Social Scams And Fraud: The Latest Threat

&NewLine;<p>Fraud-induced social isolation is a serious social problem that has gained prominence in the 21st century&period; <strong>Fraudsters<&sol;strong> use various communication platforms to target their victims&comma; who are mostly unaware of the tricks being played on them&period; The increasing number of <strong>social media<&sol;strong> users makes it easy for <em>frauds<&sol;em> to spread their schemes and gain access to personal information&period; <strong>Fraud<&sol;strong> is everywhere and you need to be aware of the dangers so you can avoid becoming a victim&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<div class&equals;"mh-content-ad"><script async src&equals;"https&colon;&sol;&sol;pagead2&period;googlesyndication&period;com&sol;pagead&sol;js&sol;adsbygoogle&period;js&quest;client&equals;ca-pub-9162800720558968"&NewLine; crossorigin&equals;"anonymous"><&sol;script>&NewLine;<ins class&equals;"adsbygoogle"&NewLine; style&equals;"display&colon;block&semi; text-align&colon;center&semi;"&NewLine; data-ad-layout&equals;"in-article"&NewLine; data-ad-format&equals;"fluid"&NewLine; data-ad-client&equals;"ca-pub-9162800720558968"&NewLine; data-ad-slot&equals;"1081854981"><&sol;ins>&NewLine;<script>&NewLine; &lpar;adsbygoogle &equals; window&period;adsbygoogle &vert;&vert; &lbrack;&rsqb;&rpar;&period;push&lpar;&lbrace;&rcub;&rpar;&semi;&NewLine;<&sol;script><&sol;div>&NewLine;<p><br>A <em>scammer<&sol;em> will contact you on <strong>social media<&sol;strong> and try to convince you that he or her is a victim too&period; He or she will tell you that a bank account was hacked and ask you to send money to recover the stolen money&period; Another common <strong>scam<&sol;strong> is when someone claims to represent your company and tells employees to misappropriate company funds&period; A third <a href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;tech-support-scams-types-and-tipes-to-avoid-them&sol;amp&sol;">type of social scam<&sol;a> involves someone pretending to be a family member or friend of someone in the military and asking for money to bail them out of jail&period; Anyone can fall for these schemes if they&&num;8217&semi;re not aware of how they work&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><br>Once an account has been hijacked&comma; a <em>social scammer<&sol;em> will often ask for money or personal information under false pretenses&period; For example&comma; he or she may claim that his computer was blocked from accessing the internet or that he was denied a debit card payment&period; The <strong>social scammer<&sol;strong> will then ask people to send him money or identifying information so he can bypass these problems&period; Someone posing as a <a class&equals;"wpil&lowbar;keyword&lowbar;link" href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;category&sol;military-scammer&sol;amp&sol;" title&equals;"military" data-wpil-keyword-link&equals;"linked" data-wpil-monitor-id&equals;"408">military<&sol;a> representative may also tell people that their loved ones are being detained in Southeast Asia and request money for their release&period; In addition&comma; someone claiming to be a police officer may contact people and ask for large amounts of cash in exchange for preventing an arrest&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><br>You should know that cons are usually based on false promises and patriotism&period; For example&colon; A con artist posing as a soldier may tell people he&&num;8217&semi;s been sent on a dangerous mission abroad&period; Alternatively&comma; someone claiming to be a police officer may tell people their relative has been arrested and asks them to send payment for his bail&period; Finally&comma; someone claiming to be an emergency worker may call people with phony fire alarm codes and say the building is on fire&period; He or she will then ask you to pay him money so he can put out the false alarm- before telling you it&&num;8217&semi;s actually an emergency situation&period;<br><&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>You need to be wary of all <a href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;30-types-of-scam-list-and-definitions&sol;amp&sol;">types<&sol;a> of social scams- even those that seem harmless at first glance&period; Being tricked into sharing personal information can compromise your safety and security&comma; causing irreparable damage to your reputation and wallet&period; Therefore&comma; it&&num;8217&semi;s essential that everyone know how these cons work so they can protect themselves against them&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Social engineers use psychological exploitation to manipulate people&&num;8217&semi;s vulnerabilities in order to emotionally attack them&period; This research looked at 100 phishing and 100 advance-fee-scam emails&comma; and examined the persuasive techniques utilized by social engineers for their own personal gain&period; It revealed that alert and account verification were employed by scammers as attention grabbers in phishing emails which were often given urgency through a threatening tone&period; Conversely&comma; timing wasn&&num;8217&semi;t seen as a top priority in advance-fee-emails&comma; with potential monetary gain being the key factor instead&semi; tempting victims with rewards such as business proposals and unclaimed funds&period; The findings demonstrate that perpetrators of social engineering use statements in positive and negative ways alongside authoritative and urgent persuasions to coerce innocent people into responding&period; Unfortunately&comma; it is highly unlikely that online fraud will ever be fully eradicated&semi; however&comma; the most effective way of mitigating these attacks is informing the public about potential threats from social engineers&period; This can only be done via education&comma; this requires authorities to allocate more staff and resources to investigate cybercrime whilst adequate legislation is sorely needed regarding online frauds&period; Ultimately though&comma; it seems that education is still the most effective approach when fending off online scams&period; Thus&comma; it is important social scientists continue delivering knowledge on&period;<br><&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Keywords&colon; <strong>Advance-Fee Scam<&sol;strong>&semi; <strong>Internet Fraud<&sol;strong>&semi; <strong>Online Fraud<&sol;strong>&semi; <strong>Phishing<&sol;strong>&semi; <strong>Social Engineering<&sol;strong><&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading" id&equals;"introduction">Introduction <&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>Recently&comma; scholars have studied online fraudulent activities in terms of social engineering &lpar;Blommaert &amp&semi; Omoniyi&comma; 2006&semi; Holt &amp&semi; Graves&comma; 2007&semi; Huang &amp&semi; Brockman&comma; 2011&semi; King &amp&semi; Thomas&comma; 2009&semi; Mann&comma; 2008&semi; Ross&comma; 2009&semi; Workman&comma; 2008&semi; Zook&comma; 2007&rpar;&period; In doing so they have concentrated on the exploitive nature of the deceptive communications used by social engineers to perpetrate their schemes&period; It has been assumed that people can be duped because they are either ignorant or naïve &lpar;King &amp&semi; Thomas&comma; 2008&rpar;&period; However this study aims to demonstrate that it is not necessarily this gullibility or lack of knowledge which enables successful frauds&period; It reveals instead that social engineers take advantage of human weaknesses to induce desired responses and procure privileged information via mailssent with an emotionally manipulative content&period; By disguising their requests as attractive offers these fraudsters manipulate victims into a vulnerable state&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>The severity of online fraud calls for an examination of the crime&period; According to the Consumer Sentinel &lpar;US Federal Trade Commission&comma; 2008&rpar;&comma; there was an increase in 2007 with 221&comma;226 complaints about Internet-related fraud compared to 205&comma;269 the year before&period; Email communication is a major factor in such crimes&semi; in 2008&comma; the Internet Crime Report &lpar;National White Collar Crime Center&comma; 2008&rpar; reported that email was employed in 74&percnt; of Internet frauds&period; The total dollar loss in 2009 totaled &dollar;559&period;7 million &&num;8211&semi; drastically increasing from &dollar;295&period;1 million from the previous year and the average cost per loss being &dollar;575 with some victims facing up to &dollar;1500 stolen by advance-fee scams &lpar;The Internet Crime Complaint Center&comma; 2009&rpar;&period; Even more alarming are the emotional repercussions when becoming a victim of computer fraud&comma; sometimes leading to disorders such as post traumatic stress disorder &lpar;Carey&comma; 2009&rpar;&period; The US Federal Trade Commission reported that 31&percnt; of identity theft victims had credit cards taken out in their name&comma; requiring 40 hours or more to clear up matters like harassment by creditors &lpar;48&percnt;&rpar;&comma; <a