Abstract
How do scammers invoke trust within the Nigerian email scam and how do recipients interpret such trust-laden offers? Rather than view the email content as static, this article suggests that the emails strategically appeal to trust as a means to enhance susceptibility. Content analysis of over a half-million scam emails reveals that references to trust language are most common in larger award claims and those claiming to be from Africa. However, experimental evidence suggests that trust language within scam letters has minimal influence on respondents’ perceptions of the letter. This analysis expands our understanding of the psychology behind the scam letter format and suggests means to further combat email fraud.
Similar content being viewed by others
Notes
Several million email addresses can be purchased for under $500 (see Krebs 2011).
One of the largest Nigerian scam payouts totaled $242 million, paid out by Nelson Sakaguchi, a director of Banco Noroeste Brazil (Haines 2004). The bank later filed for bankruptcy.
An analysis of phrases within the body of emails was used to remove duplicate emails when identified.
Access to the WordStat dictionaries are available upon request.
The two offers were chosen in that both were within the common range of offers within the half-million emails collected, but large enough to potentially elicit perceptual differences.
This measure admittedly does not distinguish between references to the amount the victim will reportedly receive of the total amount of money claimed in the email.
See Appendix 2 Table for summary statistics for the additional variables.
The included words also include alternate spellings and misspellings of the included words.
Trust references and the monetary offer are italicized for convenience but were not italicized in the web survey.
References
Atkins, B., and W. Huang. 2013. A study of social engineering in online frauds. Open Journal of Social Sciences 1 (3): 23–32.
Barron, A. 2006. Understanding spam: A macro-textual analysis. Journal of Pragmatics 38 (6): 880–904.
Berelson, B. 1952. Content analysis in communication research. Glencoe, IL: Free Press.
Berinsky, A.J., G.A. Huber, and G.S. Lenz. 2012. Evaluating online labor markets for experimental research: Amazon.com’s mechanical turk. Political Analysis 20: 351–368.
Blommaert, J., and T. Omoniyi. 2006. Email fraud: Language, technology, and the indexicals of globalization. Social Semiotics 16 (4): 573–605.
Buhrmester, M., T. Kwang, and S.D. Gosling. 2011. Amazon’s mechanical turk: A new source of inexpensive, yet high-quality, data? Perspectives on Psychological Science 6 (1): 3–5.
Button, M., C. Lewis, and J. Tapley. 2014. Not a victimless crime: The impact of fraud on individual victims and their families. Security Journal 27: 36–54.
Caplan, T. 2013, February 13. Phone interview.
Cheng, J. 2010. Suckers victims lost $9.3 billion to 419 scammers in 2009. Arstechnica. http://arstechnica.com/security/2010/01/victims-lost-93-billion-to-419-scammers-in-2009/. Accessed 29 Jan 2010.
Costin, A., J. Isacenkova, M. Balduzzi, A. Francillon, and D. Balzarotti. 2013. The role of phone numbers in understanding cyber-crime schemes. Paper presented at the 2013 Eleventh Annual International Conference on Privacy Security and Trust, pp. 213–220.
Cukier, W.L., E.J. Nesselroth, and S. Cody. 2007. Genre, narrative and the ‘Nigerian letter’ in electronic mail. Proceedings of the 40th Hawaii International Conference on System Sciences. http://csdl2.computer.org/comp/proceedings/hicss/2007/2755/00/27550070a.pdf.
Datar, T.D., K.A. Cole, and M.K. Rogers. 2014. Awareness of scam e-mails: An exploratory research study. ADFSL Conference on Digital Forensics, Security and Law. http://proceedings.adfsl.org/index.php/CDFSL/article/view/26/26.
Downs, J.S., M.B. Holbrook, and L.F. Cranor. 2006. Decision strategies and susceptibility to phishing. Carnegie Mellon University Research Showcase.
