Skip to main content
Log in

You can trust me: a multimethod analysis of the Nigerian email scam

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

How do scammers invoke trust within the Nigerian email scam and how do recipients interpret such trust-laden offers? Rather than view the email content as static, this article suggests that the emails strategically appeal to trust as a means to enhance susceptibility. Content analysis of over a half-million scam emails reveals that references to trust language are most common in larger award claims and those claiming to be from Africa. However, experimental evidence suggests that trust language within scam letters has minimal influence on respondents’ perceptions of the letter. This analysis expands our understanding of the psychology behind the scam letter format and suggests means to further combat email fraud.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. Several million email addresses can be purchased for under $500 (see Krebs 2011).

  2. One of the largest Nigerian scam payouts totaled $242 million, paid out by Nelson Sakaguchi, a director of Banco Noroeste Brazil (Haines 2004). The bank later filed for bankruptcy.

  3. See http://provalisresearch.com/products/content-analysis-software/wordstat-features/.

  4. An analysis of phrases within the body of emails was used to remove duplicate emails when identified.

  5. Access to the WordStat dictionaries are available upon request.

  6. For a summary of how MTurk samples compare to nationally representative surveys, see Huff and Tingley (2015) and Shank (2016).

  7. The two offers were chosen in that both were within the common range of offers within the half-million emails collected, but large enough to potentially elicit perceptual differences.

  8. This measure admittedly does not distinguish between references to the amount the victim will reportedly receive of the total amount of money claimed in the email.

  9. See Appendix 2 Table for summary statistics for the additional variables.

  10. The included words also include alternate spellings and misspellings of the included words.

  11. Trust references and the monetary offer are italicized for convenience but were not italicized in the web survey.

References

  • Atkins, B., and W. Huang. 2013. A study of social engineering in online frauds. Open Journal of Social Sciences 1 (3): 23–32.

    Article  Google Scholar 

  • Barron, A. 2006. Understanding spam: A macro-textual analysis. Journal of Pragmatics 38 (6): 880–904.

    Article  Google Scholar 

  • Berelson, B. 1952. Content analysis in communication research. Glencoe, IL: Free Press.

  • Berinsky, A.J., G.A. Huber, and G.S. Lenz. 2012. Evaluating online labor markets for experimental research: Amazon.com’s mechanical turk. Political Analysis 20: 351–368.

    Article  Google Scholar 

  • Blommaert, J., and T. Omoniyi. 2006. Email fraud: Language, technology, and the indexicals of globalization. Social Semiotics 16 (4): 573–605.

    Article  Google Scholar 

  • Buhrmester, M., T. Kwang, and S.D. Gosling. 2011. Amazon’s mechanical turk: A new source of inexpensive, yet high-quality, data? Perspectives on Psychological Science 6 (1): 3–5.

    Article  Google Scholar 

  • Button, M., C. Lewis, and J. Tapley. 2014. Not a victimless crime: The impact of fraud on individual victims and their families. Security Journal 27: 36–54.

    Article  Google Scholar 

  • Caplan, T. 2013, February 13. Phone interview.

  • Cheng, J. 2010. Suckers victims lost $9.3 billion to 419 scammers in 2009. Arstechnica. http://arstechnica.com/security/2010/01/victims-lost-93-billion-to-419-scammers-in-2009/. Accessed 29 Jan 2010.

  • Costin, A., J. Isacenkova, M. Balduzzi, A. Francillon, and D. Balzarotti. 2013. The role of phone numbers in understanding cyber-crime schemes. Paper presented at the 2013 Eleventh Annual International Conference on Privacy Security and Trust, pp. 213–220.

  • Cukier, W.L., E.J. Nesselroth, and S. Cody. 2007. Genre, narrative and the ‘Nigerian letter’ in electronic mail. Proceedings of the 40th Hawaii International Conference on System Sciences. http://csdl2.computer.org/comp/proceedings/hicss/2007/2755/00/27550070a.pdf.

  • Datar, T.D., K.A. Cole, and M.K. Rogers. 2014. Awareness of scam e-mails: An exploratory research study. ADFSL Conference on Digital Forensics, Security and Law. http://proceedings.adfsl.org/index.php/CDFSL/article/view/26/26.

  • Downs, J.S., M.B. Holbrook, and L.F. Cranor. 2006. Decision strategies and susceptibility to phishing. Carnegie Mellon University Research Showcase.