class&equals;"wpil&lowbar;keyword&lowbar;link" href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;category&sol;loans&sol;amp&sol;" title&equals;"loan" data-wpil-keyword-link&equals;"linked" data-wpil-monitor-id&equals;"319">loan<&sol;a> rejections &lpar;25&percnt;&rpar; and criminal investigations &lpar;12&percnt;&rpar;&period; According to data retrieved from the Internet Crime Complaint Center&comma; the median loss filed per victim was the highest among check fraud &lpar;&dollar;3000&rpar;&comma; confidence fraud &lpar;&dollar;2000&rpar; and Nigerian advance-fee fraud &lpar;&dollar;1650&rpar;&period; In one rare and extreme case&comma; a British man committed suicide when victimized by an Internet moneylaundering scam &lpar;BBC News&comma; 2004&rpar;&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading" id&equals;"the-social-engineering-perspective">The Social Engineering Perspective <&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<figure class&equals;"wp-block-image size-full"><img src&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;wp-content&sol;uploads&sol;2023&sol;05&sol;Social-Engineering-Perspective-&period;jpg" alt&equals;"Social Engineering" class&equals;"wp-image-90285"&sol;><&sol;figure>&NewLine;&NewLine;&NewLine;&NewLine;<p><&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p class&equals;"has-text-align-left">The most direct discussions on social engineering can be found in applied psychology &lpar;Long&comma; 2008&semi; Mann&comma; 2008&semi; Raman&comma; 2008&semi; Thompson&comma; 2006&semi; Workman&comma; 2008&rpar;&period; The term &OpenCurlyDoubleQuote;social engineering” involves a process of deceiving people into giving away confidential information&period; Social engineers run a type of &OpenCurlyDoubleQuote;con game” to scam people&period; Social engineers are individuals who intentionally mislead and manipulate people for personal benefit &lpar;Huang &amp&semi; Brockman&comma; 2011&rpar;&period; Mann &lpar;2008&rpar; defines social engineering as &OpenCurlyDoubleQuote;to manipulate people&comma; by deception into giving out information&comma; or performing an action” &lpar;p&period; 3&rpar;&period; A number of tactics are employed by the social engineer to impact the emotional state of the victim&comma; consequently influencing their willingness to disclose personal information &lpar;Workman&comma; 2008&rpar;&period; Social engineering attacks can occur at the corporate or individual level&period; By use of deception&comma; social engineers obtain personal information&comma; commit fraud&comma; or gain computer access &lpar;Thompson&comma; 2006&rpar;&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Gaining access to or control over an information system is not the only goal of a social engineering attack&period; Other goals may include obtaining money or other valuable items&comma; such as <a class&equals;"wpil&lowbar;keyword&lowbar;link" href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;tag&sol;financial-fraud&sol;amp&sol;" title&equals;"financial" data-wpil-keyword-link&equals;"linked" data-wpil-monitor-id&equals;"980">financial<&sol;a> records&period; A social engineer depends heavily on his or her ability to establish a trusting relationship with the target &lpar;Mitnick &amp&semi; Simon&comma; 2002&semi; Thompson&comma; 2006&rpar;&period; Social engineering attacks occur at both the physical and psychological levels&period; The most common places where social engineers look for unauthorized information and access and work toward a psychological attack include the workplace&comma; telephone&comma; trash cans&comma; and the Internet&period; Psychological attacks focus on persuasion&comma; imitation&comma; ingratiation&comma; conformity&comma; and friendliness &lpar;Workman&comma; 2008&rpar;&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Social engineers rely on cognitive distortions or errors in the thought process to initiate and execute their attacks &lpar;Raman&comma; 2008&rpar; and elicit automatic emotional responses from their victims&period; Cognitive biases include choice supportive bias&comma; exposure effect&comma; and&sol;or anchoring &lpar;Raman&comma; 2008&rpar;&period; Choice supportive bias occurs when a person tends to remember past experiences positively rather than negatively &lpar;Mather&comma; Shafir&comma; &amp&semi; Johnson&comma; 2000&rpar;&period; For example&comma; a person purchasing items on eBay may inadvertently enter his or her credit card information on a fraudulent website posing as eBay and claiming not to have received payment for an item purchased&period; Confirmation bias states that people gather and interpret information in a way that confirms their beliefs &lpar;Nickerson&comma; 1998&rpar;&period; For example&comma; if employees regularly see supervisors wearing certain uniforms&comma; they will not be alarmed if an imposter wears the same uniform&period; Therefore&comma; the social engineer can gain access without having to identify himself&period; The exposure effect states that people like things and people that are familiar to them &lpar;Zajonc&comma; 1968&rpar;&period; For example&comma; someone who is active in online social networks is more likely to visit a malicious website that purports to offer an &&num;8220&semi;online dating service&&num;8221&semi; Anchoring means that a person focuses on identifying a salient feature &lpar;Tversky &amp&semi; Kahneman&comma; 1974&rpar;&period; For example&comma; fraudulent websites that display identical logos of actual banks can deceive visitors&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Social engineers rely on cognitive distortions or errors in the thought process to initiate and execute their attacks &lpar;Raman&comma; 2008&rpar; and elicit automatic emotional responses from their victims&period; Cognitive biases include choice supportive bias&comma; exposure effect&comma; and&sol;or anchoring &lpar;Raman&comma; 2008&rpar;&period; Choice supportive bias occurs when a person tends to remember past experiences positively rather than negatively &lpar;Mather&comma; Shafir&comma; &amp&semi; Johnson&comma; 2000&rpar;&period; For example&comma; a person purchasing items on eBay may inadvertently enter his or her credit card information on a fraudulent website posing as eBay and claiming not to have received payment for an item purchased&period; Confirmation bias states that people gather and interpret information in a way that confirms their beliefs &lpar;Nickerson&comma; 1998&rpar;&period; For example&comma; if employees regularly see supervisors wearing certain uniforms&comma; they will not be alarmed if an imposter wears the same uniform&period; Therefore&comma; the social engineer can gain access without having to identify himself&period; The exposure effect states that people like things and people that are familiar to them &lpar;Zajonc&comma; 1968&rpar;&period; For example&comma; someone who is active in online social networks is more likely to visit a malicious website that purports to offer an &&num;8220&semi;online dating service&&num;8221&semi; Anchoring means that a person focuses on identifying a salient feature &lpar;Tversky &amp&semi; Kahneman&comma; 1974&rpar;&period; For example&comma; fraudulent websites that display identical logos of actual banks can deceive visitors&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Some common social fallacies may arise from the fundamental attribution error&comma; the salience effect&comma; and the constraint of conformity&comma; compliance&comma; and adherence&period; The fundamental attribution error states that individuals assume the behaviors of others and directly reflect enduring characteristics that define the person &lpar;Gilbert &amp&semi; Malone&comma; 1995&rpar;&period; Therefore&comma; social engineers attempt to make a positive first impression to gain their victim&&num;8217&semi;s trust&period; However&comma; Huang and Brockman &lpar;2011&rpar; have also shown that social engineers have used persuasive statements in positive or negative tones-or both-to attack online users&period; The salience effect states that a person who stands out the most in a group has the least influence &lpar;Taylor &amp&semi; Fiske&comma; 1975&rpar;&period; For this reason&comma; social engineers are experts at conforming to their environment&period; The pressures of conformity&comma; compliance&comma; and obedience cause people to change their behavior &lpar;Raman&comma; 2008&rpar;&period; Social engineers have learned to predict responses to these pressures&period; Through the use of authority and manipulation&comma; a social engineer can pretend to be a leader and trick an employee into revealing important information without revealing themselves&period;<&sol;p>&NewLine;&NewLine;&NewLine;<h3>Categories of Social Engineering<&sol;h3>&NewLine;&NewLine;&NewLine;<p>Social engineering can be divided into two distinct categories&colon; computer-based deception and human interaction-based deception&period; In both methods&comma; the social engineer conducts some sort of background research on his target before carrying out an attack&period; An example of this is entering a company&&num;8217&semi;s premises and reading names off the information board&period; These boards usually