Evans, M., W.V. McIntosh, J. Lin, and C.L. Cates. 2007. Recounting the courts? Applying content analysis to enhance empirical legal research. Journal of Empirical Legal Studies 4 (4): 1007–1039.
Gao, Y., and G. Zhao. 2005. Knowledge-based information extraction: A case study of recognizing emails of Nigerian frauds. In Natural language processing and information systems, ed. A. Montoyo, R. Munoz, and E. Metais, 161–172. Berlin: Springer.
Glickman, H. 2005. The Nigerian ‘419’ advance fee scams: Prank or peril? Canadian Journal of African Studies 39 (3): 460–489.
Gregory, D.W., and B. Nikiforova. 2012. A sweetheart of a deal: How people get hooked and reeled in by financial scams. Journal of Behavioral Finance & Economics 2 (2): 96–122.
Grinker, R.R., S.C. Lubkemann, and C.B. Steiner. 2010. Perspectives on Africa: A reader in culture, history and representation. New York: Wiley.
Haines, L. 2004. Nigerian judge claims ‘no jurisdiction to hear it. The A Register. http://www.theregister.co.uk/2004/07/20/419_trail_collapse/. Accessed 20 July 2004.
Hamburger, Y.A., and E. Ben-Artzi. 2000. The relationship between extraversion and neuroticism and the different uses of the Internet. Computers in Human Behavior 16 (4): 441–449.
Hamburger, Y.A., and E. Ben-Artzi. 2003. Loneliness and Internet use. Computers in Human Behavior 19 (1): 71–80.
Herley, C. 2012. Why do Nigerian scammers say they are from Nigeria? Unpublished paper. http://research.microsoft.com/pubs/167719/whyfromnigeria.pdf.
Horton, J.J., D. Rand, and R.J. Zeckhauser. 2011. The online laboratory: Conducting experiments in a real labor market. Experimental Economics 14 (3): 399–425.
Huber, G.A., S.J. Hill, and G.S. Lenz. 2012. Sources of bias in retrospective decision making: Experimental evidence on voters’ limitations in controlling incumbents. American Political Science Review 106 (4): 720–741.
Huff, C., and D. Tingley. 2015. “Who are these people” evaluating the demographic characteristics and political preferences of MTurk survey respondents. Research & Politics July–September: 1–12.
Isacenkova, J., D. Thonnard, A. Coston, A. Francillon, and D. Balzarotti. 2014. Inside the scam jungle: A closer look at 419 scam email operations. EURASIP Journal on Information Security 1: 1–18.
King, A., and J. Thomas. 2009. You can’t cheat an honest man: Making ($$$s and) sense of the Nigerian e-mail scams. In Crimes of the Internet, eds. F. Schmallegar, and M. Pittaro, 206–224. Saddle River: Pearson Education.
Konig, T., and B. Luig. 2009. German ‘LexIconSpace’: Policy positions and their legislative context. German Politics 18 (3): 345–364.
Krebs, B. 2011. Where did that scammer get your email address? Krebs on Security blog. http://krebsonsecurity.com/2011/04/where-did-that-scammer-get-your-email-address/. Accessed 25 Apr 2011.
Krippendorff, K. 2004. Content analysis: An introduction to its methodology. Thousand Oaks: Sage.
Kuziemko, I., M.I. Norton, E. Saez, and S. Stantcheva. 2015. How elastic are preferences for redistribution? Evidence from randomized survey experiments. American Economic Review 105 (4): 1478–1508.
Lazarus, D. 2003. Greed fuels big internet scam. San Francisco Chronicle 12 January.
Legard, D. 2003. E-mail threats increase sharply. PC World. http://www.pcworld.com/article/107930/article.html.
Levy, E. 2003. Crossover: Online pests plaguing the offline world. IEEE Security and Privacy 1 (6): 71–73.
Longe, O., and A. Osofisan. 2011. On the origins of advance free fraud electronic emails: A technical investigation using Internet protocol address tracers. African Journal of Information Systems 3 (1): 17–26.
