Skip to main content
Erschienen in: Information Systems Frontiers 2/2022

15.08.2020

How Do Individuals Justify and Rationalize their Criminal Behaviors in Online Romance Fraud?

verfasst von: Martin Offei, Francis Kofi Andoh-Baidoo, Emmanuel W. Ayaburi, David Asamoah

Erschienen in: Information Systems Frontiers | Ausgabe 2/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Online romance fraud (ORF) is a growing concern with such serious negative consequences as financial loss or suicide to the victim. Majority of empirical studies on online romance fraud using attachment, deception, protection motivation and relation theories focus on the victim. While neutralization offers insights into how individuals justify their deviant behaviors, the results have not been consistent in different contexts. In the ORF context, offenders may not only rely on justifying techniques but also rationalize their actions by denying risk both to the victim and the offender. Thus, drawing from the neutralization and denial of risk theories, we develop a research model to explain how online romance offenders justify and rationalize their intended criminal activities. To confirm our theoretical model, we collected 320 responses from individuals at Internet Cafés alleged to be online romance fraud hotspots. Our results highlight the boundary conditions of neutralization techniques in the context of online romance fraud. The study shows that denial of risk, a rationalization mechanism, moderates the relationship between denial of victim, a justification technique, and intention to commit romance fraud. This insight advances the frontiers of neutralization theory. We offer both theoretical and managerial implications of the findings.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
Zurück zum Zitat Boateng, R., Olumide, L., Isabalija, R. S., & Budu, J. (2011). Sakawa - cybercrime and criminality in Ghana. Journal of Information Technology Impact, 11(2), 85–100. Boateng, R., Olumide, L., Isabalija, R. S., & Budu, J. (2011). Sakawa - cybercrime and criminality in Ghana. Journal of Information Technology Impact, 11(2), 85–100.
Zurück zum Zitat Cao, L. (2004). Major criminological theories: Concepts and measurement. CA: Wadsworth Publishing Company. Cao, L. (2004). Major criminological theories: Concepts and measurement. CA: Wadsworth Publishing Company.
Zurück zum Zitat Derzakarian, A. (2017). The dark side of social media romance: Civil recourse for catfish victims. Loyola of Los Angeles Law Review, 50, 25. Derzakarian, A. (2017). The dark side of social media romance: Civil recourse for catfish victims. Loyola of Los Angeles Law Review, 50, 25.
Zurück zum Zitat Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18, 382–388.CrossRef Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18, 382–388.CrossRef
Zurück zum Zitat Hadzhidimova, L., & Payne, B. (2019). The Profile of the International Cyber Offender in the U.S., (2:1), pp. 40–55. Hadzhidimova, L., & Payne, B. (2019). The Profile of the International Cyber Offender in the U.S., (2:1), pp. 40–55.
Zurück zum Zitat Hair Jr., J. F., Anderson, R. E., Tatham, R. L., & William, C. (1995). Multivariate data analysis with readings. New Jersey: Prentice Hall. Hair Jr., J. F., Anderson, R. E., Tatham, R. L., & William, C. (1995). Multivariate data analysis with readings. New Jersey: Prentice Hall.
Zurück zum Zitat Luu, V., Land, L., & Chin, W. (2017). Safeguarding Against Romance Scams – Using Protection Motivation Theory. In In Proceedings of the 25th, Guimarães, Portugal, June 5, pp. 2429–2444. Luu, V., Land, L., & Chin, W. (2017). Safeguarding Against Romance Scams – Using Protection Motivation Theory. In In Proceedings of the 25th, Guimarães, Portugal, June 5, pp. 2429–2444.
Zurück zum Zitat Muthén, L. K., & Muthén, B. O. (2005). Mplus: Statistical analysis with latent variables: User’s guide, Los Angeles. Muthén, L. K., & Muthén, B. O. (2005). Mplus: Statistical analysis with latent variables: User’s guide, Los Angeles.
Zurück zum Zitat Priest, T. B., & McGrath III, J. H. (1970). Techniques of neutralization: Young adult marijuana smokers. Criminology, 8(2), 185–194.CrossRef Priest, T. B., & McGrath III, J. H. (1970). Techniques of neutralization: Young adult marijuana smokers. Criminology, 8(2), 185–194.CrossRef
Zurück zum Zitat Rege, A. (2009). What’s Love Got to Do with It? Exploring Online Dating Scams and Identity Fraud, (3:2), p. 19. Rege, A. (2009). What’s Love Got to Do with It? Exploring Online Dating Scams and Identity Fraud, (3:2), p. 19.
Zurück zum Zitat Siponen, M., Pahnila, S., & Mahmood, M. A. (2010). Compliance with information security policies: An empirical investigation. Computer, 43(2), 64–71.CrossRef Siponen, M., Pahnila, S., & Mahmood, M. A. (2010). Compliance with information security policies: An empirical investigation. Computer, 43(2), 64–71.CrossRef
Zurück zum Zitat Straub, D., Boudreau, M.-C., & Gefen, D. (2004). Validation guidelines for IS positivist research. Communications of the Association for Information Systems, 13(1), 63. Straub, D., Boudreau, M.-C., & Gefen, D. (2004). Validation guidelines for IS positivist research. Communications of the Association for Information Systems, 13(1), 63.
Zurück zum Zitat Vance, A., Mikko, T. S., & Detmar, W. S. (2019). Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures. Information & Management, 103212. Vance, A., Mikko, T. S., & Detmar, W. S. (2019). Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures. Information & Management, 103212.
Zurück zum Zitat Williams, L. M. (1986). Race and Rape: The Black Woman as Legitimate Victim, National Inst. of Mental Health (DHHS), Rockville, Md., pp. 1–35. Williams, L. M. (1986). Race and Rape: The Black Woman as Legitimate Victim, National Inst. of Mental Health (DHHS), Rockville, Md., pp. 1–35.
Zurück zum Zitat Willison, R., Warkentin, M., & Johnston, A. C. (2018). Examining employee computer abuse intentions: Insights from justice, deterrence and neutralization perspectives: Examining the influence of disgruntlement on computer abuse intentions. Information Systems Journal, 28(2), 266–293. https://doi.org/10.1111/isj.12129.CrossRef Willison, R., Warkentin, M., & Johnston, A. C. (2018). Examining employee computer abuse intentions: Insights from justice, deterrence and neutralization perspectives: Examining the influence of disgruntlement on computer abuse intentions. Information Systems Journal, 28(2), 266–293. https://​doi.​org/​10.​1111/​isj.​12129.CrossRef
Metadaten
Titel
How Do Individuals Justify and Rationalize their Criminal Behaviors in Online Romance Fraud?
verfasst von
Martin Offei
Francis Kofi Andoh-Baidoo
Emmanuel W. Ayaburi
David Asamoah
Publikationsdatum
15.08.2020
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 2/2022
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-020-10051-2

Weitere Artikel der Ausgabe 2/2022

Information Systems Frontiers 2/2022 Zur Ausgabe

Premium Partner