1 Introduction

Cybercrime has become a global issue as it affects individuals, businesses and governments everywhere including developing economies (Chatterjee et al. 2018; Li and Cheng 2013; Shareef et al. 2018). Examples of cybercrimes include identity theft, piracy, hacking and financial fraud committed over the internet. We focus on internet fraud in this research because such crimes affect a wide audience and perpetrators are usually anonymous. Internet fraud is broadly described as crime perpetuated on the internet components such as web sites, chat rooms, and e-mail, to offer non-existent goods or services to consumers, communicating false or fraudulent representations about the schemes to consumers, or transmitting victims’ funds, access devices, or other items of value to the control of the scheme’s perpetrators (Kubic 2001). Internet fraud appears in diverse forms such as “skimming, Card-Not-Present (CNP), stolen credentials buyers, professional hackers/crackers, identity theft” and among others (Boyle and Walker 2016, Jegede et al. 2016a, b).

Most prior research have used theories such as neutralization, deterrence and motivation to extend our understanding of internet crime phenomenon (Lazarus 2018). In general, these theories assume the individual appreciate the enormity of their crime or severity of the punishment. We argue that the increasing number of internet crimes despite the recommendations from prior research is because those individuals involve do not envision any risk in their quest to defraud unsuspecting victims. This is because most individuals involved in internet crime believe they cannot be located due to the anonymity and vast size of the internet. Employing a risk perspective, this study seeks to understand the internet fraud phenomenon. Specifically, we seek to answer the following research question: What risk perception factors influence individuals who intend to commit internet fraud?

This research seeks to make theoretical and practical contributions to research in the spectrum of internet fraud by using denial of risk theory as its basis. Denial of risk theory refers to the cognitive way individuals deal with risky behaviors by rejecting the presence or effect of risk (Peretti-Watel 2003). We developed a research model to understand how risk perception influence individuals’ intention to commit internet fraud using components of denial of risk theory. We collected data from 350 individuals located in internet crime hotspots on key constructs, denial of risk and intention to commit internet fraud in our model. The results of the analysis of response data offer both theoretical and practical implications. For theory, we have shown the efficacy of Denial of Risk theory in understanding burgeoning Internet fraud discourse. For practice, our study provides insights for law enforcement agencies to understand the factors that act as drivers of internet fraud.

2 Theoretical Background – Denial of Risk Theory

Denial of risk refers to cognitive ways to develop adaption to risky behaviors by rejecting the possibility of suffering any loss (Peretti-Watel 2003). The theory posits that an individual may deflect the level of risk by comparing the crime to an acceptable action they consider a crime. The theory of denial of risk has three main constructs: scapegoating, self-confidence and comparing of risk. Scapegoating is when an individual stereotype actions of others they consider harmful (them) relative to their behavior. For example, young drivers label (scapegoat) older drivers as overly cautious as a justification for their over speeding habit. Self-confidence is when an individual reject risk by distinguishing themselves from anonymous group. For instance, some drivers who overspeed justify their action by suggesting that they possess better driving abilities than an average driver on the road. Comparison-between-risk arises when an individual compares their actions with that of a group whose action are already accepted. For example, individuals who text-while-driving may deflect risk by suggesting that driving-while-using-wireless communication is equally risky as individuals in both situations are affected by the information been communicated. Denial of risk theory has been used in the criminology literature to understand why individuals commit crime such as the use of cannabis (Apostolidis et al. 2006). We argue that each of these dimensions of denial of risk theory may influence an individual’s intention to commit internet fraud because of the anonymity provided by the internet.

Internet fraud involves the use of internet and related activities that violate the ethical conducts of the internet (Kubic 2001). Internet fraud is of concern globally for governments and law enforcement agencies (Grabosky 2015). Internet fraud is perpetuated by individuals or groups of individuals with different backgrounds such as needs, education and cultural idiosyncrasies (Morris and Higgins 2009). The techniques used by perpetrators of internet fraud make them believe the consequences of their actions are less harmful and sometimes beneficial to the victims (Brooks 2016). We employ the three dimensions of denial of risk to develop a conceptual model that explains intention to commit internet fraud.