  • Evans, M., W.V. McIntosh, J. Lin, and C.L. Cates. 2007. Recounting the courts? Applying content analysis to enhance empirical legal research. Journal of Empirical Legal Studies 4 (4): 1007–1039.

    Article  Google Scholar 

  • Gao, Y., and G. Zhao. 2005. Knowledge-based information extraction: A case study of recognizing emails of Nigerian frauds. In Natural language processing and information systems, ed. A. Montoyo, R. Munoz, and E. Metais, 161–172. Berlin: Springer.

    Chapter  Google Scholar 

  • Glickman, H. 2005. The Nigerian ‘419’ advance fee scams: Prank or peril? Canadian Journal of African Studies 39 (3): 460–489.

    Google Scholar 

  • Gregory, D.W., and B. Nikiforova. 2012. A sweetheart of a deal: How people get hooked and reeled in by financial scams. Journal of Behavioral Finance & Economics 2 (2): 96–122.

    Google Scholar 

  • Grinker, R.R., S.C. Lubkemann, and C.B. Steiner. 2010. Perspectives on Africa: A reader in culture, history and representation. New York: Wiley.

    Google Scholar 

  • Haines, L. 2004. Nigerian judge claims ‘no jurisdiction to hear it. The A Register. http://www.theregister.co.uk/2004/07/20/419_trail_collapse/. Accessed 20 July 2004.

  • Hamburger, Y.A., and E. Ben-Artzi. 2000. The relationship between extraversion and neuroticism and the different uses of the Internet. Computers in Human Behavior 16 (4): 441–449.

    Article  Google Scholar 

  • Hamburger, Y.A., and E. Ben-Artzi. 2003. Loneliness and Internet use. Computers in Human Behavior 19 (1): 71–80.

    Article  Google Scholar 

  • Herley, C. 2012. Why do Nigerian scammers say they are from Nigeria? Unpublished paper. http://research.microsoft.com/pubs/167719/whyfromnigeria.pdf.

  • Horton, J.J., D. Rand, and R.J. Zeckhauser. 2011. The online laboratory: Conducting experiments in a real labor market. Experimental Economics 14 (3): 399–425.

    Article  Google Scholar 

  • Huber, G.A., S.J. Hill, and G.S. Lenz. 2012. Sources of bias in retrospective decision making: Experimental evidence on voters’ limitations in controlling incumbents. American Political Science Review 106 (4): 720–741.

    Article  Google Scholar 

  • Huff, C., and D. Tingley. 2015. “Who are these people” evaluating the demographic characteristics and political preferences of MTurk survey respondents. Research & Politics July–September: 1–12.

  • Isacenkova, J., D. Thonnard, A. Coston, A. Francillon, and D. Balzarotti. 2014. Inside the scam jungle: A closer look at 419 scam email operations. EURASIP Journal on Information Security 1: 1–18.

    Google Scholar 

  • King, A., and J. Thomas. 2009. You can’t cheat an honest man: Making ($$$s and) sense of the Nigerian e-mail scams. In Crimes of the Internet, eds. F. Schmallegar, and M. Pittaro, 206–224. Saddle River: Pearson Education.

    Google Scholar 

  • Konig, T., and B. Luig. 2009. German ‘LexIconSpace’: Policy positions and their legislative context. German Politics 18 (3): 345–364.

    Article  Google Scholar 

  • Krebs, B. 2011. Where did that scammer get your email address? Krebs on Security blog. http://krebsonsecurity.com/2011/04/where-did-that-scammer-get-your-email-address/. Accessed 25 Apr 2011.

  • Krippendorff, K. 2004. Content analysis: An introduction to its methodology. Thousand Oaks: Sage.

    Google Scholar 

  • Kuziemko, I., M.I. Norton, E. Saez, and S. Stantcheva. 2015. How elastic are preferences for redistribution? Evidence from randomized survey experiments. American Economic Review 105 (4): 1478–1508.

    Article  Google Scholar 

  • Lazarus, D. 2003. Greed fuels big internet scam. San Francisco Chronicle 12 January.

  • Legard, D. 2003. E-mail threats increase sharply. PC World. http://www.pcworld.com/article/107930/article.html.

  • Levy, E. 2003. Crossover: Online pests plaguing the offline world. IEEE Security and Privacy 1 (6): 71–73.

    Article  Google Scholar 

  • Longe, O., and A. Osofisan. 2011. On the origins of advance free fraud electronic emails: A technical investigation using Internet protocol address tracers. African Journal of Information Systems 3 (1): 17–26.

