Abstract
Romance scams represent a form of online crime with origins in the physical world, including FTF and physical mail scams. Although these crimes have been revolutionized by the affordances inherent in the technological advantages of social media and the internet, less is known about the foreground characteristics of the offense, including the preferred targeting and scamming strategies of romance fraudsters as facets of a larger process of communication and deception between offenders and victims. Much of the research has focused on the existence and mechanics of such fraud schemes and less on how reciprocal communication between offenders and victims, governed by measurable principles of impression management and deception can underpin the overt manipulation of victims into parting with their financial resources. Our goal in the current research is to identify risk and protective factors for those targeted by romance scam offenders to develop a model for victim vulnerability and resilience. Using data developed through a systematic collection of victim recounts of their scamming experiences from online sources (Nfemale = 32 and Nmale = 20), our findings point to a reciprocal model between victims and offenders through identifying four main themes in victims’ descriptions of their scamming experiences. Such an effort allows us to delineate important risk signals we identify as crucial for future research and prevention efforts. The findings of this study speak to the importance of understanding social and behavioral interactions between victims and offenders during a romance scam as critical to establishing risk and protective factors of victims, which further inform preemptive prevention efforts.
Similar content being viewed by others
Notes
Several reports on both websites are in a poem format, which is not an ideal form that allows researchers to grasp the meaning of each sentence, let alone coding them. So, this type of report would be excluded
Some reports, especially those on stop-scammers.com and male-scammers.com are not complete. For example, some of these reports have neither a beginning (e.g., who, where the conversation initiated) nor the end (e.g., how did the fraud end and what did the victim do after the revelation).
Testimonial #25
Testimonial #14
References
Anesa, P. (2020). Lovextortion: Persuasion strategies in romance cybercrime. Discourse Context & Media, 35(8), 100–398. https://doi.org/10.1016/j.dcm.2020.100398.
Angel, C. M., Sherman, L. W., Strang, H., Ariel, B., Bennett, S., Inkpen, N., & Richmond, T. S. (2014). Short-term effects of restorative justice conferences on post-traumatic stress symptoms among robbery and burglary victims: a randomized controlled trial. Journal of Experimental Criminology, 10(3), 291–307. https://doi.org/10.1007/s11292-014-9200-0.
Anderson, A. L., & Meier, R. F. (2004). Interactions and the criminal event perspective. Journal of Contemporary criminal justice, 20(4), 416–440. https://doi.org/10.1177/1043986204269383.
Becker, R. A., Volinsky, C., & Wilks, A. R. (2010). Fraud detection in telecommunications: History and lessons learned. Technometrics, 52(1), 20–33. https://doi.org/10.1198/TECH.2009.08136.
Bevege, A (2020). More than half a billion animals killed by bushfires pushing some of Australia’s rare species toward extinction. Daily Mail. Retrieved from https://www.dailymail.co.uk/news/article-7850275/Bushfires-push-Australias-rare-species-extinction.html.
Beltrán, C. (2015). Undocumented, Unafraid, and Unapologetic. In Allen, D., Light, S, J (Eds.), From Voice to Influence: Understanding Citizenship in a Digital Age (p80). University of Chicago Press.
Biderman, A. D., & Reiss Jr, A. J. (1967). On exploring the" dark figure" of crime. The Annals of the American Academy of Political and Social Science, 374(1), 1-15.
Brinkmann, S. (2007). The good qualitative researcher. Qualitative Research in Psychology, 4(1–2), 127–144. https://doi.org/10.1080/14780880701473516.
Bowles, M. (2012). The business of hacking and the birth of an industry. Bell Labs Technical Journal, 17(3), 5–16. DOI: https://doi.org/10.1002/bltj.21555.
Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative research in psychology, 3(2), 77–101. DOI: https://doi.org/10.1191/1478088706qp063oa.
Brown, L. S. (2015). Woman scammed of $250,000 starts support group for survivors of online dating fraud. ABC News Retrieved January 7, 2022, from https://www.abc.net.au/news/2015-01-07/support-group-for-online-dating-fraud-survivors/6004208.
