“There’s a scam out there for everyone”: An examination of the scammers’ tricks employed in two types of mass-marketing frauds – work-at-home and romance.

Slides:



Advertisements
Similar presentations
Presentation of Self on Online Dating sites Dr. Monica Whitty Queens University Belfast Invited talk: Bath University ESRC series: 30.
Advertisements

The Social And Cultural World. Copy this diagram into your books. Explain briefly how the concepts are linked and what this means. Answer: This diagram.
Today’s Agenda… Knowledge Check What is Cyber Crime? Identity Theft Phishing Common Scams inc. online and mobile phone scams Prevention Methods.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Choosing to Live Alcohol-Free (3:02)
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Internet Fraud By Jessica Habermehl &Ally Erwine Period 9.
SEARCHING FOR A JOB CCM Mission Station F.I.T. Program 2015.
International Federation on Ageing Conference, Prague 2012 Financial Protection from Scams Louise Hughes Elder Abuse Programme Manager 1.
Scams & Schemes Common Sense Media.
Promotion, Promotion, Promotion...
Dr Jan Bailey, Dr Louise Taylor & Professor Paul Kingston THE AGE OF THE “SCAMMER” NEW VULNERABILITIES FOR AN AGEING SOCIETY IN THE 21 ST CENTURY.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
7 Market Research Section 7.1 What Is Market Research?
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Social Psychology Study through experimentation of how we think about, influence, and relate to other people.
Survey Scams Sam Roberts. What is a Survey Scam?  A scam where someone asks you to fill out a survey answering personal question, business questions,
Choosing to Live Alcohol- Free (3:02) Click here to launch video Click here to download print activity.
© 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Hertfordshire Trading Standards Scams Susie Helliwell Trading Standards Officer.
1 The “Top Ten Reasons” to Include Professional Home Staging in Your Listing Presentation.
Digital Citizenship Revision. What makes a website trustworthy?  It has references of the content creator  There is a phone number to contact if there.
1 Psychology 320: Psychology of Gender and Sex Differences Lecture 38.
SCHEMES, SCAMS, AND PLOYS Deconstructing the Hoax 1.
1 Psychology 320: Gender Psychology Lecture Invitational Office Hour Invitations, by Student Number for January 21 st 11:30-12:30, 3:30-4:30 Kenny.
Marshal Graham January 16, A confidence trick is an attempt to defraud a person or group by gaining their confidence. A confidence artist is an.
Toy Design Project.  Primary Research  Original research conducted by you (or someone you hire) to collect data specifically for your current objective.
Copyright © 2008 The McGraw-Hill Companies, Inc. All rights reserved. 1 Adolescence 8th edition By Laurence Steinberg, Ph.D. Chapter Ten: Intimacy.
Dr. Louise Taylor, Dr. Jan Bailey, & Dr. Charlotte Eost- Telling The Vagaries of Scams.
Selling and Negotiation Skills
1 Chapter 5 Consumer and Business Buyer Behavior.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
Mrs. Esman Computer Special
SOCIAL PSYCHOLOGY FILM ANALYSIS.
Fraud Protection.
Identifying and Avoiding Scams
Fraud protection.
Marshal Graham January 16, 2012
By Emma, India, Paige CONSUMER FRAUD.
Fraud and Scams.
Interactive Topic Test
Social Engineering Charniece Craven COSC 316.
Online Shopping Basics.
Key Thoughts Trust is crucial to developing successful relationships with customers. Build trust by being competent, compatible, candid, customer-oriented,
Relating to Technology By Paul Sainsbury
Important Info: Creation Myth writing assignment should already have been turned in Two noredink.com assignments should have already been completed.
Choosing to Live Alcohol-Free
ARE YOU A TARGET? YOU MAY NOT REALIZE IT, BUT YOU ARE A TARGET FOR CYBER CRIMINALS. IDENTITY THEFT IS ON THE RISE. BE AWARE AND TAKE PREVENTIVE ACTIONS.
Safe Online Dating – Tips Every Women Should Know
Internet Fraud By (NAMES).
Background Check Tips for Online Dating
Scams and Schemes.
Lesson 2: Choosing to Live Alcohol-Free
Officer Justin Edberg -Police Officer with Casper PD (2014-present)
James 2:14-26 Week 6: Walk that Walk (James 2:14-26)
Week 6: Walk that Walk (James 2:14-26).
Developing Resilience
Do you have special real estate needs?
Ask a Librarian Service
Best Social Media Marketing Company
Choosing to Live Alcohol-Free (3:02)
Chapter 12 selling overview Section 12.1 The Sales Function
A guide for Real Estates
Curriculum for Excellence
Unit 2 - Global Information
Seniors Real Estate Specialist® Designation
Social Networking.
Presentation transcript:

“There’s a scam out there for everyone”: An examination of the scammers’ tricks employed in two types of mass-marketing frauds – work-at-home and romance scams Prof Monica Whitty Cyber Security Centre 15th December 2016 http://www2.warwick.ac.uk/fac/sci/wmg/people/profile/?wmgid=1336

Typology of victims – romance scam

Study 1: 2011 Victims of the romance scam (N = 397) and online daters (N = 853) to complete a battery of personality scales to examine the typology of victims compared with online daters. Buchanan, T., & Whitty, M. T. (2014). The online dating romance scam: Causes and consequences of victimhood. Psychology, Crime & Law 20(3), 261-283.

Possible predictors of victimhood Buchanan, T., & Whitty, M. T. (2014). The online dating romance scam: Causes and consequences of victimhood. Psychology, Crime & Law 20(3), 261-283.

Personal characteristics Romantic Beliefs Love_Finds_Way: ‘If I love someone, I know I can make the relationship work’ One_and_only: ‘I believe that to be truly in love is to be in love forever’ Idealisation: ‘In the relationship I will have my true love will be nearly perfect’ Love at First Sight: ‘When I find my true love I will probably know it soon after we meet’ Buchanan, T., & Whitty, M. T. (2014). The online dating romance scam: Causes and consequences of victimhood. Psychology, Crime & Law 20(3), 261-283.

Study 1: 2011

Study 2: 2015 Victims of the romance scam (N = 200) and non-victims (N = 10,723) to complete a battery of personality scales to examine the typology of victims compared with non-victims and other types of victims (N = 1057)

Hypotheses for romance scam victim psychological characteristics

Romance scam vs non-victims

Romance scam vs other scam victims

Study 2: 2016

Anatomy of the scam Brings to the criminal specific dispositions Errors in decision making – trust relationship; visceral influences; information presented (included photoshopped photos) – cognitive dissonance Hyper-personal relationship Use of media to deceive/persuade Chasing the relationship/money – near win Whitty, M. T. (2013). The Scammers Persuasive Techniques Model: Development of a stage model to explain the online dating romance scam. British Journal of Criminology, 53(4), 665-684. Whitty, M. T. (2015). Anatomy of the Online Dating Romance Scam. Security Journal, 28, 443-455.

Whitty, M. T. (2013). The Scammers Persuasive Techniques Model: Development of a stage model to explain the online dating romance scam. British Journal of Criminology, 53(4), 665-684.

Work- at-home scam

Interviews – 7 UK participants (research ongoing) Various derivatives of the scam Sell products on behalf of company ‘criminal’ Up front fee – starter kit Call expensive number to learn more

2 categories of victims Naïve – difficult to find work (new mums; elderly; disabled) Consider themselves as financially savvy – make some extra money on the side

Money Laundering Some become knowingly complicit/most don’t realize until the sting?

Persuasive techniques – used in work at home scam Urgency – need to act quickly Cognitively focused on task Authenticity – excessive detail Approached through legitimate sites Provide ‘training’ and need to demonstrate ‘competence’.

Psychological impact – similarities and differences