3 Conceptual Model Development

Scapegoating

The scapegoat construct of the denial of risk theory deals with the propensity to label an identifiable group as taking actions that are deemed riskier (Lazarus 2018). Employing scapegoating technique results in feelings of prejudice or stigmatization toward the person or group that one has accused of committing crimes that are relatively harmful. It provides the basis for the perpetrator of the crime to deflect any risk arising from their actions, thus resulting in positive self-image (Harris and Dumas 2009; Lazarus 2018). For instance, individuals who are engaged in internet fraud feel they are not causing harm to their victims’ relative to harm caused by hackers who alter or prevent victims from continuing their normal lives. For instance, some cybercriminals in developing nations have believe that criminals in western countries cause more harm to their victims than they do (Hutchings 2013). Such rationalization of the risk of committing internet fraud transforms risk into blame (Sugiura 2018). The criminals use scapegoating to absolve themselves from their criminal behavior. Thus, we posit that:

  • H1: Scapegoating as a technique of denial of risk positively affects the intention to commit internet fraud

Self-confidence

Self-confidence is the cognizance that makes one believe in their abilities to perform certain tasks without much difficulty. The self-belief in a confident person is very high and rises with more complex task such as creating situations that makes it easy to defraud another person. Self-confidence helps individuals to participate in the crimes they commit (Sigala 2017, Jegede et al. 2016a, b). Although individuals know that they are committing a crime that is punishable by law, they deny this risk by showing confidence they will not be punished. Sometimes perpetrators of internet crimes draw solidarity among themselves to increase their confidence level (Jegede et al. 2016a, b; Koay 2018). Therefore, it is posited that:

  • H2: Self-confidence as a technique of denial of risk positively affect the intention to commit internet fraud

Comparison Between Risks.

Comparing of risk looks at the lesser evil perceived by the perpetuator of internet fraud. Individuals who commit internet fraud compare their activities to other crimes such as hackers or identity theft and perceive that the activities they are involved in are better evil (Choo 2011). By comparing the risk of their crimes, criminals perceive some crimes as much riskier than others.

It is reported that some individuals who are engaged in internet fraud compare the crime to other crimes such as stealing and cheating and perceive that such crimes are not less harmful when compared to what they do (Mekonnen et al. 2015). Individuals who commit internet fraud are shielded in the comfort of anonymity. Such individuals proclaim and perceive they are far away from the victims they defraud and believe that they cannot be caught or punished (McMullan and Rege 2010). Therefore, it is posited that (Fig. 1):

Fig. 1.
figure 1

Research model

  • H3: Comparing of risk as a technique of denial of risk positively affects the intention to commit internet fraud

4 Methodology

Measures and Sample

This study was conducted using a survey research design (Choudrie and Dwivedi 2005). The target population for this study are individuals located in alleged hotspots (internet cafes) where internet fraud originates (Odou and Bonnin 2014). Unique high unemployment in some of these regions encourages internet fraud (Smith et al. 2001; Boateng et al. 2011). Due to the heterogeneous and illegality of the phenomenon understudy, the total population of the study is not known. Our sample included 350 respondents. The sampling techniques used in this study are cluster sampling, convenient sampling, and snowball sampling approach. Cluster sampling are the regional distribution of internet fraudsters within Ghana. The clusters represented internet fraud hot spots within the selected regions (Greater Accra, Eastern, Volta, Ashanti, Central and Western), convenient sampling was used to select a section from each cluster in the internet fraudsters’ cafes. Furthermore, snowball sampling technique was used to identify other individuals suspected to be involved with internet fraud and online relationship scams.

We adopted 12 items from Peretti-Watel (2003) to measure scapegoating, self-confidence and comparing of risk. These items were used in prior study to juvenile intent to commit an illegal act -weed smokers- in France.

Our dependent variable, Internet fraud intention was operationalized as a second order construct consisting of two first order constructs (deception and fraud). The 8 items used to measure our dependent variable were adopted from (Park and Sung 2015; Siponen and Vance 2010). Details of the measures used in the study along with their loadings are presented in the appendix.