Buchanan, T., & Whitty, M. (2014). The online dating romance scam: Causes and consequences of victimhood. Psychology Crime and Law, 20(3), 261–283. https://doi.org/10.1080/1068316X.2013.772180.
Burgoon, J. K. (2015). Rejoinder to Levine, Clare et al.'s comparison of the Park–Levine probability model versus interpersonal deception theory: Application to deception detection. Human Communication Research, 41(3), 327-349.
Buller, D. B., & Burgoon, J. K. (1996). Interpersonal deception theory. Communication theory, 6(3), 203–242. https://doi.org/10.1111/j.1468-2885.1996.tb00127.x.
Buse, U(2005). "Africa’s City of Cyber Gangsters". Der Spiegel. Retrieved November 11, 2022.
Cantor, D., Steiger, M. D., Townsend, R., Hartge, Y. J., Fay, E. R., Warren, A., Heaton, L. L., Kaasa, S., Maitland, A., Sun, H., Norman, G., & Jones, M. (2018). Methodological Research to Support the National Crime Victimization Survey: Self-Report Data on Rape and Sexual Assault – Pilot Test WestStats: Bureau of Justice Statistics. Retrieved December 5, 2021, from https://www.ojp.gov/pdffiles1/bjs/grants/256011.pdf.
Carter, E. (2021). Distort, extort, deceive and exploit: exploring the inner workings of a romance fraud. The British Journal of Criminology, 61(2), 283–302. https://doi.org/10.1093/bjc/azaa072.
Cialdini, R. B. (1984). Influence: The Psychology of Persuasion William Morrow.
Cialdini, R. B. (2001). The science of persuasion. Scientific American, 284(2), 76–81. Retrieved December 20, 2021, fromhttps://www.jstor.org/stable/26059056.
Cialdini, R. B., Vincent, J. E., Lewis, S. K., Catalan, J., Wheeler, D., & Darby, B. L. (1975). Reciprocal concessions procedure for inducing compliance: The door-in the-face technique. Journal of Personality and Social Psychology, 31, 206-215.
Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44 (4), 588–608. https://doi.org/2094589.
Coluccia, A., Pozza, A., Ferretti, F., Carabellese, F., Masti, A., & Gualtieri, G. (2020). Online romance scams: relational dynamics and psychological characteristics of the victims and scammers. A scoping review. Clinical practice and epidemiology in mental health: CP & EMH, 16, 24. DOI: https://doi.org/10.2174/1745017902016010024.
Costello, L., McDermott, M. L., & Wallace, R. (2017). Netnography: Range of practices, misperceptions, and missed opportunities. International Journal of Qualitative Methods, 16(1), 1609406917700647. https://doi.org/10.1177/1609406917700647.
Coram, P., Ferguson, C., & Moroney, R. (2008). Internal audit, alternative internal audit structures and the level of misappropriation of assets fraud. Accounting & Finance, 48(4), 543–559. https://doi.org/10.1111/j.1467-629X.2007.00247.x.
Cross, C. (2016a). ‘I’m anonymous, I’m a voice at the end of the phone’: A Canadian case study into the benefits of providing telephone support to fraud victims. Crime Prevention and Community Safety, 18(3), 228–243. DOI: https://doi.org/10.1057/cpcs.2016.10.
Cross, C. (2016b). ‘They’re very lonely’: Understanding the fraud victimisation of seniors. International Journal for Crime Justice and Social Democracy, 5(4), 60–75. DOI: https://doi.org/10.5204/ijcjsd.v5i4.268.
Cross, C. (2020). Romance fraud. In J. Holt, T, & M. A. Bossler (Eds.), The Palgrave Handbook of International Cybercrime and Cyberdeviance (pp. 917–937). Palgrave Macmillan.
Cross, C., & Holt, T. J. (2021). The Use of Military Profiles in Romance Fraud Schemes. Victims & Offenders, 16(3), 385–406. https://doi.org/10.1080/15564886.2020.1850582.
