You can trust me: a multimethod analysis of the Nigerian email scam
- 190 Downloads
How do scammers invoke trust within the Nigerian email scam and how do recipients interpret such trust-laden offers? Rather than view the email content as static, this article suggests that the emails strategically appeal to trust as a means to enhance susceptibility. Content analysis of over a half-million scam emails reveals that references to trust language are most common in larger award claims and those claiming to be from Africa. However, experimental evidence suggests that trust language within scam letters has minimal influence on respondents’ perceptions of the letter. This analysis expands our understanding of the psychology behind the scam letter format and suggests means to further combat email fraud.
KeywordsNigerian email scam Trust Content analysis Experimental design Perceptions
- Berelson, B. 1952. Content analysis in communication research. Glencoe, IL: Free Press.Google Scholar
- Caplan, T. 2013, February 13. Phone interview.Google Scholar
- Cheng, J. 2010. Suckers victims lost $9.3 billion to 419 scammers in 2009. Arstechnica. http://arstechnica.com/security/2010/01/victims-lost-93-billion-to-419-scammers-in-2009/. Accessed 29 Jan 2010.
- Costin, A., J. Isacenkova, M. Balduzzi, A. Francillon, and D. Balzarotti. 2013. The role of phone numbers in understanding cyber-crime schemes. Paper presented at the 2013 Eleventh Annual International Conference on Privacy Security and Trust, pp. 213–220.Google Scholar
- Cukier, W.L., E.J. Nesselroth, and S. Cody. 2007. Genre, narrative and the ‘Nigerian letter’ in electronic mail. Proceedings of the 40th Hawaii International Conference on System Sciences. http://csdl2.computer.org/comp/proceedings/hicss/2007/2755/00/27550070a.pdf.
- Datar, T.D., K.A. Cole, and M.K. Rogers. 2014. Awareness of scam e-mails: An exploratory research study. ADFSL Conference on Digital Forensics, Security and Law. http://proceedings.adfsl.org/index.php/CDFSL/article/view/26/26.
- Downs, J.S., M.B. Holbrook, and L.F. Cranor. 2006. Decision strategies and susceptibility to phishing. Carnegie Mellon University Research Showcase.Google Scholar
- Glickman, H. 2005. The Nigerian ‘419’ advance fee scams: Prank or peril? Canadian Journal of African Studies 39 (3): 460–489.Google Scholar
- Gregory, D.W., and B. Nikiforova. 2012. A sweetheart of a deal: How people get hooked and reeled in by financial scams. Journal of Behavioral Finance & Economics 2 (2): 96–122.Google Scholar
- Grinker, R.R., S.C. Lubkemann, and C.B. Steiner. 2010. Perspectives on Africa: A reader in culture, history and representation. New York: Wiley.Google Scholar
- Haines, L. 2004. Nigerian judge claims ‘no jurisdiction to hear it. The A Register. http://www.theregister.co.uk/2004/07/20/419_trail_collapse/. Accessed 20 July 2004.
- Herley, C. 2012. Why do Nigerian scammers say they are from Nigeria? Unpublished paper. http://research.microsoft.com/pubs/167719/whyfromnigeria.pdf.
- Huff, C., and D. Tingley. 2015. “Who are these people” evaluating the demographic characteristics and political preferences of MTurk survey respondents. Research & Politics July–September: 1–12.Google Scholar
- Isacenkova, J., D. Thonnard, A. Coston, A. Francillon, and D. Balzarotti. 2014. Inside the scam jungle: A closer look at 419 scam email operations. EURASIP Journal on Information Security 1: 1–18.Google Scholar
- King, A., and J. Thomas. 2009. You can’t cheat an honest man: Making ($$$s and) sense of the Nigerian e-mail scams. In Crimes of the Internet, eds. F. Schmallegar, and M. Pittaro, 206–224. Saddle River: Pearson Education.Google Scholar
- Krebs, B. 2011. Where did that scammer get your email address? Krebs on Security blog. http://krebsonsecurity.com/2011/04/where-did-that-scammer-get-your-email-address/. Accessed 25 Apr 2011.
- Krippendorff, K. 2004. Content analysis: An introduction to its methodology. Thousand Oaks: Sage.Google Scholar
- Lazarus, D. 2003. Greed fuels big internet scam. San Francisco Chronicle 12 January.Google Scholar
- Legard, D. 2003. E-mail threats increase sharply. PC World. http://www.pcworld.com/article/107930/article.html.
- Longe, O., and A. Osofisan. 2011. On the origins of advance free fraud electronic emails: A technical investigation using Internet protocol address tracers. African Journal of Information Systems 3 (1): 17–26.Google Scholar
- Longe, O.B., V. Mbarika, M. Kourouma, F. Wada, and R. Isabalija. 2009. Seeing beyond the surface: Understanding and tracking fraudulent cyber activities. International Journal of Computer Science and Information Security 6 (3): 124–135.Google Scholar
- Mbaziira, A.V., E. Abozindah, and J.H. Jones Jr. 2015. Evaluating classifiers in detecting 419 scams in bilingual cybercriminal communities. International Journal of Computer Science and Information Security 13 (7): 1–7.Google Scholar
- Mitnick, K., and W. Simon. 2002. The art of deception: Controlling the human element of security. New York: Wiley.Google Scholar
- Muscat, G., M. James, and A. Graycar. 2002. Older people and consumer fraud. Number 220 Canberra: Australian Institute of Criminology.Google Scholar
- Neuendorf, K.A. 2002. The content analysis guidebook. Thousand Oaks: Sage.Google Scholar
- Nhan, J., P. Kinkade, and R. Burns. 2009. Finding a pot of gold at the end of an internet rainbow: Further examination of fraudulent email solicitation. International journal of Cyber Criminology 3 (1): 452–475.Google Scholar
- Paolacci, G., J. Chandler, and P.G. Ipeirotis. 2010. Running experiments on amazon mechanical turk. Judgment and Decision Making 5 (5): 411–419.Google Scholar
- Park, Y., J. Jones, D. McCoy, E. Shi, and M. Jakobsson. 2014. Scambaiter: Understanding targeted Nigerian scams on Craigslist. Proceedings of the Network and Distributed System Security Symposium. Internet Society. https://cs.gmu.edu/~mccoy/papers/scambaiter.pdf.
- Schiesel, S. 2004. Turning the tables on e-mail swindlers. New York Times 17 June: Gl, G7.Google Scholar
- Tade, O., and I. Aliyu. 2011. Social organization and Internet fraud among university undergraduates in Nigeria. International Journal of Cyber Criminology 5 (2): 860–875.Google Scholar
- US Department of State. 1997. Nigerian Advance fee fraud.Google Scholar
- Wizard, B. 2000. Nigeria 419 scam: Game over. Wallowa: Starguill International.Google Scholar
- Zuckoff, M. 2005. Annals of crime: The perfect mark. The New Yorker 82 (13): 36–42.Google Scholar