Investigating the relationship between consumers' style of thinking and online victimization in scamming

Unsolicited emails and online scams can erode both consumer confidence and consumer safety when interacting and transacting over the Internet. This paper uses content analysis to identify the most frequent psychological tricks used in scamming and the most frequent flags which alert consumers to the illegitimate and unsolicited nature of the contact. Findings are then explored in light of individual thinking styles to reveal how some consumers may be more vulnerable to online scams as a result of their own personal preference for thinking in a particular way. The rationale is to establish a foundation for the use of content analysis of unsolicited emails to offer insight into the possible relationship between a consumer’s style of thinking and online victimization.

[1]  Francesco Sofo,et al.  Thinking styles of modern Chinese leaders: Independence and exploration in an historically conditional China , 2005 .

[2]  David S. Wall,et al.  Digital Realism and the Governance of Spam as Cybercrime , 2004 .

[3]  D. P. Majoras,et al.  Effectiveness and Enforcement of the CAN - SPAM Act: A Report to Congress , 2005 .

[4]  Alison Galloway,et al.  Consumer motivations and concerns in online auctions: an exploratory study , 2005 .

[5]  Richard Clayton Do Zebras get more Spam than Aardvarks? , 2008, CEAS.

[6]  Joshua Goodman,et al.  Stopping outgoing spam , 2004, EC '04.

[7]  Chris Kanich,et al.  Spamalytics: an empirical analysis of spam marketing conversion , 2009, CACM.

[8]  R. Cialdini Influence: The Psychology of Persuasion , 1993 .

[9]  Li-Fang Zhang,et al.  Revisiting the Predictive Power of Thinking Styles for Academic Performance , 2004, The Journal of psychology.

[10]  H. Marmorstein,et al.  Addressing consumers’ concerns about online security: A conceptual and empirical analysis of banks’ actions , 2006 .

[11]  Francesco Sofo Differences of Degree or Differences in Kind? A Comparative Analysis of Thinking Styles , 2008 .

[12]  J. Csapó,et al.  Psychology of persuasion , 2010 .

[13]  D. C. Graves,et al.  A Qualitative Analysis of Advance Fee Fraud E-mail Schemes , 2007 .

[14]  Michelle Berzins Online Scams: case studies from Australia , 2009 .

[15]  Fulu Li,et al.  An Empirical Study of Clustering Behavior of Spammers and Group-based Anti-Spam Strategies , 2006, CEAS.

[16]  Holly Johnson,et al.  Internet Purchasing: Perceptions and Experiences of Australian Households , 2007 .

[17]  Paul Judge,et al.  Understanding and Reversing the Profit Model of Spam , 2005, WEIS.

[18]  Wagner Meira,et al.  A Campaign-based Characterization of Spamming Strategies , 2008, CEAS.

[19]  Peter J. Blodgett,et al.  A Hole in the Ground with a Liar at the Top: Fraud and Deceit in the Golden Age of American Mining@@@The Infamous King of the Comstock: William Sharon and the Gilded Age in the West , 2007 .