Cross, C., Dragiewicz, M., & Richards, K. (2018). Understanding romance fraud: Insights from domestic violence research. The British Journal of Criminology, 58(6), 1303–1322. https://doi.org/10.1093/bjc/azy005.
Cross, C., Smith, R. G., & Richards, K. (2014). Challenges of responding to online fraud victimisation in Australia. Trends and Issues in Crime and Criminal Justice, 474, 1–7. Retrieved November 25, 2021, from https://www.aic.gov.au/publications/tandi/tandi474.
Cukier, W. L., Nesselroth, E. J., & Cody, S. (2007, January). Genre, narrative and the” Nigerian Letter” in electronic mail. In 2007 40th Annual Hawaii International Conference on System Sciences (HICSS’07) (pp. 70–70). IEEE. DOI: https://doi.org/10.1109/HICSS.2007.238.
Czerny, A. B., & Lassiter, P. S. (2016). Healing from intimate partner violence: An empowerment wheel to guide the recovery journey. Journal of creativity in mental health, 11(3-4), 311-324.
The Business of Apps (2022). Dating App Report. Retrieved from https://www.businessofapps.com/data/dating-app-report/.
Fan, W., Kevin, L., & Rong, R. (2017). Social engineering: IE based model of human weakness for attack and defense investigations. IJ Computer Network and Information Security, 9(1), 1–11. DOI: https://doi.org/10.5815/ijcnis.2017.01.01.
Farrell, G., Phillips, C., & Pease, K. (1995). Like taking candy-why does repeat victimization occur. British Journal of Criminology, 35(3), 384. https://doi.org/10.1093/oxfordjournals.bjc.a048523.
FBI (n.d.). Romance Scams. Retrieved December 21 (2021). from https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/romance-scams.
Federal Bureau Investigation (n.d.). Advance Fee Schemes. Retrieved December 21 (2021). from https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/advance-fee-schemes.
Federal Bureau of Investigation (2021). Internet Crime Complaint Report 2021. Retrieved from https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf
Federal Trade Commission (FTC) (2021). New Data Shows FTC Received 2.2 million Fraud Reports from Consumers in 2020. Retrieved December 21, 2021, from https://www.ftc.gov/news-events/press-releases/2021/02/new-data-shows-ftc-received-2-2-million-fraud-reports-consumers.
Golladay, K., & Holtfreter, K. (2017). The consequences of identity theft victimization: An examination of emotional and physical health outcomes. Victims & Offenders, 12(5), 741–760. https://doi.org/10.1080/15564886.2016.1177766.
Holt, T. J., & Graves, D. C. (2007). A qualitative analysis of advance fee fraud e-mail schemes. International Journal of Cyber Criminology, 1(1), 137–154. DOI: https://doi.org/10.5281/zenodo.18282.
Goffman, E. (1978). The presentation of self in everyday life (p. 56). London: Harmondsworth.
Gouldner, A. W. (1960). The norm of reciprocity: A preliminary statement. American sociological review, 25(2), 161–178. https://doi.org/10.2307/2092623.
Gregory, D., & Nikiforova, B. (2012). A sweetheart of a deal: How people get hooked and reeled in by financial scams. The Journal of Behavioural Finance and Economics, 2(2), 96–122.
Han, S., & Nasir, K. M. (2015). Digital culture and religion in Asia. Routledge.
Hancock, B. (1995). Simple social engineering. Network Security, 1995(6), 13–14. https://doi.org/10.1016/1353-4858(96)89726-1.
Hancock, J. T., & Gonzales, A. (2013). 15. Deception in computer-mediated communication. In Herring. S, Stein. D & Virtanen. T (Eds.), Pragmatics of computer-mediated communication (pp. 363–783). De Gruyter Mouton.
Hatfield, J. M. (2018). Social engineering in cybersecurity: The evolution of a concept. Computers & Security, 73, 102–113. DOI: https://doi.org/10.1016/j.cose.2017.10.008.
