Advance fee fraud is a significant component of online criminal activity. Fraudsters can often make off with significant sums, and victims will usually find themselves plagued by follow-up scams. Previous studies of how fraudsters persuade their victims have been limited to the initial solicitation emails sent to a broad population of email users. In this paper, we use the lens of scam-baiting – a vigilante activity whereby members of the public intentionally waste the time of fraudsters – to move beyond this first contact and examine the persuasive tactics employed by a fraudster once their victim has responded to a scam. We find linguistic patterns in scammer and baiter communications that suggest that the mode of persuasion used by scamm...
This study applies the speech acts theory to the study of discourse strategies and functions of hoax...
The following paper discusses the potential of using scambaiting techniques to mitigate online fraud...
A victim of a phishing email could be subject to money loss and identity theft. This paper investiga...
Purpose – Advance fee fraud on the internet is a current epidemic that rakes in hundreds of millions...
This paper examines the interactional construction of written scam communications. It draws on an em...
Abstract Criminals utilize the Internet to perpetrate all manner of fraud, with the largest dollar ...
The amount of Internet fraud has grown exponentially over the last decade. Although computer securit...
Abstract—Nigerian or advance fee fraud scams continue to gain prevelance within the world of online ...
This study examined the persuasive techniques employed by criminals in the online dating romance sca...
This study examined the persuasive techniques employed by criminals in the online dating romance sca...
The 21st century globalisation strongly influences the world as a result of highly improved technol...
This chapter examines email business scams - types of phishing that solicit business partnership wit...
Online criminals have adapted traditional snail mail and door-to-door fraudulent schemes into electr...
Adopting the criminal event perspective, we explore how online fraudsters make use of urgency cues i...
Automatic scam-baiting is an online fraud countermeasure that involves automated systems responding ...
This study applies the speech acts theory to the study of discourse strategies and functions of hoax...
The following paper discusses the potential of using scambaiting techniques to mitigate online fraud...
A victim of a phishing email could be subject to money loss and identity theft. This paper investiga...
Purpose – Advance fee fraud on the internet is a current epidemic that rakes in hundreds of millions...
This paper examines the interactional construction of written scam communications. It draws on an em...
Abstract Criminals utilize the Internet to perpetrate all manner of fraud, with the largest dollar ...
The amount of Internet fraud has grown exponentially over the last decade. Although computer securit...
Abstract—Nigerian or advance fee fraud scams continue to gain prevelance within the world of online ...
This study examined the persuasive techniques employed by criminals in the online dating romance sca...
This study examined the persuasive techniques employed by criminals in the online dating romance sca...
The 21st century globalisation strongly influences the world as a result of highly improved technol...
This chapter examines email business scams - types of phishing that solicit business partnership wit...
Online criminals have adapted traditional snail mail and door-to-door fraudulent schemes into electr...
Adopting the criminal event perspective, we explore how online fraudsters make use of urgency cues i...
Automatic scam-baiting is an online fraud countermeasure that involves automated systems responding ...
This study applies the speech acts theory to the study of discourse strategies and functions of hoax...
The following paper discusses the potential of using scambaiting techniques to mitigate online fraud...
A victim of a phishing email could be subject to money loss and identity theft. This paper investiga...