Abstract
Online romance fraud (ORF) is a growing concern with such serious negative consequences as financial loss or suicide to the victim. Majority of empirical studies on online romance fraud using attachment, deception, protection motivation and relation theories focus on the victim. While neutralization offers insights into how individuals justify their deviant behaviors, the results have not been consistent in different contexts. In the ORF context, offenders may not only rely on justifying techniques but also rationalize their actions by denying risk both to the victim and the offender. Thus, drawing from the neutralization and denial of risk theories, we develop a research model to explain how online romance offenders justify and rationalize their intended criminal activities. To confirm our theoretical model, we collected 320 responses from individuals at Internet Cafés alleged to be online romance fraud hotspots. Our results highlight the boundary conditions of neutralization techniques in the context of online romance fraud. The study shows that denial of risk, a rationalization mechanism, moderates the relationship between denial of victim, a justification technique, and intention to commit romance fraud. This insight advances the frontiers of neutralization theory. We offer both theoretical and managerial implications of the findings.
Similar content being viewed by others
References
Apostolidis, T., Fieulaine, N., Simonin, L., & Rolland, G. (2006). Cannabis use, time perspective and risk perception: Evidence of a moderating effect†. Psychology & Health, 21(5), 571–592. https://doi.org/10.1080/14768320500422683.
Aransiola, J. O., & Asindemade, S. O. (2011). Understanding cybercrime perpetrators and the strategies they employ in Nigeria. Cyberpsychology, Behavior and Social Networking, 14(12), 759–763. https://doi.org/10.1089/cyber.2010.0307.
Barlow, J. B., Warkentin, M., Ormond, D., & Dennis, A. R. (2013). Don’t make excuses! Discouraging neutralization to reduce IT policy violation. Computers & Security, 39, 145–159. https://doi.org/10.1016/j.cose.2013.05.006.
Boateng, R., Olumide, L., Isabalija, R. S., & Budu, J. (2011). Sakawa - cybercrime and criminality in Ghana. Journal of Information Technology Impact, 11(2), 85–100.
Brenhoff, A. (2017). How a Billion-Dollar Internet Scam is Breaking Hearts and Bank Accounts, HUFFPOST. https://www.huffpost.com/entry/romance-scams-online-fbi-facebook_n_59414c67e4b0d318548666f9.
Buchanan, T., & Whitty, M. T. (2014). The online dating romance scam: causes and consequences of victimhood. Psychology, Crime & Law, 20(3), 261–283. https://doi.org/10.1080/1068316X.2013.772180.
Cao, L. (2004). Major criminological theories: Concepts and measurement. CA: Wadsworth Publishing Company.
CBC News (2017). Flirting with Fraud: Police Take Aim at Romance Scams,” CBS. https://www.cbc.ca/news/canada/manitoba/romance-scam-fraud-prevention-month-winnipeg-1.4004692
Cheng, L., Li, W., Zhai, Q., & Smyth, R. (2014). Understanding personal use of the internet at work: An integrated model of neutralization techniques and general deterrence theory. Computers in Human Behavior, 38, 220–228. https://doi.org/10.1016/j.chb.2014.05.043.
Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588–608. https://doi.org/10.2307/2094589
Copes, H. (2003). Societal attachments, offending frequency, and techniques of neutralization. Deviant Behavior, 24(2), 101–127. https://doi.org/10.1080/01639620390117200.
Costello, B. J. (2000). Techniques of neutralization and self-esteem: A critical test of social control and neutralization theory. Deviant Behavior, 21(4), 307–329. https://doi.org/10.1080/016396200404113.
Cross, C. (2015). No laughing matter: Blaming the victim of online fraud. International Review of Victimology, 21(2), 187–204. https://doi.org/10.1177/0269758015571471.
Cross, C. (2018). (Mis)understanding the impact of online fraud: Implications for victim assistance schemes. Victims & Offenders, 13(6), 757–776. https://doi.org/10.1080/15564886.2018.1474154.
Derzakarian, A. (2017). The dark side of social media romance: Civil recourse for catfish victims. Loyola of Los Angeles Law Review, 50, 25.