Helmer, G., Wong, J., & Madaka, S. (2001). Anomalous intrusion detection system for hostile Java applets. Journal of Systems and Software, 55(3), 273–286. https://doi.org/10.1016/S0164-1212(00)00076-5.
Herrmann, M. (2009). Security strategy: From soup to nuts. Information Security Journal: A Global Perspective, 18(1), 26–32. https://doi.org/10.1080/19393550802656115.
Huang, J., Stringhini, G., & Yong, P. (2015, July). Quit playing games with my heart: Understanding online dating scams. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 216–236). Springer, Cham. DOI: https://doi.org/10.1007/978-3-319-20550-2_12.
Huber, M., Mulazzani, M., Weippl, E., Kitzler, G., & Goluch, S. (2011). Friend-in-the-middle attacks: Exploiting social networking sites for spam. IEEE Internet Computing, 15(3), 28–34. DOI: https://doi.org/10.1109/MIC.2011.24.
Humpherys, S. L., Moffitt, K. C., Burns, M. B., Burgoon, J. K., & Felix, W. F. (2011). Identification of fraudulent financial statements using linguistic credibility analysis. Decision Support Systems, 50(3), 585–594. https://doi.org/10.1016/j.dss.2010.08.009.
Javadi, M., & Zarea, K. (2016). Understanding thematic analysis and its pitfall. Journal of Client Care, 1(1), 33–39. DOI: https://doi.org/10.15412/J.JCC.02010107.
Karlekar, S., & Bansal, M. (2018). Safecity: Understanding diverse forms of sexual harassment personal stories. In Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing (pp.2805–2811). Brussels, Belgium. Association for Computational Linguistics. DOI: https://doi.org/10.18653/v1/D18-1303.
Koon, T. H., & Yoong, D. (2013). Preying on lonely hearts: A systematic deconstruction of an internet romance scammer’s online lover persona. Journal of Modern Languages, 23(1), 28–40.
Kopp, C., Layton, R., Sillitoe, J., & Gondal, I. (2015). The role of love stories in romance scams: A qualitative analysis of fraudulent profiles. International Journal of Cyber Criminology, 9(2), 205–217. DOI:https://doi.org/10.5281/zenodo.56227.
Kopp, C., Sillitoe, J., Gondal, I., & Layton, R. (2016). ‘The Online Romance Scam: A Complex Two-Layer Scam’. Journal of Psychological and Educational Research, 2, 144–161.
Kozinets, R. (1998). On netnography: Initial reflections on consumer research investigations of cyberculture. In W. Joseph, Alba, J. Wesley Hutchinson, & Provo (Eds.), NA-Advances in Consumer Research (pp. 366–371). UT: Association for Consumer Research.
Kozinets, R. (2010). Netnography: Doing ethnographic research online. London, England: Sage.
Lea, S. E., Fischer, P., & Evans, K. M. (2009). The psychology of scams: Provoking and committing errors of judgement Office of Fair Trading, Retrieved November 10, 2021, from https://ore.exeter.ac.uk/repository/bitstream/handle/10871/20958/OfficeOfFairTrading%202009.pdf?sequence=1&isAllowed=y.
Luu, V., Land, L., & Chin, W. (2017). Safeguarding against romance scams–Using protection motivation theory. In Proceedings of the 25th European Conference on Information Systems (ECIS),Guimarães, Portugal, June 5-10, 2017 (pp. 2429-2444). ISBN 978-989-20-7655-3
Loewenstein, G. (1996). Out of control: Visceral influences on behavior. Organizational behavior and human decision processes, 65(3), 272–292. https://doi.org/10.1006/obhd.1996.0028.
Maimon, D., Howell, C. J., Moloney, M., & Park, Y. S. (2020). An examination of email fraudsters’ modus operandi. Crime & Delinquency. https://doi.org/10.1177/0011128720968504.
Marshall, J. (2018). Romance scam survivor: the whole sordid story. Sangam Enterprises Pty Ltd.