contain helpful information&comma; including the names of departments and sometimes the names of department heads&period; Another method of background research is &&num;8220&semi;dumpster diving&comma;&&num;8221&semi; which simply involves going to the target organization&&num;8217&semi;s dumpsters and analyzing the contents&period; When people and organizations do not think too much about what they throw in the trash&comma; the contents of their dumpsters can prove valuable to a social engineer&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>In the computer-assisted method of deception&comma; the social engineer relies on technology to trick the victim into providing the information needed to achieve the goal&period; This can be done&comma; for example&comma; through the use of fake pop-ups that trick victims into thinking they need to divulge passwords in order to stay connected to the company&&num;8217&semi;s computer network&period; The authorization information is then forwarded to the social engineer&comma; who can use this information to gain access to the corporate network &lpar;Gulati&comma; 2003&rpar;&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>The human interaction based approach of social engineering is primarily based on deception through human interaction&period; The attack becomes successful by exploiting the victim&&num;8217&semi;s natural human inclination to be helpful and popular &lpar;Gulati&comma; 2003&rpar;&period; This can be done through various forms of impersonation&period; For example&comma; the social engineer may impersonate a technician&comma; IT support staff&comma; colleague&comma; manager&comma; or trusted third party to gain the victim&&num;8217&semi;s trust and thus gain unauthorized access to the desired information&period;<&sol;p>&NewLine;&NewLine;&NewLine;<h3>Types of Social Engineering Attacks<&sol;h3>&NewLine;&NewLine;&NewLine;<p>The variation and scope of social engineering attacks are limited only by the creativity of the hacker &lpar;Manske&comma; 2000&rpar;&period; These attacks prove effective because they target the most vulnerable link of any organization&comma; its employees&period; Social engineering attacks have the potential to bypass the best technical security measures and expose an organization&&num;8217&semi;s critical information&period; There are numerous types of social engineering attacks&semi; some of which include Trojan emails and phishing messages&comma; advance fee fraud&comma; impersonation&comma; persuasion&comma; bribery&comma; shoulder surfing&comma; and dumpster diving&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Trojan emails and phishing messages are two of the most common examples of social engineering attacks&period;<br>These are technical attacks&comma; but rely on strategically constructed messages to trick victims into opening attachments or clicking on embedded hyperlinks&period; This makes these classic examples supporting technical exploits a very common feature of many social engineering attacks&period; According to Manske &lpar;2000&rpar;&comma; these attacks serve as a stepping stone to the attacker&&num;8217&semi;s real goal&comma; which may be&comma; for example&comma; complete control over a company&&num;8217&semi;s network servers&period; Phishing emails or Trojan attacks can be used to collect private information or system credentials&comma; or possibly compromise the security of the user&&num;8217&semi;s operating system by installing malicious software that gives the attacker full access to the system&period; In 2007&comma; phishing attacks were responsible for more than a quarter of all reported computer crimes &lpar;Richardson&comma; 2007&rpar;&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Another common technique used by social engineers is the use of fake credentials&period; This can be a simple trick of printing fake business cards or a more sophisticated tactic of creating fake ID cards or security badges&period;<br>Thank you to modern technology&comma; it is now easy to create hard-to-detect duplicates of ID cards&period; For this reason&comma; attackers do not always have to create the most realistic fake IDs because they are able to sell a good story to go with it&period; According to Applegate &lpar;2009&rpar;&comma; during a vulnerability assessment&comma; an attacker created a very simple green plastic card ID with a commonly known recycling symbol&period; When company security personnel searched the dumpsters&comma; the attacker posed as a recycling coordinator conducting a compliance check&period; The attacker claimed that management was facing a large fine because the company was not sorting its recyclable waste &lpar;Applegate&comma; 2009&rpar;&period; Because of this simple trick&comma; the company&&num;8217&semi;s supervisors personally ensured that all paper products were set aside for the remainder of the audit&period; Each day&comma; the social engineer returned to collect the presorted paper products and calmly search through them for valuable information&period; The attacker was so successful with this scam that he was given a tour of the company during the week and could come and go as he pleased after the employees got used to seeing him every day&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Social engineers can use a variety of techniques to impersonate a person&period; Attackers often conduct impersonation attacks by calling employees of the targeted company and pretending to be employees of another department&comma; reporters&comma; or even students conducting research&period; Social engineers even conduct attacks in person&comma; using fake credentials or a good story to infiltrate a selected company and bypass security&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Other techniques commonly used by social engineers are persuasion attacks&period; In persuasion attacks&comma; the social engineer gets a person to divulge important information or otherwise assist in the attack&period; Often&comma; the victim is made to believe that the attacker is doing them a favor in some way&period; The victim then feels obligated to help the attacker&comma; even if it violates company policy&period; In a variation of this attack&comma; the social engineer uses persuasion techniques to get the employee to bypass company procedures in order to speed up the process or bypass the problem altogether&period;<&sol;p>&NewLine;&NewLine;&NewLine;<h2>Types of Online Fraud<&sol;h2>&NewLine;<p> <&sol;p>&NewLine;&NewLine;&NewLine;<p>Some of the more common forms of online fraud are credit card fraud&comma; <a href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;income-asset-fraud-the-latest-schemes-and-how-to-protect-yourself&sol;amp&sol;" data-wpil-monitor-id&equals;"1079">identity theft fraud<&sol;a>&comma; web and e-mail spoofing &lpar;referred to as phishing&rpar;&comma; IM spimming &lpar;similar to spoofing&comma; but involving the use of instant messaging&rpar;&comma; high-tech disaster fraud&comma; and online hoaxes &lpar;referred to as advance-fee fraud&rpar; &lpar;Harley &amp&semi; Lee&comma; 2007&semi; McQuade&comma; 2006&rpar;&period; While considerable time could be spent on each form of fraud&comma; the current work primarily focuses on web and e-mail spoofing &lpar;phishing&rpar; and online hoaxes &lpar;advance-fee fraud&rpar;&comma; since these are two of the most well-known and recognizable scams involving a variety of deceptive techniques exploited in online communications&period; <&sol;p>&NewLine;&NewLine;&NewLine;<h3>Phishing<&sol;h3>&NewLine;&NewLine;&NewLine;<p>Phishing is a growing area of Internet fraud with the number of victims on the rise&period; In 2007&comma; the number of US adults who reported receiving phishing e-mails was 124 million&comma; up from 109 million in 2005 &lpar;Litan&comma; 2007&rpar;&period; According to Jakobsson and Meyers &lpar;2007&colon; p&period; 1&rpar;&comma; phishing is a form of social engineering in which the attacker &lpar;or phisher&rpar; fraudulently retrieves confidential or sensitive information by imitating a trustworthy or public organization&period; Phishing&comma; sometimes called brand spoofing&comma; involves the use of e-mails that originate from businesses with which targeted victims have been&comma; or are currently associated&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>In the past few years there has been an alarming trend both in the increase and complexity of phishing attacks&period; Some of the most common businesses and industries associated with phishing include banks&comma; online businesses &lpar;e&period;g&period;&comma; eBay and PayPal&rpar;&comma; and online service providers &lpar;e&period;g&period;&comma; Yahoo and AOL&rpar;&period; Unsuspecting victims receive e-mails that appear to be from these entities&comma; usually suggesting suspicious activity regarding the account and requesting personal information &lpar;e&period;g&period;&comma; personal identification numbers&comma; credit card numbers&comma; and social security numbers&rpar;&period; The phisher ultimately seeks to use the victim’s personal information for individual gain &lpar;Larcom &amp&semi; Elbirt&comma; 2006&rpar;&period; The e-mails convince up to 20 percent