    Google Scholar 

  • Longe, O.B., V. Mbarika, M. Kourouma, F. Wada, and R. Isabalija. 2009. Seeing beyond the surface: Understanding and tracking fraudulent cyber activities. International Journal of Computer Science and Information Security 6 (3): 124–135.

    Google Scholar 

  • Mbaziira, A.V., E. Abozindah, and J.H. Jones Jr. 2015. Evaluating classifiers in detecting 419 scams in bilingual cybercriminal communities. International Journal of Computer Science and Information Security 13 (7): 1–7.

    Google Scholar 

  • Milne, G.R., L.I. Labrecque, and C. Cromer. 2009. Toward an understanding of the online consumer risky behavior and protection practices. Journal of Consumer Affairs 43 (3): 449–473.

    Article  Google Scholar 

  • Mitnick, K., and W. Simon. 2002. The art of deception: Controlling the human element of security. New York: Wiley.

    Google Scholar 

  • Muscat, G., M. James, and A. Graycar. 2002. Older people and consumer fraud. Number 220 Canberra: Australian Institute of Criminology.

  • Neuendorf, K.A. 2002. The content analysis guidebook. Thousand Oaks: Sage.

    Google Scholar 

  • Nhan, J., P. Kinkade, and R. Burns. 2009. Finding a pot of gold at the end of an internet rainbow: Further examination of fraudulent email solicitation. International journal of Cyber Criminology 3 (1): 452–475.

    Google Scholar 

  • Onyebadi, U., and J. Park. 2012. ‘I’m Sister Maria, please help me’: A lexical study of 4-1-9 international advance fee fraud email communications. International Communication Gazette 74 (2): 181–199.

    Article  Google Scholar 

  • Paolacci, G., J. Chandler, and P.G. Ipeirotis. 2010. Running experiments on amazon mechanical turk. Judgment and Decision Making 5 (5): 411–419.

    Google Scholar 

  • Park, Y., J. Jones, D. McCoy, E. Shi, and M. Jakobsson. 2014. Scambaiter: Understanding targeted Nigerian scams on Craigslist. Proceedings of the Network and Distributed System Security Symposium. Internet Society. https://cs.gmu.edu/~mccoy/papers/scambaiter.pdf.

  • Rich, T.S. 2014. Propaganda with purpose: Uncovering patterns in North Korean nuclear coverage, 1997–2012. International Relations of the Asia-Pacific 14 (3): 427–453.

    Article  Google Scholar 

  • Ross, D.G. 2009. Ars dictaminis perverted: The personal solicitation of email as a genre. Journal of Technical Writing and Communication 39 (1): 25–41.

    Article  Google Scholar 

  • Schiesel, S. 2004. Turning the tables on e-mail swindlers. New York Times 17 June: Gl, G7.

  • Shank, D.B. 2016. Using crowdsourcing websites for sociological research: The case of Amazon Mechanical Turk. The American Sociologist 47 (1): 47–55.

    Article  Google Scholar 

  • Tade, O., and I. Aliyu. 2011. Social organization and Internet fraud among university undergraduates in Nigeria. International Journal of Cyber Criminology 5 (2): 860–875.

    Google Scholar 

  • Thompson, S. 2006. Helping the hacker? Library information, security, and social engineering. Information Technology and Libraries 25: 222–225.

    Article  Google Scholar 

  • Titus, R.M., F. Heinzelman, and J.M. Boyle. 1995. Victimisation of persons by fraud. Crime and Delinquency 41: 54–72.

    Article  Google Scholar 

  • US Department of State. 1997. Nigerian Advance fee fraud.

  • Viosca, C., B.J. Bergiel, and P. Balsmeier. 2004. Effects of the electronic money fraud on the brand equity of Nigeria and Africa. Management Research News 27 (6): 11–20.

    Article  Google Scholar 

  • Wizard, B. 2000. Nigeria 419 scam: Game over. Wallowa: Starguill International.

    Google Scholar 

  • Zuckoff, M. 2005. Annals of crime: The perfect mark. The New Yorker 82 (13): 36–42.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Timothy Rich.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rich, T. You can trust me: a multimethod analysis of the Nigerian email scam. Secur J 31, 208–225 (2018). https://doi.org/10.1057/s41284-017-0095-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/s41284-017-0095-0

Keywords

Navigation