Martins, F. (2020). Feminist criminology and technopolitics: new frames for gender-based violence in Brazil. Oñati Socio-Legal Series, 10(1S), https://doi.org/10.35295/osls.iisl/0000-0000-0000-1154. 10S-37S.
Miyamoto, T. (2014). From Karuto or “Cult” to the Mainstream: The Reconstruction of Public Images by a Japanese Religious Group [Master Thesis: University of Alberta]. Retrieved January 5, 2022, from https://era.library.ualberta.ca/items/3520a47b-fdae-41f6-b866-d30a6c0e9077
McMahon, R., Bressler, M. S., & Bressler, L. (2016). New global cybercrime calls for high-tech cyber-cops. Journal of Legal Ethical and Regulatory Issues, 19(1), 26.
McMillan, S. J. (2000). The Microscope and the Moving Target: The challenge of applying content analysis for the World Wide Web. Journalism & Mass Communication Quarterly, 77(1), 80–98. https://doi.org/10.1177/107769900007700107.
Meier, R. F., Kennedy, L. W., & Sacco, V. F. (Eds.). (2001). Advances in Criminological TheoryThe process and structure of crime: Criminal events and crime analysis (9 vol.). New Brunswick, NJ: Transaction.
Milon-Flores, D. F., & Cordeiro, R. L. (2022). How to take advantage of behavioral features for the early detection of grooming in online conversations. Knowledge-Based Systems, 240(15), https://doi.org/10.1016/j.knosys.2021.108017.
Mitnick, K. D., & Simon, W. L. (2003). The art of deception: Controlling the human element of security. John Wiley & Sons.
Mitnick, K. D., & Simon, W. L. (2003). The art of deception: Controlling the human element of security. John Wiley & Sons.
Moser, A., & Korstjens, I. (2018). Series: Practical guidance to qualitative research. Part 3: Sampling, data collection and analysis. European Journal of General Practice, 24(1), 9–18. DOI: https://doi.org/10.1080/13814788.2017.1375091.
Ngejane, C. H., Mabuza-Hocquet, G., Eloff, J. H., & Lefophane, S. (2018, August). Mitigating online sexual grooming cybercrime on social media using machine learning: A desktop survey. In 2018 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD) (pp. 1–6). IEEE. DOI: https://doi.org/10.1109/ICABCD.2018.8465413
Peltier, T. R. (2006). Social engineering: Concepts and solutions. Information Security Journal, 15(5), 13–21. https://doi.org/10.1201/1086.1065898X/46353.15.4.20060901/95427.3.
Porter, E. (2014). A simple equation: More education= more income. The New York Times. Retrieved from https://www.relooney.com/NS3040/000_New_1599.pdf
Rebovich, D., & Corbo, L. (2021). The Distillation of National Crime Data into A Plan for Elderly Fraud Prevention: A Quantitative and Qualitative Analysis of US Postal Inspection Service Cases of Fraud against the Elderly. Victims & Offenders, 16(3), 407–430. https://doi.org/10.1080/15564886.2020.1865225.
Rege, A. (2009). What’s love got to do with it? Exploring online dating scams and identity. International Journal of Cyber Criminology, 3(2), 494–512.
Rentschler, C. A. (2014). Rape culture and the feminist politics of social media. Girlhood studies, 7(1), 65–82. https://doi.org/10.3167/ghs.2014.070106.
Rui, J., & Stefanone, M. A. (2013). Strategic Management of Other-Provided Information Online: Personality and Network Variables. System Sciences (HICSS), 2013 46th Hawaii International Conference on. DOI: https://doi.org/10.1109/HICSS.2013.500.
Rusch, J. J. (1999, June). The “social engineering” of internet fraud. In Internet Society Annual Conference, Retrieved from http://www.isoc.org/isoc/conferences/inet/99/proceedings/3 g/3g_2. htm.
Sacco, V. F., & Kennedy, L. (2002). The criminal event: Perspectives in space and time (2nd ed.). Belmont, CA: Wadsworth.