Ebenezer, A. J., Paula, A. M., & Allo, T. (2016). Risk and investment decision making in the technological Age: A Dialysis Of Cyber Fraud Complication In Nigeria. https://doi.org/10.5281/ZENODO.58522.
Evans, R. D., & Porche, D. A. (2005). The nature and frequency of Medicare/Medicaid fraud and neutralization techniques among speech, occupational, and physical therapists. Deviant Behavior, 26(3), 253–270. https://doi.org/10.1080/01639620590915167.
Farahmand, F., & Spafford, E. H. (2013). Understanding insiders: An analysis of risk-taking behavior. Information Systems Frontiers, 15(1), 5–15. https://doi.org/10.1007/s10796-010-9265-x.
Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18, 382–388.
Gilmour, N. (2016). Preventing money laundering: A test of situational crime prevention theory. Journal of Money Laundering Control, 19(4), 376–396. https://doi.org/10.1108/JMLC-10-2015-0045.
Hadzhidimova, L., & Payne, B. (2019). The Profile of the International Cyber Offender in the U.S., (2:1), pp. 40–55.
Hair Jr., J. F., Anderson, R. E., Tatham, R. L., & William, C. (1995). Multivariate data analysis with readings. New Jersey: Prentice Hall.
Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle, C. M. (2019). When to use and how to report the results of PLS-SEM. European Business Review, 31(1), 2–24. https://doi.org/10.1108/EBR-11-2018-0203.
Harrington, S. J. (1996). The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly, 20(3), 257–278. https://doi.org/10.2307/249656.
Hinduja, S. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, 9(3), 187–204. https://doi.org/10.1007/s10676-007-9143-5.
Ho, S. M., Lowry, P. B., Warkentin, M., Yang, Y., & Hollister, J. M. (2017). Gender deception in asynchronous online communication: A path analysis. Information Processing & Management, 53(1), 21–41. https://doi.org/10.1016/j.ipm.2016.06.004.
Hutchings, A., & Clayton, R. (2016). Exploring the provision of online Booter services. Deviant Behavior, 37(10), 1163–1178. https://doi.org/10.1080/01639625.2016.1169829.
Ibrahim, S. (2016). Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals. International Journal of Law, Crime and Justice, 47, 44–57. https://doi.org/10.1016/j.ijlcj.2016.07.002.
Ingram, J. R., & Hinduja, S. (2008). Neutralizing music piracy: An empirical examination. Deviant Behavior, 29(4), 334–366. https://doi.org/10.1080/01639620701588131.
Karimi, F. (2019). Americans lost $143 million in online romance scams last year. That’s way more than any other reported fraud, CNN. https://www.cnn.com/2019/08/23/us/online-romance-scams-losses-trnd/index.html.
Liao, R., Balasinorwala, S., & Raghav Rao, H. (2017). Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests. Information Systems Frontiers, 19(3), 443–455. https://doi.org/10.1007/s10796-017-9752-4.
Luu, V., Land, L., & Chin, W. (2017). Safeguarding Against Romance Scams – Using Protection Motivation Theory. In In Proceedings of the 25th, Guimarães, Portugal, June 5, pp. 2429–2444.
Moore, T., Clayton, R., & Anderson, R. (2009). The economics of online crime. Journal of Economic Perspectives, 23(3), 3–20. https://doi.org/10.1257/jep.23.3.3.
Mosley, M. A., Lancaster, M., Parker, M. L., & Campbell, K. (2020). Adult attachment and online dating deception: A theory modernized. Sexual and Relationship Therapy, 35(2), 227–243. https://doi.org/10.1080/14681994.2020.1714577.
Moss, C. (2015). Strangers have been using this woman’s photos to catfish people online for 10 years. Tech Insider. Retrieved fromhttp://www.businessinsider.com/strangers-have-been-using-thiswomans-photos-to-catfish-people-for-10-years-2015-1
Muthén, L. K., & Muthén, B. O. (2005). Mplus: Statistical analysis with latent variables: User’s guide, Los Angeles.
