Abstract
By studying the psychological profile of cyberscam victims, we may be able to develop more effective methods to reduce the rates of this type of cybercrime substantially. This paper examined which psychological and socio-demographic characteristics predicted cyberscam victimhood, in general, and across individual cyberscams (including, consumer, charity, investment, and romance scams). In line with the hypotheses, more impulsive and neurotic individuals were more likely to be scammed by cyberscams, in general. Contrary to the hypotheses, those who scored high on internal locus of control, men, and educated people were more likely to be tricked by cyberscams, in general. Some important differences between the types of cyberscams were also identified. Investment scam victims were more likely to be older, men, and score higher on internal locus of control compared with the other cyberscam victims. Consumer scam victims, in contrast to other scam victims, were more likely to be women and were less educated. The work here suggests that there is merit in systematically characterizing different types of cyberfrauds and examining, in detail, a typology of cyberscam victims by scam type. It suggests that a ‘one size fits all model’ to explain cyberscam victimhood is limiting.
Similar content being viewed by others
References
ACCC. (2015). Australians lose over $229 million to scams in 2015. https://www.accc.gov.au/media-release/australians-lose-over-229-million-to-scams-in-2015. (accessed July, 24, 2018).
ACCC. (2018). Australians lose $340 million to scammers in 2017: https://www.accc.gov.au/media-release/australians-lost-340-million-to-scammers-in-2017
Alseadoon, I., Othman, M. F. I., & Chan, T. (2015). What is the influence of users’ characteristics on their ability to detect phishing emails? In H. Sulaiman, M. Othman, Y. Rahim, & N. Pee (Eds.), Advanced Computer and Communication Engineering Technology. Lecture Notes in Electrical Engineering (p. 315).
Alves, L. M., & Wilson, S. R. (2008). The effects of loneliness on telemarketing fraud vulnerability among older adults. Journal of Elder Abuse & Neglect, 20(1), 63–85.
Beals, M. DeLiema, M. & Deevy, M. (2015). Framework for a taxonomy of fraud. http://162.144.124.243/~longevl0/wp-content/uploads/2016/03/Full-Taxonomy-report.pdf (accessed July 24, 2018).
Better Business Bureau. (2019). Fall in Love – go to Jail: BBB Report on how some romance fraud victims become money mules. https://www.bbb.org/article/news-releases/19398-fall-in-love%2D%2D-go-to-jail-bbb-report-on-how-some-romance-fraud-victims-become-money-mules
Buchanan, T., & Whitty, M. T. (2014). The online dating romance scam: causes and consequences of victimhood. Psychology, Crime & Law, 20(3), 261–283.
Darwish, A., El Zarka, A., & Akoul, F. (2013). Towards understanding phishing victims’ profile. International Conference on Computer Systems and Industrial Informatics.
Emami, C., Smith, R. G., & Jorna, P. (2019). Predicting online fraud victimisation in Australia. Trends & Issues in crime and criminal justice, No, 577.
Farrell, G., Phillips, C., & Pease, K. (1995). Like taking candy: why does repeat victimization occur? British Journal of Criminology, 35(3), 384–399.
Fischer, P., Lea, S. E. G., & Evans, K. M. (2013). Why do individuals respond to fraudulent scam communication and lose money? The psychological determinants of scam compliance. Journal of Applied Social Psychology, 43(10), 2060–2072.
Garg, V. & Niliadeh, S. (2013). Craiglist scams and community composition: Investigating online fraud victimization. IEEE Security and Privacy Workshops, 123–126.
Halevi, T., Lewis, J. & Memon, N. (2013). Phishing, personality traits and Facebook. CoRR, abs/1301.7643.
Holtfreter, K., Reisig, M. D., & Pratt, T. C. (2008). Low self-control, routine activities, and fraud victimization. Criminology, 46(1), 189–220.
Langstedt, E. (2013). An examination of the role of the communicator on gratifications attained on social network sites. Journal of Social Media in Society, 2(1), 127–144.
McInish, T. H. (1982). Individual investors and risk-taking. Journal of Economic Psychology, 2, 125–136.
Modic, D. & Lee, S. (2012). How neurotic are scam victims, really? The big five and Internet scams. Available at SSRN: https://ssrn.com/abstract=2448130 (accessed Jun 28, 2018).
Nunnally, J. C. (1985). Psychometric theory (2nd ed.). New York: McGraw Hill.
ONS (Office for National Statistics). (2016). Overview of fraud statistics: year ending March 2016. https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/articles/overviewoffraudstatistics/yearendingmarch2016. (accessed July, 24, 2018).
ONS (Office for National Statistics). (2018). Overview of fraud statistics: Year ending. March, 2018.
ONS (Office for National Statistics). (2019). Fraud. https://www.ons.gov.uk/aboutus/transparencyandgovernance/freedomofinformationfoi/fraud
Rotter, J. B. (1966). Generalized expectancies for internal versus external control of reinforcements. Psychological Monographs, 80(1), 1–28.
Sheng, S., Holbrook, M., Kumaraguru, Cranor, L., & Downs, J. (2010). Who falls for a phish? A demographic analysis of phishing susceptibility and effectiveness of interventions. CHI’10 Proceeding of the SIGCHI Conference on Human Factors in Computing Systems, 373–382.
Suarez-Tangil, G., Edwards, M., Peersman, C., Stringhini, G., Rashid, A., & Whitty, M. (2019). Automatically dismantling online dating fraud. IEEE Transactions on Information Forensics and Security, 15, 1128–1137.
Titus, R. M., & Gover, A. R. (2001). Personal fraud: The victims and the scams. In G. Farrell & K. Pease (Eds.), Repeat Victimisation: Crime Prevention Studies (Vol. 12, pp. 133–151). Criminal Justice Press.
Turanovic, J. J., & Pratt, T. C. (2014). Can’t stop, won’t stop: Self-control, risky lifestyles, and repeat victimization. Journal of Quantitative Criminology, 30, 29–56.
Whiteside, S. P., & Lynam, D. R. (2001). The five factor model and impulsivity: using a structural model of personality to understand impulsivity. Personality and Individual Differences, 30(4), 669–689.
Whitty, M. T. (2013). The scammers persuasive techniques model: development of a stage model to explain the online dating romance scam. British Journal of Criminology, 53(4), 665–684.
Whitty, M. T. (2015). Mass-marketing fraud: a growing concern. IEEE Security & Privacy, 13(4), 84–87.
Whitty, M. T. (2018a). It’s just a game: Developing a framework to understand cyberfraud from a Nigerian cultural perspective. International Journal of Cyber Criminology, 12(1), 97–114.
Whitty, M. T. (2018b). Do you love me? Psychological characteristics of romance scam victims. Cyberpsychology, Behavior and Social Networking, 21(2), 105–109.
Whitty, M. T. (2019). Who can spot a romance scam? Journal of Financial Crime, 26(2), 623–633.
Whitty, M. T., & Buchanan, T. (2012). The online dating romance scam: a serious crime. Cyberpsychology. Behavior, and Social Networking, 15, 181–183.
Whitty, M. T., & Buchanan, T. (2016). The online dating romance scam: the psychological impact on victims – both financial and non-financial. Criminology & Criminal Justice, 16(2), 176–194.
Whitty, M. T., & Joinson, A. N. (2009). Truth, lies, and trust on internet. London: Routledge, Psychology Press.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Whitty, M.T. Is There a Scam for Everyone? Psychologically Profiling Cyberscam Victims. Eur J Crim Policy Res 26, 399–409 (2020). https://doi.org/10.1007/s10610-020-09458-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10610-020-09458-z