Longe, O.B., V. Mbarika, M. Kourouma, F. Wada, and R. Isabalija. 2009. Seeing beyond the surface: Understanding and tracking fraudulent cyber activities. International Journal of Computer Science and Information Security 6 (3): 124–135.
Mbaziira, A.V., E. Abozindah, and J.H. Jones Jr. 2015. Evaluating classifiers in detecting 419 scams in bilingual cybercriminal communities. International Journal of Computer Science and Information Security 13 (7): 1–7.
Milne, G.R., L.I. Labrecque, and C. Cromer. 2009. Toward an understanding of the online consumer risky behavior and protection practices. Journal of Consumer Affairs 43 (3): 449–473.
Mitnick, K., and W. Simon. 2002. The art of deception: Controlling the human element of security. New York: Wiley.
Muscat, G., M. James, and A. Graycar. 2002. Older people and consumer fraud. Number 220 Canberra: Australian Institute of Criminology.
Neuendorf, K.A. 2002. The content analysis guidebook. Thousand Oaks: Sage.
Nhan, J., P. Kinkade, and R. Burns. 2009. Finding a pot of gold at the end of an internet rainbow: Further examination of fraudulent email solicitation. International journal of Cyber Criminology 3 (1): 452–475.
Onyebadi, U., and J. Park. 2012. ‘I’m Sister Maria, please help me’: A lexical study of 4-1-9 international advance fee fraud email communications. International Communication Gazette 74 (2): 181–199.
Paolacci, G., J. Chandler, and P.G. Ipeirotis. 2010. Running experiments on amazon mechanical turk. Judgment and Decision Making 5 (5): 411–419.
Park, Y., J. Jones, D. McCoy, E. Shi, and M. Jakobsson. 2014. Scambaiter: Understanding targeted Nigerian scams on Craigslist. Proceedings of the Network and Distributed System Security Symposium. Internet Society. https://cs.gmu.edu/~mccoy/papers/scambaiter.pdf.
Rich, T.S. 2014. Propaganda with purpose: Uncovering patterns in North Korean nuclear coverage, 1997–2012. International Relations of the Asia-Pacific 14 (3): 427–453.
Ross, D.G. 2009. Ars dictaminis perverted: The personal solicitation of email as a genre. Journal of Technical Writing and Communication 39 (1): 25–41.
Schiesel, S. 2004. Turning the tables on e-mail swindlers. New York Times 17 June: Gl, G7.
Shank, D.B. 2016. Using crowdsourcing websites for sociological research: The case of Amazon Mechanical Turk. The American Sociologist 47 (1): 47–55.
Tade, O., and I. Aliyu. 2011. Social organization and Internet fraud among university undergraduates in Nigeria. International Journal of Cyber Criminology 5 (2): 860–875.
Thompson, S. 2006. Helping the hacker? Library information, security, and social engineering. Information Technology and Libraries 25: 222–225.
Titus, R.M., F. Heinzelman, and J.M. Boyle. 1995. Victimisation of persons by fraud. Crime and Delinquency 41: 54–72.
US Department of State. 1997. Nigerian Advance fee fraud.
Viosca, C., B.J. Bergiel, and P. Balsmeier. 2004. Effects of the electronic money fraud on the brand equity of Nigeria and Africa. Management Research News 27 (6): 11–20.
Wizard, B. 2000. Nigeria 419 scam: Game over. Wallowa: Starguill International.
Zuckoff, M. 2005. Annals of crime: The perfect mark. The New Yorker 82 (13): 36–42.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Rich, T. You can trust me: a multimethod analysis of the Nigerian email scam. Secur J 31, 208–225 (2018). https://doi.org/10.1057/s41284-017-0095-0
Published:
Issue Date:
DOI: https://doi.org/10.1057/s41284-017-0095-0