of recipients to respond to them&comma; sometimes leading to financial losses&comma; identity theft&comma; and other forms of fraud &lpar;Kay&comma; 2004&rpar;&period; Association with certain types of &OpenCurlyDoubleQuote;brands” is an effective technique that allows scammers to steal information directly or be able to use social engineering to persuade users to disclose financial information &lpar;James&comma; 2005&semi; Harley &amp&semi; Lee&comma; 2009&rpar;&period;<&sol;p>&NewLine;&NewLine;&NewLine;<h3>Phishing Operations<&sol;h3>&NewLine;&NewLine;&NewLine;<p>Two basic methods are commonly employed by phishers to steal valuable personal identification &lpar;APWG&comma; n&period;d&period;&rpar;&period; The first method is the technical artifice method&comma; which involves infecting personal computers with malicious software&period; This software is capable of recording keystrokes entered by the user&comma; and sending that information to the phisher&period; This software can also redirect Internet users from legitimate websites to false ones via a remote connection&period; The next method that phishers employ is social engineering&comma; which&comma; is defined by Yoo &lpar;2006&rpar; as &OpenCurlyDoubleQuote;gaining intelligence through deception or also as using human relationships to attain a goal” &lpar;p&period; 8&rpar;&period; Phishers using social engineering techniques employ deceptive devices to trick Internet users into a situation where they are willing to disclose sensitive information&period; Usually&comma; the social engineering methods launch a false e-mail urging the receiver to click on a linked website appearing to come from a genuine business&period; After clicking the link&comma; the user is actually brought to a fraudulent site asking for personal financial information such as credit card or bank account numbers&period; Phishers then use the records they obtained to swindle money from the credit card or bank account&comma; or even apply for a new credit card with a false identity&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Phishing tactics and targets vary in social engineering applications&period; While some simpler e-mails contain fill-in forms&comma; other more complex ones direct victims through a variety of synthetic websites&period; As phishing is performed mostly for financial reasons&comma; the most commonly attacked sector in 2009 was financial services&comma; which accounted for 74&percnt; of reported phishing activity for that year &lpar;Symantec Corporation&comma; 2009&rpar;&period; The next most active area of phishing was the Internet service provider&comma; at 9&percnt;&period; Although fraudsters are not as likely to produce monetary gains in this area&comma; it is likely that they are able to use the stolen information and accounts to further their phishing activities&comma; such as sending mass e-mails through the stolen accounts&period; The third most lucrative segment for phishers is retail&comma; accounting for 6&percnt; of phishing attacks&period; Phishers attempt to purchase goods online and request that the items be shipped to a location which the phisher has access to&period; The Symantec study &lpar;2009&rpar; revealed that the difference between financial scams &lpar;74&percnt;&rpar; and all other areas &lpar;26&percnt;&rpar; lies in the relative ease and immediate financial reward for successful deception&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>One common feature that phishing e-mail messages attempted to do is to imitate a creditable entity&period; Some fraudsters use tricks to make their e-mails seem more legitimate&period; These tricks include the use of company logos&comma; hyperlinks to the home page of the company&comma; false return addresses&period; The next step in the phishing process is to create a message that requires the recipient to take a specific action&comma; such as replying to the phishing e-mail&comma; completing a form provided by the e-mail&comma; or clicking on a guided link&period; The content within the messages vary&comma; with the most common form claiming to require information for account verification or security upgrade&period; Because fraudulent websites and e-mail messages are detected quickly and subsequently blocked&comma; the messages are typically written to instill a sense of urgency in the reader&period; Criminals push for their victims to respond immediately by threatening termination of the account if a reply is not received promptly &lpar;MailFrontier&comma; 2004&rpar;&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>After the users have clicked the fake link and entered into the spoofed site&comma; it is essential that the web pages appear authentic to the user&period; The deceptive online features used by phishers include company logos and slogans&comma; page layouts&comma; fonts&comma; and color schemes &lpar;MailFrontier&comma; 2004&rpar;&period; Many online phishers are not only effective in replicating the graphic look of legitimate websites&comma; but also in adding some of the indicators users typically look for a website’s security and authenticity&period; These include the use of a safety padlock in a menu bar&comma; an https device in the URL&comma; and a &OpenCurlyDoubleQuote;TRUST-e” symbol &lpar;University of Houston&comma; 2005&rpar;&period; In earlier days&comma; one could examine a website’s URL and be more confident of detecting a counterfeit site&semi; since early phishers used domain names that were only similar to the valid company they were spoofing&period; Today’s fraudsters&comma; however&comma; can make the company’s actual domain name visible&comma; such as www&period;ebay&period;com&comma; but when the user clicks on the hyperlink it really directs them to the phisher’s website&period; <&sol;p>&NewLine;&NewLine;&NewLine;<h2>Advance-Fee Fraud<&sol;h2>&NewLine;<p><img class&equals;"aligncenter size-large wp-image-90286" src&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;wp-content&sol;uploads&sol;2023&sol;05&sol;Advance-Fee-Fraud-1024x682&period;jpg" alt&equals;"Advance-Fee " width&equals;"1024" height&equals;"682" &sol;><&sol;p>&NewLine;&NewLine;&NewLine;<p>As it has been demonstrated criminals use the Internet to commit all types of fraud&semi; however&comma; the largest dollar losses are attributed to advance-fee fraud e-mail messages&period; These messages are sent from individuals claiming to need assistance moving a large sum of money out of their country&period; Receivers of these messages who respond often become victims of fraud and identity theft&period; There has been a large amount of criminological research that has explored the prevalence and incidence of fraud&comma; where criminals gain property or money from victims through deception or cheating&period; Most fraud involves some type of interaction between the victim and the offender&comma; either through face-to-face meetings&comma; or telephone-based exchanges &lpar;Holt &amp&semi; Graves&comma; 2007&rpar;&period; As individuals around the world have increasingly become dependent on the Internet&comma; criminals have begun to use it as a means to commit fraud &lpar;Wall&comma; 2001&rpar;&period; <&sol;p>&NewLine;&NewLine;&NewLine;<h3> Advance-Fee Fraud Operations <&sol;h3>&NewLine;&NewLine;&NewLine;<p>Advance-fee fraud gets its name because these schemes require the victim to pay the scammer in advance with the promise of receiving rewards later&period; This scam is neither the most costly nor frequent Internet crime&semi; however&comma; it remains to be the most ubiquitous and well-known of all cyber-crimes&period; Nigeria 419 scams are a very common type of advance-fee fraud where scammers generally claim to be from Nigeria and execute a variety of deceptive schemes that require victims to front money &lpar;Microsoft&comma; 2009&rpar;&period; Scams like the Nigeria 419 scam are frequently carried out from areas such as local cyber cafes&comma; which have become the target of more recent raids from Nigeria’s Economic and Financial Crimes Commission &lpar;Lilly&comma; 2009&rpar;&period; Nonetheless&comma; Internet scammers often remain undeterred by law enforcements efforts &lpar;Goodman &amp&semi; Brenner&comma; 2002&rpar;&period; The circumstances in Nigeria illustrate the conditions created by lenient laws and enforcement concerning the Internet&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Advance-fee fraud initially appeared as handwritten letters in postal mail or faxes in the 1980s &lpar;United States Department of State&comma; 1997&rpar;&period; These scams began to spread via e-mail in the early 1990s as individuals began adopting e-mail technology&period; In the past decade&comma; advance-fee schemes have been labeled as spam&comma; or unsolicited bulk e-mails with multiple messages that offer illicit or counterfeit services and information &lpar;Wall&comma; 2004&rpar;&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Although there may be individuals who act alone to initiate contact and solicit information&comma; the scammers generally work in small teams with a specialized division of labor&period; Nigerian scammers are different than con artists who hope for a quick score by taking their gain in a