Peretti-Watel, P. (2003). Neutralization theory and the denial of risk: Some evidence from Cannabis use among French adolescents. British Journal of Sociology, 54(1), 21–42. https://doi.org/10.1080/0007131032000045888.
Pershing, J. L. (2003). Why women Don’t report sexual harassment: A case study of an elite military institution. Gender Issues, 21(4), 3–30. https://doi.org/10.1007/s12147-003-0008-x.
Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903. https://doi.org/10.1037/0021-9010.88.5.879.
Priest, T. B., & McGrath III, J. H. (1970). Techniques of neutralization: Young adult marijuana smokers. Criminology, 8(2), 185–194.
Rege, A. (2009). What’s Love Got to Do with It? Exploring Online Dating Scams and Identity Fraud, (3:2), p. 19.
Reinartz, W., Haenlein, M., & Henseler, J. (2009). An empirical comparison of the efficacy of covariance-based and variance-based SEM. International Journal of Research in Marketing, 26(4), 332–344. https://doi.org/10.1016/j.ijresmar.2009.08.001.
Silic, M., Barlow, J. B., & Back, A. (2017). A new perspective on neutralization and deterrence: Predicting shadow IT usage. Information & Management, 54(8), 1023–1037. https://doi.org/10.1016/j.im.2017.02.007.
Siponen, & Vance. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487–502. https://doi.org/10.2307/25750688.
Siponen, M., Pahnila, S., & Mahmood, M. A. (2010). Compliance with information security policies: An empirical investigation. Computer, 43(2), 64–71.
Siponen, M., Vance, A., & Willison, R. (2012). New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs. Information & Management, 49(7–8), 334–341. https://doi.org/10.1016/j.im.2012.06.004.
Siponen, M., Puhakainen, P., & Vance, A. (2020). Can individuals’ neutralization techniques be overcome? A field experiment on password policy. Computers & Security, 88, 101617. https://doi.org/10.1016/j.cose.2019.101617.
Sorell, T., & Whitty, M. (2019). Online romance scams and victimhood. Security Journal, 32(3), 342–361. https://doi.org/10.1057/s41284-019-00166-w.
Straub, D., Boudreau, M.-C., & Gefen, D. (2004). Validation guidelines for IS positivist research. Communications of the Association for Information Systems, 13(1), 63.
Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664. https://doi.org/10.2307/2089195.
Tombor, I., Urbán, R., Berkes, T., & Demetrovics, Z. (2010). Denial of smoking-related risk among pregnant smokers. Acta Obstetricia et Gynecologica Scandinavica, 89(4), 524–530. https://doi.org/10.3109/00016341003678427.
U.S. Department of Justice (2019). 10 Men Involved in Nigerian Romance Scams Indicted for Money Laundering Conspiracy, The United States Department of Justice. https://www.justice.gov/opa/pr/10-men-involved-nigerian-romance-scams-indicted-money-laundering-conspiracy.
Vance, A., Mikko, T. S., & Detmar, W. S. (2019). Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures. Information & Management, 103212.
Whitty, M. T. (2013). The scammers persuasive techniques model: Development of a stage model to explain the online dating romance scam. British Journal of Criminology, 53(4), 665–684. https://doi.org/10.1093/bjc/azt009.
Whitty, M. T., & Buchanan, T. (2016). The online dating romance scam: The psychological impact on victims – Both financial and non-financial. Criminology & Criminal Justice, 16(2), 176–194. https://doi.org/10.1177/1748895815603773.
Williams, L. M. (1986). Race and Rape: The Black Woman as Legitimate Victim, National Inst. of Mental Health (DHHS), Rockville, Md., pp. 1–35.
Williams, E. J., Beardmore, A., & Joinson, A. N. (2017). Individual differences in susceptibility to online influence: A theoretical review. Computers in Human Behavior, 72, 412–421. https://doi.org/10.1016/j.chb.2017.03.002.