5 Results and Analysis

The Structural Equation Modeling (SEM) was used to investigate the causal paths hypothesized in this study. A two-step approach was used to analyze the data. In the first step, the covariance-based technique was used to assess the appropriateness of the measurement model. The covariance based technique was used as it minimizes the differences between the covariance of the collected sample and that of the ones predicted by the model and reproduces the covariance matrix of the observable variable. For testing the structural model, variance based partial least square (PLS) SEM was used as it maximizes the variance of the dependent variable which is explained by the independent variables.

We used the Cronbach Alpha, Composite Reliability and Average Variance Extracted (AVE) to test for reliability and validity of the constructs. Discriminant validity tests were performed to test for accuracy of the measurement items by using Fornell-Lecker Criterion and Heterotrait-Monotrait (HTMT). A HTMT is a more resilient test for discriminant validity than cross loadings. As shown in Table 1, constructs reliability are confirmed as composite reliability (CR) values for all factors were above the recommended 0.7 value threshold, indicating item consistency. The variance explained (AVE) is above the satisfactory threshold of 0.5, confirming convergent validity.

Table 1. Construct validity

We conducted model robustness checks for multicollinearity. VIF values for scapegoating (2.04), self-confidence (1.937), and comparing of risk (1.5) are much less than the threshold of (VIF < 10), indicating absence of multicollinearity problem. In assessing the explanatory power, our model accounted for 58% of variance (R2 = 0.58) in explaining intention to commit internet fraud.

The Adjusted R2 (0.56) further strengthens the explanatory power as it takes into account our sample size and number of variables in our model. Summary of the hypotheses testing are shown in Table 2 and Fig. 2.

Table 2. Summary of results
Fig. 2.
figure 2

Model results

As hypothesized, internet fraudsters use scapegoating to commit internet fraud (p < 0.05; t = 2.44), and hypothesis 2 supports a positive relationship between self-confidence and intention to commit internet fraud (p < 0.05; t = 5.272). Hypothesis 3 is also supported (p < 0.05; t = 2.405); comparing of risk positively influence the intention to commit internet fraud.

Discussion and Future Research Direction

Denial of risk theory refers to a mental way to deal with risk associated with deviant behaviors. Individuals who employ denial of risk attempt to reject the risk from the actions by comparing their actions to others who they deem more harmful. We used this theory as the basis to understand the intention of individuals to commit inter fraud that is regarded a harmful or unethical use of computers. We argue that internet fraudsters justify their deviant behavior by using these techniques to justify their behavior. Internet fraudsters persuade themselves they are anonymous and law enforcement are incapable of apprehending them. In societies where risk is downplayed, denial of risk theory offers an understanding of how these internet fraudsters view their risky actions by scapegoating, self-confidence and comparing of risk. This complements research on cybercrimes that have used neutralization and deterrence theory by suggesting the increase in internet fraud, a form of cybercrime, should be looked from denial of risk perspective.

The findings of the research are consistent with prior studies on denial of risk theory such as Peretti-Watel (2003) study on use of cannabis among young smokers. The publicity of arrest of individuals involve in internet fraud may have no effect on the number of internet crimes committed. One explanation is the denial of any risk through the show of self-confidence of the fraudsters to avoid getting caught. Self-confidence has the reinforcing effect as it encourages undecided individuals to engage in internet fraud. Our results show that internet fraudsters compare their crimes and are emboldened to commit internet fraud. For example, when an individual considers corruption as a form of extortion but believes society does not hold perpetrators accountable, then committing internet fraud such as credit card fraud may not be a costly crime. Thus, internet fraudsters do not consider those other crimes as different from what they do.

Our study reinforces the extensive use of comparing of risk as denial of risk technique by deviants in previous studies (Peretti-Watel 2003; Vida et al. 2012; Grabosky 2015). These internet fraudsters “see” other crimes such as, arm robbery, blood rituals, stealing from the Government as comparable to internet fraud and this perception helps them to rationalize their criminal behavior. Preventing internet fraud requires the global effort of all stakeholders including law enforcement agencies to confront it (Gottschalk and Smith 2011). The results of the study suggest that preventing internet fraud requires concerted effort to raise the level of risk associated with these crimes.

Future studies should attempt to understand how denial of risk compares with other techniques employed by individuals such as neutralization techniques who may want to commit an internet crime. Furthermore, researchers should seek to understand how age and technical experience play a role in the intention to commit internet crime.