single transaction—known as a short con&period; Nigerian scammers work on a long con&comma; one designed to play out over time and gradually drain a victim’s assets&period; Contrary to public perceptions&comma; the goal of most Nigerian advance-fee fraud scams is not to simply empty a bank account by immediately obtaining financial information as some other scams do&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Rather than obtaining a quick score&comma; the scammers intend to draw increasingly large sums from the victim&comma; who is manipulated into looking for additional sources to supply them&period; The relationship between the scammer and the victim can drag out for months&comma; and the transformation can be complex &lpar;NExT&comma; 2007&rpar;&period; The US Secret Service &lpar;n&period;d&period;&rpar; adds that&comma; if carried to the conclusion&comma; the victim often will be enticed to come to Nigeria for the final financial coup de grace<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Advance-fee scams have many variants&comma; but they all share the same essential characteristics&period; First&comma; a large sum of money will become available because of some tragic event&period; Most of the time the event will be very specific&comma; such as a plane crash&comma; major catastrophe &lpar;World Trade Center in 2001 or the Earthquake in Haiti 2010&rpar;&comma; an auto accident&comma; political conflict&comma; or a fatal disease&period; Usually they will include legitimate names of the wealthy victim&period; This allows the scammer to provide a URL link to a legitimate source that confirms both the accident and the actual death&comma; providing credibility&period; Second&comma; the scammer reports that the money remains unclaimed and provides reasons why swiftness is needed in order to claim it&comma; and secrecy needs to be maintained to protect the project<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Third&comma; a reason for the need to rush the transfer&comma; usually because of political conflict or a looming deadline in which the money will be given back to the bank or government&comma; adds a sense of urgency to the transaction&period; Fourth&comma; the scammer always implies that the transaction needs help from a foreigner in order to evade laws&comma; or outsmart others who are also after the funds&comma; or to avoid leaking that the fortune exists&period; This is done to emphasize the compelling requirement of secrecy&period; Finally&comma; the direct attempt to establish direct personal contact between the scammer and the recipient comes&period; Occasionally&comma; this may be a direct request for information&comma; including personal details and bank account number and bank’s routing number&period; However&comma; in most variations&comma; the scammer initially requests only a reply&comma; which can lead to extended email exchange or phone calls &lpar;Sturgeon&comma; 2003&rpar;&period; In some circumstances&comma; the e-mail will include attachments containing pictures or other information to improve credibility&period; However&comma; the attachments may also contain malware that includes spyware or worms capable of extracting the recipient’s e-mail address book or allowing the users’ PC to be used to relay further e-mails through a legitimate system&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Given the unlikely scenarios&comma; it might seem implausible that any Internet users&comma; most likely people with some sophistication and basic literacy skills&comma; would fall victim to the scams&period; At least with increasing visibility and awareness of the scam&comma; it would seem that&comma; the prevalence of victimization would decrease&period; Nevertheless&comma; victimization continues to increase<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>The Internet has greatly expanded the pool of potential victims while reducing the costs of committing fraud&period; These and other factors have resulted in deceptive e-mails being sent out to an estimated 10 million-plus recipients worldwide daily&comma; which is a very conservative estimate &lpar;King &amp&semi; Thomas&comma; 2008&rpar;&period; Scammers send out large numbers of e-mails in order to capture the relatively small number of respondents who are attentive to the persuasions embodied in the e-mails&period; The investigation below attempts to address what deceptive techniques have been used in scam e-mails&period; Generally when studying crime&comma; researchers will focus on the motivations of the offender&period; Instead of focusing on motivations&comma; this study investigates the persuasive techniques that drive victims to fall for the online fraudsters’ scams&period; <&sol;p>&NewLine;&NewLine;&NewLine;<h2>Methodology<&sol;h2>&NewLine;<p><img class&equals;"aligncenter size-large wp-image-90287" src&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;wp-content&sol;uploads&sol;2023&sol;05&sol;advance-fee-emails-1024x555&period;jpg" alt&equals;"Advance-Fee" width&equals;"1024" height&equals;"555" &sol;><&sol;p>&NewLine;<p> <&sol;p>&NewLine;&NewLine;&NewLine;<p>To examine the deceptive operations and techniques used in phishing and advance-fee e-mails&comma; the study has collected a sample of 200 fraudulent e-mails related to the two types of scam&period; These e-mails were gathered from a data archive maintained by an anti-phishing site&comma; MillerSmiles&comma; in Great Britain&comma; and also from the inbox of the researchers&period; A total of 100 phishing e-mails were gathered from the MillerSmiles site&comma; and another 100 advance-fee e-mails were gathered collectively from the MillerSmiles site&comma; as well as the researcher’s mail inboxes&period; No overlap in the collected data existed between the two sets of e-mails&period; The archived e-mails were used to increase the number and diversity of the sample e-mails<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>The 100 phishing e-mails were strategically gathered from the MillerSmiles site&period; The MillerSmiles site offers an alphabetical listing of company names&period; At the bottom of the homepage they offer a list of top targets by scams&period; From here&comma; the top three targets were selected &lpar;PayPal&comma; eBay&comma; HSBC bank&rpar; and to have one main banking institution from the United States and the UK&comma; Bank of America and Abbey bank were chosen&period; In order to gather 100 e-mails&comma; 20 were collected from each institution&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>For each of the five institutions&comma; e-mails were selected between 6&sol;08&sol;2010 &lpar;the day that the e-mail extractions began&rpar; and 6&sol;08&sol;2009 &lpar;retrospective to the previous 12 months&rpar;&period; The MillerSmiles site offers a collection of 300 e-mails for each institution&period; All e-mails between the aforementioned dates were printed and then numbered&comma; selecting every 5th e-mail for the sample&period; If any e-mail was repetitive or used any language other than English a rotation would be skipped &lpar;e&period;g&period; if e-mail 5 is the same as e-mail 1&comma; e-mail 5 is skipped and e-mail 10 is the next to be chosen&rpar; until 20 e-mails were reached for a chosen institution&period; Once 20 e-mails were selected for each institution&comma; the e-mails were printed and coded based on the codebook created for this study&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Another 100 e-mails for advance-fee frauds were gathered from the inboxes of the researchers as well as the MillerSmiles website&period; Due to the low number of advance-fee e-mails on the MillerSmiles site&comma; only 15 e-mails were gathered&comma; with the other 85 e-mails coming from the researchers’ inboxes&period; The selection criteria and process for the previously mentioned 85 e-mails were consistent with that of prior studies &lpar;Blommaert &amp&semi; Omoniyi&comma; 2006&semi; Ross&comma; 2009&semi; Huang &amp&semi; Brockman&comma; 2011&rpar;&period; The criteria were the e-mails had to be written in English despite grammatical errors or typos found in the text&semi; they had to appear to be full letters&comma; showing an e-mail address&comma; subject line&comma; salutation&comma; body text&comma; and closing&semi; and they had to reflect the sender’s control of funds&comma; power of monetary distribution&comma; and knowledge of scheme procedures&period; Spamming e-mails that did not fit into solicitations for personal privileged information or monetary funds were excluded&period; For example&comma; these exclusions included e-mails promoting low home <a class&equals;"wpil&lowbar;keyword&lowbar;link" href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;category&sol;mortgage&sol;amp&sol;" title&equals;"mortgage" data-wpil-keyword-link&equals;"linked" data-wpil-monitor-id&equals;"143">mortgage<&sol;a> rates&comma; brandname products at extremely low prices&comma; online dating&comma; online drugs&comma; sex enhancement pills&comma; and x-rated entertainment&period; <&sol;p>&NewLine;&NewLine;&NewLine;<h3> Measuring Triggers and Persuasions <&sol;h3>&NewLine;&NewLine;&NewLine;<p>Each of the 100 phishing e-mails were read and coded based on