited and life-course-persistent antisocial behavior: A developmental taxonomy. Psychological Review, 100(4), 674–701.
Moneva, A., Leukfeldt, E. R., & Klijnsoon, W. (2022). Alerting consciences to reduce cybercrime: A quasi-experimental design using warning banners. Journal of Experimental Criminology. https://doi.org/10.1007/s11292-022-09504-2
Morselli, C. (2005). Contacts, opportunities, and criminal enterprise. Toronto ; Buffalo: University of Toronto Press.
Mosseri, A. (2021). Shedding more light on how Instagram works. Instagram Blog. https://about.instagram.com/blog/announcements/shedding-more-light-on-how-instagram-works
Moule, R. K., Pyrooz, D. C., & Decker, S. H. (2013). From ‘what the F#@% is a Facebook?’ to ‘who doesn’t use Facebook?’: The role of criminal lifestyles in the adoption and use of the Internet. Social Science Research, 42(6), 1411–1421. https://doi.org/10.1016/j.ssresearch.2013.06.008
Oerlemans, J.-J., Custers, B. H. M., Pool, R. L. D., & Cornelisse, R. (2016). Cybercrime en witwassen: Bitcoins, online dienstverleners en andere witwasmethoden bij banking malware en ransomware. Den Haag, Meppel: Boom criminologie ; Wetenschappelijk Onderzoek- en Documentatiecentrum (WODC), Ministerie van Veiligheid en Justitie ; Boom juridisch distributiecentrum.
Palmieri, M., Shortland, N., & McGarry, P. (2021). Personality and online deviance: The role of reinforcement sensitivity theory in cybercrime. Computers in Human Behavior, 120, 106745. https://doi.org/10.1016/j.chb.2021.106745
Paoli, L. (2003). Mafia brotherhoods: Organized crime, Italian style. Oxford ; New York: Oxford University Press.
Poushter, J., Bishop, C., & Chwe, H. (2018). Social media use continues to rise in developing countries but plateaus across developed ones (pp. 1–46). Pew Research Center. https://www.pewglobal.org/wp-content/uploads/sites/2/2018/06/Pew-Research-Center_Global-Tech-Social-Media-Use_2018.06.19.pdf
Pratt, T. C., Cullen, F. T., Sellers, C. S., Thomas Winfree, L., Madensen, T. D., Daigle, L. E., et al. (2010). The empirical status of social learning theory: A meta-analysis. Justice Quarterly, 27(6), 765–802. https://doi.org/10.1080/07418820903379610
Quinn, J. F., & Forsyth, C. J. (2005). Describing sexual behavior in the era of the internet: A typology for empirical research. Deviant Behavior, 26(3), 191–207. https://doi.org/10.1080/01639620590888285
Roks, R. A., Leukfeldt, E. R., & Densley, J. A. (2021). The hybridization of street offending in the Netherlands. The British Journal of Criminology, 61(4), 926–945. https://doi.org/10.1093/bjc/azaa091
Ryan, T. J. (2012). What makes us click? Demonstrating incentives for angry discourse with digital-age field experiments. The Journal of Politics, 74(4), 1138–1152. https://doi.org/10.1017/S0022381612000540
Statistics Netherlands. (2020). Wie gebruikt het vaakst sociale media? https://longreads.cbs.nl/nederland-in-cijfers-2020/wie-gebruikt-het-vaakst-sociale-media/
Su, W., Han, X., Yu, H., Wu, Y., & Potenza, M. N. (2020). Do men become addicted to internet gaming and women to social media? A meta-analysis examining gender-related differences in specific internet addiction. Computers in Human Behavior, 113, 106480. https://doi.org/10.1016/j.chb.2020.106480
Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664. https://doi.org/10.2307/2089195
van Dijk, M., Kleemans, E. R., & Eichelsheim, V. I. (2019). Children of organized crime offenders: Like father, like child? An explorative and qualitative study into mechanisms of intergenerational (Dis)continuity in organized crime families. European Journal on Criminal Policy and Research, 25(4), 345–363. https://doi.org/10.1007/s10610-018-9381-6
van Koppen, M. V. (2013). Involvement mechanisms for organized crime. Crime, Law and Social Change, 59(1), 1–20. https://doi.org/10.1007/s10611-012-9396-8
Wormith, J. S., Althouse, R., Simpson, M., Reitzel, L. R., Fagan, T. J., & Morgan, R. D. (2007). The rehabilitation and reintegration of offenders: The current landscape and some future directions for correctional psychology. Criminal Justice and Behavior, 34(7), 879–892. https://doi.org/10.1177/0093854807301552
Funding
This work was funded by the Taskforce for Applied Research SIA of the Dutch Research Council (grant number RAAK.PUB06.032).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Bekkers, L.M.J., Moneva, A. & Leukfeldt, E.R. Understanding cybercrime involvement: a quasi-experiment on engagement with money mule recruitment ads on Instagram. J Exp Criminol (2022). https://doi.org/10.1007/s11292-022-09537-7
Accepted:
Published:
DOI: https://doi.org/10.1007/s11292-022-09537-7