Sarriegi, J. M., & Gonzalez, J. J. (2008). Conceptualising social engineering attacks through system archetypes. International Journal of System of Systems Engineering, 1(1–2), 111–127. DOI: https://doi.org/10.1504/IJSSE.2008.018134.
Schlenker, B. R. (1980). Impression management (pp. 79–80). Monterey, CA: Brooks/Cole.
Schneider, D. J. (1981). Toward a Broader Conception. In T. Tedeschi, & J (Eds.), Impression management theory and social psychological research (1st ed., 23p. vol.). Academic Press.
Sorell, T., & Whitty, M. (2019). Online romance scams and victimhood. Security Journal, 32(3), 342-361.
Spradley, J. P. (1980). Participant observation. Fort Worth, TX: Holt, Rinehart& Winston.
Stemler, S. (2000). An overview of content analysis. Practical assessment research and evaluation, 7(1), 17. DOI: https://doi.org/10.7275/z6fm-2e34.
Teunisse, A. K., Case, T. I., Fitness, J., & Sweller, N. (2020). I should have known better: Development of a self-report measure of gullibility. Personality and Social Psychology Bulletin, 46(3), 408–423. https://doi.org/10.1177/0146167219858641.
Thennakoon, A., Bhagyani, C., Premadasa, S., Mihiranga, S., & Kuruwitaarachchi, N. (2019, January). Real-time credit card fraud detection using machine learning. In 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (pp. 488–493). IEEE.
Topalli, V., & Nikolovska, M. (2020). The future of crime: how crime exponentiation will change our field. The Criminologist, 45(3), 1–8.
Topalli, V., Dickinson, T., & Jacques, S. (2020). Learning from criminals: Active offender research for criminology. Annual Review of Criminology, 3(1), 189-215.
Topalli, V., Wright, R., & Fornango, R. (2002). Drug dealers, robbery and retaliation. Vulnerability, deterrence and the contagion of violence. British Journal of Criminology, 42(2), 337-351.
Whitty, M. (2018). Do you love me? Psychological characteristics of romance scam victims. Cyberpsychology Behaviour and Social Networking, 21(2), 105–109. https://doi.org/10.1089/cyber.2016.0729.
Whitty, M. T. (2013b). The scammers persuasive techniques model: Development of a stage model to explain the online dating romance scam. British Journal of Criminology, 53(4), 665–684. https://doi.org/10.1093/bjc/azt009.
Whitty, M. T. (2015). Anatomy of the online dating romance scam. Security Journal, 28(4), 443–455. DOI: https://doi.org/10.1057/sj.2012.57.
Whitty, M. T., & Buchanan, T. (2012b). The online romance scam: A serious cybercrime. CyberPsychology Behavior and Social Networking, 15(3), 181–183. DOI: https://doi.org/10.1089/cyber.2011.0352.
Whitty, M. T., & Buchanan, T. (2016). The online dating romance scam: The psychological impact on victims–both financial and non-financial. Criminology & Criminal Justice, 16(2), 176–194. https://doi.org/10.1177/1748895815603773.
Whitty, M. T., & Buchanan, T. (2012a). The Psychology of the Online Dating Romance Scam A report for the ESRC. Leicester, UK: University of Leicester. Retrieved November 3, 2021, from https://fido.nrk.no/d6f57fd73b9898b42c8c322c961c8255f370677fbac5272b71d86047a5359b66/Whitty_romance_scam_report.pdf
Yen, T. F., & Jakobsson, M. (2016). Case study: Romance scams. In M. Jakobsson (Ed.), Understanding Social Engineering Based Scams (1st ed., pp. 103–113). New York, NY: Springer.
Yin, R. K. (2015). Qualitative research from start to finish. Guilford publications.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Statement and Declarations
The authors did not receive support from any organization for the submitted work. All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Wang, F., Topalli, V. Understanding Romance Scammers Through the Lens of Their Victims: Qualitative Modeling of Risk and Protective Factors in the Online Context. Am J Crim Just 49, 145–181 (2024). https://doi.org/10.1007/s12103-022-09706-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12103-022-09706-4