Willison, R., Warkentin, M., & Johnston, A. C. (2018). Examining employee computer abuse intentions: Insights from justice, deterrence and neutralization perspectives: Examining the influence of disgruntlement on computer abuse intentions. Information Systems Journal, 28(2), 266–293. https://doi.org/10.1111/isj.12129.
Wong, N., Ray, P., Stephens, G., & Lewis, L. (2012). Artificial immune Systems for the Detection of credit card fraud: An architecture, prototype and preliminary results: Artificial immune Systems for the Detection of credit card fraud. Information Systems Journal, 22(1), 53–76. https://doi.org/10.1111/j.1365-2575.2011.00369.x.
Xu, Z., Hu, Q., & Zhang, C. (2013). Why computer talents become computer hackers. Communications of the ACM, 56(4), 64–74. https://doi.org/10.1145/2436256.2436272.
Zhang, S., & Leidner, D. (2018). From improper to acceptable: How perpetrators neutralize workplace bullying behaviors in the cyber world. Information & Management, 55(7), 850–865. https://doi.org/10.1016/j.im.2018.03.012.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix 1
Appendix 1
Denial of Risk (source) 1-Strongly Agree, 2-Agree, 3-Neither Agree nor Disagree, 4- Disagree, 5 - Strongly Disagree. | 1 | 2 | 3 | 4 | 5 | |
Dor1 | Defrauding “clients” is not as bad as ‘blood money’. | |||||
Dor2 | Defrauding “clients” is not as bad as ‘Sakawa’. | |||||
Dor3 | Defrauding “clients” is not as bad as corruption. | |||||
Dor4 | I know how to get “clients” believe in me than the average person. | |||||
Dor5 | It is not dangerous to maintain relationship with “clients” after defrauding them. | |||||
Dor6 | I have confidence in determining “clients” who are less willing to be defrauded. | |||||
Denial of Victim 1-Strongly Agree, 2-Agree, 3-Neither Agree nor Disagree, 4- Disagree, 5 - Strongly Disagree. | 1 | 2 | 3 | 4 | 5 | |
Neutdov1 | It is not wrong to defraud “clients” because they live abroad | |||||
Neutdov2 | It is not wrong to defraud “clients” because they are wealthy. | |||||
Neutdov3 | It is not wrong to defraud “clients” because they live in the richest countries in the world. | |||||
Neutdov4 | ||||||
Intention to Commit Internet Romance Fraud 1-Strongly Agree, 2-Agree, 3-Neither Agree nor Disagree, 4- Disagree, 5 - Strongly Disagree. | 1 | 2 | 3 | 4 | 5 | |
Frd1 | What is the chance that you will defraud “clients”? | |||||
Frd2 | I am certain that I will defraud “clients” | |||||
Frd3 | I am likely to defraud “clients” | |||||
Denial of Injury 1-Strongly Agree, 2-Agree, 3-Neither Agree nor Disagree, 4- Disagree, 5 - Strongly Disagree. | 1 | 2 | 3 | 4 | 5 | |
Neutdoi1 | It is ok to defraud “clients” if no one gets hurt. | |||||
Neutdoi2 | It is ok to defraud “clients” if no harm is done. | |||||
Neutdoi3 | It is ok to defraud “clients” if no damage is done. | |||||
Denial of Responsibility 1-Strongly Agree, 2-Agree, 3-Neither Agree nor Disagree, 4- Disagree, 5 - Strongly Disagree. | 1 | 2 | 3 | 4 | 5 | |
Neutdor1 | It is ok to defraud “clients”, if you are not aware of any law related to your action. | |||||
Neutdor2 | It is ok to defraud a “client” if you are not sure what the law is. | |||||
Neutdor3 | It is ok to defraud “clients” if you do not understand the implication of your action. |
Rights and permissions
About this article
Cite this article
Offei, M., Andoh-Baidoo, F.K., Ayaburi, E.W. et al. How Do Individuals Justify and Rationalize their Criminal Behaviors in Online Romance Fraud?. Inf Syst Front 24, 475–491 (2022). https://doi.org/10.1007/s10796-020-10051-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10796-020-10051-2