triggers&period; Triggers can be defined as the main reason or subject of the deceptive e-mail&period; In phishing mails&comma; these triggers can be an account update&comma; account verification&comma; account suspendsion&sol;disabled&sol;frozen etc&period; Triggers for the 100 advance-fee emails were coded based on incentives&period; Incentives are classified into five types according to the e-mail content&colon; Nigeria 419 funds&comma; lottery winning&comma; working at home&comma; job offer&comma; and business proposal&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Eight types of persuasive techniques were applied to the 200 e-mails&period; These techniques were authority&comma; urgency&comma; tradition&comma; fear&sol;threat&comma; attraction&sol;excitement&comma; pity&comma; politeness&comma; and formality&period; Definitions of these persuasions are based on Capaldi &lpar;1971&rpar;&comma; Huang and Brockman &lpar;2011&rpar;&comma; and Ross &lpar;2009&rpar;&period; After coding the e-mails&comma; the collected data were entered into Microsoft Excel and then transferred into SPSS&period; Definitions of the persuasions are provided below&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<ol class&equals;"wp-block-list">&NewLine;<li> Authority&colon; Persuasive statements used to create legitimacy&comma; trust&comma; and credibility&period; Institutional markers such as affiliations and professional titles are included&semi; <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li>Pity&colon; Refers to sympathy and charity expressed in the messages&semi; <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li>Tradition&colon; An appeal to ideal values such as honor and legacy commonly recognized by the public&semi; <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li>Attraction&colon; An incentive which can draw excitement or a sense of subversive joy&period; Examples of attraction include huge cash prizes&comma; easy job offers&comma; or opportunities for profits&semi; <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li>Urgency&colon; A stress on the exigency of the situation&period; Urgent statements are used to stress the requirement to respond promptly to receive the offer or award&period; They can also be stated in a negative tone&comma; such as threat to disable account if a request is not fulfilled in time&semi; <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li>Fear&sol;threat&colon; Used to intimidate the reader&period; Examples of fear&sol;threat include&semi; threat to delete account&comma; freeze account&comma; or suspend account&semi; <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li>Politeness&colon; Used to construct the author as a real human being&period; Examples of politeness would be the use of please&comma; thank you&comma; etc&period;&semi; <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li>Formality&colon; Professional terms used to convince the reader that the letter is legitimate and safe&period; Examples of formality include the use of confidentiality&comma; safety&comma; etc&period;<&sol;li>&NewLine;<&sol;ol>&NewLine;&NewLine;&NewLine;&NewLine;<p>Social engineers take advantage of all elements of the emails they send&period; One need not to read the body of the e-mail to see the persuasive phrases social engineers use&period; Often the subject line&comma; the title of the e-mail which highlights the main concern&comma; contains such words as alert&comma; warning&comma; attention&comma; and update followed by exclamation points to strike fear in the reader&period; Sometimes&comma; social engineers use friendly salutations &lpar;e&period;g&period;&comma; Dear Valued Customer&sol;Member&rpar; and closures &lpar;e&period;g&period;&comma; Best Regards&comma; Sincerely&comma; Thank you&rpar; to make a positive first impression and familiar appearance&period; Regardless of the approach used by scammers&comma; the e-mails always show institutional affiliations&period; The authors have to enhance fundamental attributions to encourage recipients to comply with the e-mails’ request for action &lpar;Gilbert &amp&semi; Malone&comma; 1995&rpar;&period; R<&sol;p>&NewLine;&NewLine;&NewLine;<h2>Results<&sol;h2>&NewLine;&NewLine;&NewLine;<p><strong>Table 1<&sol;strong> identifies the triggers that were used in phishing mails&period;The top three triggers used by scammers were&colon; alert&comma; warning&comma; attention &lpar;18&percnt;&rpar;&semi; account verification &lpar;18&percnt;&rpar;&semi; and invalid login attempts &lpar;17&percnt;&rpar;&period; Phishers often use triggers that catch the reader’s attention and immediately cause a sense of fear&period; For example&comma; senders of fraudulent e-mails will include subject lines such as &OpenCurlyDoubleQuote;NOTIFICATION OF LIMITED ACCOUNT ACCESS” or &OpenCurlyDoubleQuote;Attention Your Account Has Been Violated&excl;” to strike immediate fear in the reader&period; The &OpenCurlyDoubleQuote;others” category is made up of triggers such as policy violation&comma; purchase cancellation&comma; reward offer&comma; complete survey&comma; leave feedback&comma; and auction response&period; Due to the low frequency of occurrences these categories were grouped into one category for better analysis&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Table 1&period;<br>Triggers used in phishing e-mails &lpar;N &equals; 100&rpar;&period;<br>Triggers &percnt;<br>Security upgrade&sol;update of account 13&percnt;<br>General &lpar;unspecified&rpar; upgrade&sol;update of account 6&percnt;<br>Alert&comma; warning&comma; attention 18&percnt;<br>Account verification 18&percnt;<br>Account suspension&sol;disabled&sol;frozen 8&percnt;<br>Purchase confirmation 8&percnt;<br>Invalid login attempts 17&percnt;<br>Identity verification 5&percnt;<br>Other 7&percnt;<br>Total 100&percnt;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Scammers also use urgent statements to persuade readers to reply quickly to their e-mails&period; Table 2 portrays that 71&percnt; of the phishing e-mails expressed urgent statements&period; For example&comma; senders will include statements like &OpenCurlyDoubleQuote;you have to log-in within 48 hours after receiving this notice to re-update your Internet banking account for urgent review&comma;” &OpenCurlyDoubleQuote;You have 3 days to confirm account information or your account will be locked&comma;” and &OpenCurlyDoubleQuote;You have 24 hours to click on the link below and confirm your PayPal personal information&comma; otherwise your ATM Debit&sol; Credit Card access will become restricted&period;” Other words like &OpenCurlyDoubleQuote;ASAP”&comma; &OpenCurlyDoubleQuote;account suspension”&comma; &OpenCurlyDoubleQuote;account deleted”&comma; &OpenCurlyDoubleQuote;new message waiting”&comma; and &OpenCurlyDoubleQuote;new bill” are used sometimes followed by multiple exclamation points to instill a sense of urgency in the recipient&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Table 2<&sol;strong> also shows that fear&sol;threat is used in 41&percnt; of the phishing e-mails&period; Using fear&sol;threat allows the phishers to demand readers to respond&comma; for fear that not responding in a timely manner will result in unwanted consequences&period; For example&comma; senders will use phrases such as &OpenCurlyDoubleQuote;failure to verify account will lead to account suspension&comma;” &OpenCurlyDoubleQuote;your account has been limited&comma;” and &OpenCurlyDoubleQuote;due to an unusual number of login attempts&comma; we had to believe that&comma; there might be some security problem on your account&period;” Senders will often inform the users of why they have received the messages&comma; command the users to take proper action and threaten them with unwanted consequences if they do not comply immediately&period; This logical sequence is consistent with the notions of conformity&comma; compliance&comma; and obedience &lpar;Huang &amp&semi; Brockman&comma; 2011&rpar;&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Polite statements are often used in phishing e-mails as a way to build a friendly relationship between the phisher and the potential victim&period; Seventy-four percent of the phishing e-mails used polite statements&period; Sometimes&comma; social engineers use friendly salutations &lpar;e&period;g&period;&comma; Dear Valued Customer&sol;Member&rpar; and closures &lpar;e&period;g&period;&comma; Best Regards&comma; Sincerely&comma; Thank you&rpar; to make a positive first impression and familiar appearance&period; Scammers will sometimes use formality in their e-mails to make the reader feel safe&period; Of the e-mails analyzed&comma; 55&percnt; used formality to attempt to establish a trusting relationship with the reader&period; Phishing e-mails will often use confidential statements or the use of safeguards to ensure the reader that no one else will be able to see the information except for the &OpenCurlyDoubleQuote;trusted entity”&period; For example&comma; senders often include statements like &OpenCurlyDoubleQuote;it may contain confidential or sensitive information” or &OpenCurlyDoubleQuote;Unauthorized recipients are requested to preserve this confidentiality”&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Table 