This chapter examines email business scams - types of phishing that solicit business partnership with email account owners with the aim of defrauding them. In this category are emails that seek assistance to transfer some money or claim some abandoned money in dormant bank accounts overseas. Through a qualitative discourse analysis of 50 samples, the study analyses the textual and genre features of these emails, as well as their narrative structures. Analysis also highlights authorial stance of the email writers. This include rhetoric and persuasive strategies that the con writers apply in their business proposals, such as the negotiation of interpersonal relationship, trust, and confidentiality. The study concludes that contrary to some re...
Most of us receive numerous spam e-mails, texts that in one or the other way try to convince us to e...
There is a strong sense of negativity associated with online fraud victimization. Despite an increas...
Phishing is one of the oldest and most flexible types of social engineering attacks and could be use...
This study applies the speech acts theory to the study of discourse strategies and functions of hoax...
This study applies a computer-mediated discourse analysis (CMDA) to the study of discourse structur...
The thrust of this paper is the pragmatic investigation of fraud spam, the unwanted emails containin...
The 21st century globalisation strongly influences the world as a result of highly improved technolo...
This paper examines the interactional construction of written scam communications. It draws on an em...
Advance fee fraud is a significant component of online criminal activity. Fraudsters can often make ...
Information manipulation for deception continues to evolve at a remarkable rate. Artificial intellig...
The amount of Internet fraud has grown exponentially over the last decade. Although computer securit...
So-called '419' or 'advance-fee' e-mail frauds have proved remarkably successful. Global losses to t...
"The rise of online scams has become a growing concern for internet users around the world. Data fro...
Technological advancements have revolutionized various aspects of human life, facilitating communica...
The paper is on the effects of e-mail scams on e-business growth in particular interest to Globalcom...
Most of us receive numerous spam e-mails, texts that in one or the other way try to convince us to e...
There is a strong sense of negativity associated with online fraud victimization. Despite an increas...
Phishing is one of the oldest and most flexible types of social engineering attacks and could be use...
This study applies the speech acts theory to the study of discourse strategies and functions of hoax...
This study applies a computer-mediated discourse analysis (CMDA) to the study of discourse structur...
The thrust of this paper is the pragmatic investigation of fraud spam, the unwanted emails containin...
The 21st century globalisation strongly influences the world as a result of highly improved technolo...
This paper examines the interactional construction of written scam communications. It draws on an em...
Advance fee fraud is a significant component of online criminal activity. Fraudsters can often make ...
Information manipulation for deception continues to evolve at a remarkable rate. Artificial intellig...
The amount of Internet fraud has grown exponentially over the last decade. Although computer securit...
So-called '419' or 'advance-fee' e-mail frauds have proved remarkably successful. Global losses to t...
"The rise of online scams has become a growing concern for internet users around the world. Data fro...
Technological advancements have revolutionized various aspects of human life, facilitating communica...
The paper is on the effects of e-mail scams on e-business growth in particular interest to Globalcom...
Most of us receive numerous spam e-mails, texts that in one or the other way try to convince us to e...
There is a strong sense of negativity associated with online fraud victimization. Despite an increas...
Phishing is one of the oldest and most flexible types of social engineering attacks and could be use...