FROM the SCAMMER PERSPECTIVE: PREDISPOSITIONS TOWARDS ONLINE FRAUD MOTIVATION and RATIONALIZATION by Subia Ansari
Total Page:16
File Type:pdf, Size:1020Kb
FROM THE SCAMMER PERSPECTIVE: PREDISPOSITIONS TOWARDS ONLINE FRAUD MOTIVATION AND RATIONALIZATION by Subia Ansari A Thesis Submitted to the Faculty of Purdue University In Partial Fulfillment of the Requirements for the degree of Master of Science Department of Computer and Information Technology West Lafayette, Indiana August 2020 THE PURDUE UNIVERSITY GRADUATE SCHOOL STATEMENT OF COMMITTEE APPROVAL Dr. Ida Ngambeki, Chair Department of Computer and Information Technology Dr. Kathryn Seigfried-Spellar Department of Computer and Information Technology Dr. John Springer Department of Computer and Information Technology Approved by: Dr. John Springer 2 Dedicated to my mother and my father. 3 ACKNOWLEDGMENTS First and foremost, I’d like to thank my mother and father for being a constant source of inspiration to me and for always believing in me. I could not have gotten here without your guidance and support. I will forever be grateful to you for the opportunities you have given. To my brothers thank you for being there and helping me relax when I was under pressure. To the rest of my family and friends, thank you for everything you have done to support me and help me follow my dreams. To Dr. Ida Ngambeki, thank you for your insight and support during this study. It was with your guidance and constant feedback that I was able to produce a study of this quality. You have inspired me in many ways, I have always been in awe of the amount of knowledge you have, and I have learnt a lot from you. I am extremely grateful that I had the opportunity to work with you. To Dr. Kathryn Seigfried-Spellar, thank you for helping me improve the quality of this study. The feedback and resources that you shared with me formed an essential part of this study. I’d also like to thank you for teaching me how to conduct statistical analyses, I am not scared of the results section in research papers anymore. To Dr. John Springer, thank you for your help in this project and for asking me to keep things simple. I will always remember that advice. 4 TABLE OF CONTENTS LIST OF TABLES .......................................................................................................................... 7 LIST OF FIGURES ........................................................................................................................ 8 ABSTRACT .................................................................................................................................. 10 CHAPTER 1. INTRODUCTION ................................................................................................. 11 1.1 Problem Statement.......................................................................................................... 11 1.2 Significance .................................................................................................................... 12 1.3 Scope .............................................................................................................................. 13 1.4 Research Design ............................................................................................................. 13 1.5 Assumptions ................................................................................................................... 14 1.6 Limitations ...................................................................................................................... 15 1.7 Delimitations .................................................................................................................. 15 1.8 Summary......................................................................................................................... 15 LITERATURE REVIEW ................................................................................... 16 2.1 Defining the Scope of Cybercrime ................................................................................. 16 2.2 Reviewing the Classification of Cybercrime .................................................................. 17 2.3 Identifying the Scope of Scams ...................................................................................... 19 2.4 Fraud Motivation Theories ............................................................................................. 22 2.4.1 Fraud Triangle Theory............................................................................................. 22 2.4.2 Fraud Diamond Theory and Further Extensions ..................................................... 23 2.4.3 Towards Mapping Fraud Theory to Cyber-Scammers ............................................ 25 2.5 Effects of Personality on Fraud Theory .......................................................................... 26 2.5.1 The Dark Triad ........................................................................................................ 26 2.5.2 Risk Perception: ...................................................................................................... 28 2.5.3 Spheres of control:................................................................................................... 28 2.6 Summary......................................................................................................................... 30 METHODS ......................................................................................................... 31 3.1 Research Design ............................................................................................................. 31 3.2 Sampling Method and Population .................................................................................. 32 3.3 Instruments and Scoring ................................................................................................. 33 5 3.3.1 Instrument for Fraud Theory ................................................................................... 33 3.3.2 Instrument for Dark Triad ....................................................................................... 33 3.3.3 Instrument for Spheres of Control ........................................................................... 34 3.3.4 Instrument for Perceived Risk ................................................................................. 34 3.3.5 Instrument to measure Computer Crime Index ....................................................... 34 3.4 Scale Reliability & Validation........................................................................................ 35 3.5 Analytical Strategy ......................................................................................................... 35 3.6 Summary......................................................................................................................... 36 RESULTS ........................................................................................................... 37 4.1 Participant Demographics .............................................................................................. 37 4.2 Data Cleaning ................................................................................................................. 37 4.3 Analytical Strategy ......................................................................................................... 39 4.4 Analysis Results ............................................................................................................. 39 4.5 Results Summary ............................................................................................................ 55 DISCUSSION AND FUTURE WORK ............................................................. 57 5.1 Discussion....................................................................................................................... 57 5.2 Future Work.................................................................................................................... 60 REFERENCES ............................................................................................................................. 62 APPENDIX A ............................................................................................................................... 71 APPENDIX B. .............................................................................................................................. 81 6 LIST OF TABLES Table 2.1. A two-level classification of cybercrime. ................................................................... 19 Table 4.1 Demographics for self-reported cyberscamming and non-cyberscamming ................ 38 Table 4.2 Correlation between demographics and variables of interest ...................................... 40 Table 4.3 Correlation between variables of interest .................................................................... 41 Table 4.4 Analysis Results of Hypothesis 1a................................................................................ 43 Table 4.5 Analysis Results of Hypothesis 1b ............................................................................... 44 Table 4.6 Analysis Results of Hypothesis 2a................................................................................ 45 Table 4.7 Analysis Results of Hypothesis 2b ............................................................................... 46 Table 4.8 Analysis Results of Hypothesis 2c................................................................................ 47 Table 4.9 Analysis Results of Hypothesis 3a................................................................................ 49 Table 4.10 Analysis Results of Hypothesis