2&period;<&sol;strong><br>Persuasions used in phishing e-mails &lpar;N &equals; 100&rpar;&period;<br>Types of Persuasions &percnt; Yes<br>Authority 100&percnt;<br>Urgency 71&percnt;<br>Fear&sol;Threat 41&percnt;<br>Politeness 74&percnt;<br>Formality 55&percnt;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Table 3<&sol;strong> details the average number of persuasions used across the triggers types in phishing e-mails&period; The triggers with the greatest mean number of persuasions utilized included&colon; account suspension&comma; disabled&comma; or frozen &lpar;4&period;50&rpar;&semi; invalid login attempts &lpar;4&period;18&rpar;&semi; and identity verification &lpar;3&period;80&rpar;&period; The grand mean suggests that scammers have used 3 or 4 persuasions on average per phishing e-mail&period; Further analyses were conducted to examine the average number of persuasions used per e-mail by financial institutions&period; The three greatest means were found in PayPal &lpar;3&period;75&rpar;&comma; Bank of America &lpar;3&period;75&rpar;&comma; and Abbey Bank &lpar;3&period;70&rpar;&period; An ANOVA test was administered to test differences of group means amongst institutions&comma; the results showed no statistical significance&period; Results suggest that the average number of persuasions used by phishers did not differ by the financial targets that they had chosen&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Table 3&period;<&sol;strong><br>Number of persuasions used in phishing e-mails by trigger types &lpar;N &equals;<br>100&rpar;&period;<br>Triggers Mean number of<br>persuasions used<br>Security upgrade&sol;update of account 3&period;54<br>General upgrade&sol;update of account 2&period;83<br>Alert&comma; warning&comma; attention 3&period;44<br>Account verification 3&period;56<br>Account suspension&sol;disabled&sol;frozen 4&period;50<br>Purchase confirmation 2&period;75<br>Invalid login attempts 4&period;18<br>Identity verification 3&period;80<br>Other 3&period;14<br>Grand mean 3&period;59<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Table 4<&sol;strong> displays incentives used in the advance-fee fraud e-mails&period; As the data show&comma; fraudsters use Nigeria 419 funds &lpar;46&percnt;&rpar; and business proposals &lpar;41&percnt;&rpar; most often&period; Unlike phishing e-mails&comma; advance-fee e-mails use direct incentives such as large sums of money&comma; work-from-home jobs&comma; and business opportunities to attract the attention of recipients&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Table 4&period;<&sol;strong><br>Triggers used in advance-fee e-mails &lpar;N &equals; 100&rpar;&period;<br>Incentives &percnt;<br>Nigeria 419 funds 46&percnt;<br>Lottery winning 6&percnt;<br>Work from home 2&percnt;<br>Job offer 4&percnt;<br>Business proposal 41&percnt;<br>Payment approval 1&percnt;<br>Total 100&percnt;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Table 5<&sol;strong> exemplifies the persuasions used in the 100 advance-fee e-mails collected for this study&period; Just as phishing emails use authority to create an image of legitimate entity&comma; advance-fee e-mails also use authority as a way to develop legitimacy&period; However&comma; persuasions are used more elaborately in advance-fee fraud e-mails&period; Social engineers attempt to explain the nature and source of the funds in detail in order to convince the reader that the offer is legitimate&period; As shown in the collected mails&comma; social engineers pretend to be executives of corporations&comma; attorneys&comma; retired FBI officials&comma; and doctors in order to further their credibility&period; Eighty-four percent of the advance-fee e-mails used authority to persuade readers to fall for the scam&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Table 5&period;<&sol;strong><br>Persuasions used in advance-fee e-mails &lpar;N &equals; 100&rpar;&period;<br>Types of Persuasions &percnt; Yes<br>Authority 84&percnt;<br>Urgency 70&percnt;<br>Tradition 28&percnt;<br>Attraction&sol;Excitement 94&percnt;<br>Pity 31&percnt;<br>Politeness 78&percnt;<br>Formality 24&percnt;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Urgent responses are critical for advance-fee fraudsters to scam their readers&period; If readers do not reply quickly&comma; scammers run the risk of being caught and shut down&period; Of the e-mails reviewed 70&percnt; expressed urgent statements&period; Urgent responses used in advance-fee fraud e-mail are similar to those used in phishing e-mails&period; For example&comma; social engineers will add statements like &OpenCurlyDoubleQuote;Please I want you to quickly help me out of this bad situation because my life is not safe here&comma;” and closing statements such as &OpenCurlyDoubleQuote;waiting with thanks”&period; This sometimes entices the reader to hurry and respond because they believe someone’s life is in danger <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Tradition is sometimes used in advance-fee e-mails to trigger an emotional response from the reader&period; Readers will sometimes respond to fraudulent e-mails in hopes that they can help a person&comma; family&comma; or organization in need&period; Social engineers often use tradition along with pity&comma; using statements such as &OpenCurlyDoubleQuote;My late husband who was a contractor with Zimbabwan government on commercial farming was assassinated with my only son by the Zimbabwan rebel troop&comma;” &OpenCurlyDoubleQuote;I am contacting you because of my inheritance fund that my late mother deposited in the famous banks in Cote d’Ivoire”&comma; and &OpenCurlyDoubleQuote;because of the war my late father sold his shipping company and took me to a nearby country Cote d’Ivoire&period;” Of the advance-fee fraud e-mails coded one of the most commonly used persuasions by social engineers in advance-fee fraud e-mails is attraction&sol;excitement&period; Attraction&sol; excitement is used in advance-fee e-mails to make readers believe that they have just won a large sum of money or the opportunity to make a large sum of money by doing little or nothing in order to attain it&period; Ninety-four percent of all advance-fee e-mails tested used attraction&sol;excitement&period; Social engineers often mention large sums of money to immediately cause a sense of excitement to the reader&period; Offers like &OpenCurlyDoubleQuote;I was assigned by two of my colleagues to seek for a foreign partner who will assist us in the transfer of US &dollar;27&comma;500&comma;000&period;00&comma;” and &OpenCurlyDoubleQuote;If your company acts as the beneficiary of this fund 35&percnt; of the total sum will be for you for providing the account”&period; Another way attraction&sol; excitement is used is through the use of &OpenCurlyDoubleQuote;lottery winnings”&period; Social engineers will use greetings such as &OpenCurlyDoubleQuote;Attention lucky winner” and then go on to state &OpenCurlyDoubleQuote;We are pleased to notify you the &OpenCurlyQuote;winner’ of our Internet lottery draws&period;” The reader will then be instructed to give over confidential information in order to receive the large sum of money&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Pity&comma; another persuasive element employed by social engineers&comma; is sometimes used in advance-fee e-mails to trigger a sympathetic feeling from the reader&period; Thirty-one percent of the e-mails analyzed used pity as a way to obtain confidential information from the reader&period; Social engineers will fabricate stories of the death of loved ones or concerns of personal safety&sol; health for help&period; Pity along with tradition is used to dramatize their story and make readers feel sympathetic&period; Examples of pity include &OpenCurlyDoubleQuote;I honorably inherited from my late father Mr&period; D&period; Mummar&comma; who the Empigigo rebels killed recently in a political crisis in our country that resulted in war” and &OpenCurlyDoubleQuote;the above sum belongs to our deceased father who died along with his entire family in the Benin plane crash 2003&period;” <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Another persuasive element often used in advance-fee emails is politeness&period; Using polite statements allows the scammer to build a friendly relationship with the reader in hopes that the reader will reveal important information&period; Seventy-eight percent of the e-mails coded used politeness&period; Social engineers use friendly salutations and closings to make the reader feel as if there is a connection between him&sol;her and the author of the e-mail often including text such as &OpenCurlyDoubleQuote;Thanks for your greatest kindness&comma;” &OpenCurlyDoubleQuote;Thanks and god bless you and your family&comma;” and &OpenCurlyDoubleQuote;Please help me get out of this situation and our almighty will bless you&period;”<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Lastly&comma; it is important for the author of advance-fee e-mails to make the reader feel that the e-mails are safe and any information given by the reader will be used for only purposes stated in the e-mail&period; The use of formality is used in 24&percnt; of the tested e-mails&period; Statements of security and confidentiality include &OpenCurlyDoubleQuote;I wish for the utmost confidentiality in handling this transaction” and &OpenCurlyDoubleQuote;I assure you that this transaction is completely safe and legal&period;” <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Table 6<&sol;strong> describes the mean number of persuasions used by trigger types&period; The largest mean numbers of persuasions used by scammers can be found in business proposal &lpar;4&period;41&rpar;&comma; Nigeria 419 funds &lpar;4&period;11&rpar;&comma; and work from home opportunities &lpar;4&period;00&rpar;&period; Overall&comma; scammers used an average of 4 persuasions per e-mail&period; Among the mean differences of trigger types&comma; the ANOVA test revealed a significance level of &period;028&period; It is suggested that business proposal&comma; Nigeria 419 funds&comma; and work at home involve a significantly greater number of persuasions used in advance-fee scams&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Table 6&period;<&sol;strong><br>Number of persuasions used in advance-fee e-mails by trigger types &lpar;N &equals;<br>100&rpar;&period;<br>Trigger Mean number of persuasions used<br>Nigeria 419 funds 4&period;11<br>Lottery winning 2&period;33<br>Work from home 4&period;00<br>Job offer 3&period;50<br>Business proposal 4&period;41<br>Payment approval 3&period;00<br>Grand mean 4&period;09<&sol;p>&NewLine;&NewLine;&NewLine;<h2> Discussion and Conclusion <&sol;h2>&NewLine;&NewLine;&NewLine;<p>The analysis and results revealed in the study underscores the importance of examining triggers and persuasive techniques used in social engineering attacks&period; The findings indicate that alert&sol;warning&sol;attention and account verification were the two primary triggers used to raise the attention of e-mail recipients&period; These phishing emails were typically followed by a threatening tone via urgency&period; In advance-fee fraud emails&comma; timing is a lesser concern&semi; potential monetary gain is the main trigger&period; Business proposals and large unclaimed funds were the two most common incentives used to lure victims&period; In both phishing and advance-fee emails&comma; authority and politeness were employed widely&period; It seems that social engineers intend to use the combination of these two persuasive techniques to increase the legitimacy of the e-mail and at the same time the sense of courtesy commonly seen in business practices&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>This study also discovered that social engineers have constructed statements in positive and negative manners to persuade readers to fall victim to their scams&period; Online fraudsters have used e-mails to tap into emotions such as excitement&comma; pity and fear to affect viewers&period; The use of authoritative and oftentimes emotional persuasions has caused readers to drop their guards against potential risks&period; The study showed that politeness and formality were used frequently as a way to make the reader feel comfortable and secure in responding to the e-mail&period; By exploiting human weaknesses&comma; social engineers have strategized and carried out emotional attacks on innocent people&period; As social engineers continue to get better at attacks through deceptive persuasions&comma; potential victims need to prepare themselves for counter attacks at any given time&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Social engineering attacks are easy to commit and very difficult to defend against because they focus on the human factors&period; Since most people are usually helpful in attitude and tend to believe that this type of attack will not happen to them&comma; they are often fooled without even knowing they have been a victim of an online fraud&period; The natural human tendency to take people at their word continues to leave users vulnerable to social engineering attacks&period; Ultimately&comma; the best way to defend against social engineering attacks is through education&period; This can be accomplished by training users to be aware of the value of the information resources at their disposal as well as by creating awareness of human hacking techniques&comma; which makes it easier for users to detect a social engineer&period; Education has been a strategy used by governments and businesses to prevent online fraudulent acts&period; Efforts have been made by organizations to raise awareness of social engineering through speeches&comma; pamphlets&comma; web pages&comma; and the delivery of security messages in e-mails sent to users &lpar;Huang &amp&semi; Brockman&comma; 2011&rpar;&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Cautions have also been raised concerning the psychological effects that educational campaigns may have on users &lpar;Bardzell&comma; Blevis&comma; &amp&semi; Lim&comma; 2007&semi; Emigh&comma; 2007&semi; Mann&comma; 2008&rpar;&period; Looking at it from a customer’s viewpoint&comma; banks have been perceived as security providers who are assumed to offer protection advice and warnings to users&period; According to Mann &lpar;2008&rpar;&comma; although the strategy used has good intentions&comma; when a user receives new communications from the bank about security updates&comma; he&sol;she has been pre-programmed to follow the instructions or visit the suggested link&period; Since ordinary users feel ignorant when it comes to IT&comma; they know they must follow the instructions of the experts&period; Users will often follow their emotions and what is familiar to them to make their decisions on what to do&comma; usually ignoring security threats&comma; faulty traps&comma; or future financial losses they are facing&period; Expecting users to be able to distinguish between a fraudulent e-mail and a legitimate e-mail and not to follow the instructions in the former is an unattainable expectation &lpar;Emigh&comma; 2007&rpar;&period; <&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>It is very unlikely that advance-fee fraud and phishing e-mails will ever be completely eliminated&period; The creation of anti-spam laws such as the CAN-SPAM Act of 2003 in the United States and international directives by the European Union have had little impact on the volume of e-mails sent out daily &lpar;Wall&comma; 2004&rpar;&period; There is also no easy way to identify the fraudsters responsible for these messages due to the use of spoofing and software that conceal an individual’s location&period; Thus&comma; it is difficult for law enforcement agencies to effectively deal with fraudulent e-mails<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>These challenges have led to a greater reliance on technological defenses developed by private sectors to combat social engineering attacks&period; Microsoft and other computer companies have embodied phishing filters&comma; security firewalls&comma; and e-mail authentication devices in their online application software as frontline barriers &lpar;Brandt&comma; 2006&semi; Kornblum&comma; 2006&rpar;&period; These providers are adaptive to the competitive environment and have the technical expertise to better control and monitor the flow of e-mail communications&period; Their supporting role in fighting online frauds has complemented many aspects of police efforts in crime prevention&period; As to ordinary citizens&comma; preventative strategies remain the most practical and useful ones &lpar;Musgrove&comma; 2005&rpar;&period; These include never providing account information in response to a solicitation e-mail&comma; constantly changing passwords&comma; typing or copying URL addresses from legitimate sources instead of following a hyperlink embedded in an e-mail&comma; and calling the financial institution directly when suspicions arise from an e-mail&period; Overall&comma; a basic understanding of the operations of social engineering attacks coupled with constant skepticism will reduce chances of victimization of such attacks&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>It is understandable that no easy solutions can be identified to prevent online fraud from occurring&period; Nonetheless&comma; more legislative efforts in the area of online fraud and computer crimes&comma; in general&comma; are needed&period; By this it is meant that there must be adequate statutes addressing the various computer crimes and their punishment&comma; and consistent rulings from the courts as to how the law can be applied to crimes online&period; Although governmental agencies are dedicating more staff and resources to the investigation and prosecution of computer crimes&comma; many legal scholars question whether the legal system will be able to handle hightechnology crimes in the future&period; In many areas it seems that technology changes faster than the laws themselves&period; As soon as a statute has been enacted to regulate an activity&comma; the technology may change and the statute becomes either obsolete or no longer covers all possible activities&period; Therefore&comma; education remains the most effective approach to prevent online frauds&period; Social scientists should continue th<&sol;p>&NewLine;

Advance-Fee ScamPhishingSocial EngineeringSocial Scams