Article published In: Internet Pragmatics: Online-First Articles
“Your account has been compromised”
Exploring emotional triggers in scam emails
Available under the Creative Commons Attribution (CC BY) 4.0 license.
For any use beyond this license, please contact the publisher at rights@benjamins.nl.
Open Access publication of this article was funded through a Transformative Agreement with University of Reading.
Published online: 4 March 2026
https://doi.org/10.1075/ip.00135.mog
https://doi.org/10.1075/ip.00135.mog
Abstract
Scam emails pose a significant threat to online security,
exploiting individuals’ vulnerabilities through emotional manipulation. This
study explores emotional triggers in a corpus of scam emails
(n = 371) compiled from ten genuine email accounts over a
period of five years (2018–2023). Using Robinson, David L. 2008. “Brain
function, emotional experience and
personality.” Netherlands Journal of
Psychology 641: 152–168. taxonomy of basic emotions, the
positive and negative emotional content and triggers were identified and
analyzed. The findings reveal that an overwhelming majority of the emails allude
to negative emotions (n = 252), suggesting a clear scammer
strategy in stimulating negativity to achieve fraudulent objectives. Conversely,
the emails that evoke positive emotions (n = 119) seem to
create a false sense of trust, sociability and gratitude. In addition, many scam
emails employ various combinations of emotional triggers to manipulate
recipients. This study sheds light on the intersection between emotions and
discourse pragmatics and highlights the affective dimensions of discourse in
email communication.
Article outline
- 1.Introduction
- 2.Literature review
- 2.1Linguistic and discourse features of scam emails
- 2.2Emotional triggers in scam emails
- 3.Methodology
- 3.1Data
- 3.2Framework and data analysis
- 4.Findings
- 4.1Quantitative analysis of data: Negative and positive emotional triggers
- 4.2Combinations of emotional triggers
- 4.3Qualitative analysis of scam emails
- 5.Discussion
- 6.Implications and conclusions
References
References (67)
Ajayi, Temitope Michael. 2022. “Discursive-manipulative
strategies in scam emails and SMS: The Nigerian
perspective.” Lodz Papers in
Pragmatics 18(1): 175–195.
Aleroud, Ahmed, and Lina Zhou. 2017. “Phishing
environments, techniques, and countermeasures: A
survey.” Computers &
Security 681: 160–196.
Alkhalil, Zainab, Chaminda Hewage, Liqaa Nawaf, and Imtiaz Khan. 2021. “Phishing
attacks: A recent comprehensive study and a new
anatomy.” Frontiers in Computer
Science 31, 563060.
Almomani, Ammar, Brij B. Gupta, Samer Atawneh, Andrew Meulenberg, and Eman Almomani. 2013. “A
survey of phishing email filtering
techniques.” IEEE Communications Surveys
&
Tutorials 15(4): 2070–2090.
Anafo, Comfort, and Richmond S. Ngula. 2020. “On
the grammar of scam: transitivity, manipulation and deception in scam
emails.” Word 66(1): 16–39.
Bernal, Miriam Jiménez, and Simone Belli. 2013. “Virtual
ethnography and spam: Fraud and fear in deceptive narratives on the
Internet.” In Investigar la Comunicación hoy. Revisión de políticas
científicas y aportaciones metodológicas: Simposio Internacional sobre
Política Científica en Comunicación [International Symposium on Scientific Policy in Communication:
Examining Current Research, Policy Reviews, and Methodological
Advances], 205–217. Facultad de Ciencias Sociales, Juridicas y de la Comunicación.
Blanzieri, Enrico, and Anton Bryl. 2008. “A
survey of learning-based techniques of email spam
filtering.” Artificial Intelligence
Review 29(1): 63–92.
Blommaert, Jan, and Tope Omoniyi. 2006. “Email
fraud: Language, technology, and the indexicals of
globalisation.” Social
Semiotics 16(4): 573–605.
Blunden, Hayley, and Andrew Brodsky. 2021. “Beyond
the emoticon: Are there unintentional cues of emotion in
email?” Personality and Social Psychology
Bulletin 47(4): 565–579.
Bourne, Paul Andrew, Chad Chambers, Damion K. Blake, Charlene Sharpe-Pryce, and Ikhalfani Solan. 2013. “Lottery
scam in a third-world nation: the economics of a financial crime and its
breadth.” Asian Journal of Business
Management 5(1): 19–51.
Carter, Elisabeth. 2015. “The
anatomy of written scam communications: An empirical
analysis.” Crime, Media,
Culture 11(2): 89–103.
Chawki, Mohamed. 2009. “Nigeria
tackles advance fee fraud.” Journal of
information, Law and
Technology 1(1): 1–20.
Chiluwa, Innocent. 2009. “The
discourse of digital deceptions and ‘419’
emails.” Discourse
Studies 11(6): 635–660.
. 2019. “‘Congratulations,
your email account has won you €1,000,000’: analyzing the discourse
structures of scam
emails.” In The
Palgrave Handbook of Deceptive Communication, ed.
by Tony Docan-Morgan, 897–912. Cham: Palgrave Macmillan.
Cukier, Wendy L., Eva J. Nesselroth, and Susan Cody. 2007. “Genre,
narrative and the ‘Nigerian Letter’ in electronic
mail.” Paper presented
at 40th Annual Hawaii International Conference
on System Sciences (HICSS’07). Waikoloa, HI, USA, 3–6 January 2007.
Daintith, John, and Edmund Wright (eds.). 2008. A
Dictionary of Computing (6th
edn.). Oxford: Oxford University Press.
Dirwan, Dirwan, and Fitriani Latief. 2023. “Understanding
the psychology behind consumer
behavior.” Advances in Business &
Industrial Marketing
Research 1(3): 130–145.
Dutt, Bindiya. 2023. “Wellbeing
amid digital risks: implications of digital risks, threats, and scams on
users’ wellbeing.” Media and
Communication 11(2): 355–366.
Febriyani, Widia, Dhiya Fathia, Adityas Widjajarto, and Muharman Lubis. 2023. “Security
awareness strategy for phishing email scams: A case study of a company in
Singapore.” JOIV: International Journal on
Informatics
Visualization 7(3): 808–814.
Fischer, Peter, Eva Jonas, Dieter Frey, and Stefan Schulz-Hardt. 2005. “Selective
exposure to information: The impact of information
limits.” European Journal of Social
Psychology 35(4): 469–492.
Fransen, Marieke L., Edith G. Smit, and Peeter W. J. Verlegh. 2015. “Strategies
and motives for resistance to persuasion: An integrative
framework.” Frontiers in
Psychology 61, 1201.
Fredericks, Paul, and Matthew Rowe. 2016. “Charity
fraud.” In Fraud, ed.
by Alan Doig, 215–233. New York: Routledge.
Freiermuth, Mark R. 2011. “Text,
lies and electronic bait: An analysis of email fraud and the decisions of
the unsuspecting.” Discourse &
Communication 5(2): 123–145.
Genc, Yegin, Harpreet Kour, Hasan T. Arslan, and Li-Chiou Chen. 2021. “Understanding
Nigerian e-mail scams: A computational content analysis
approach.” Information Security Journal: A
Global
Perspective 30(2): 88–99.
Goldenberg, Amit, and James J. Gross. 2020. “Digital
emotion contagion.” Trends in Cognitive
Sciences 24(4): 316–328.
Hatfield, Elaine, John T. Cacioppo, and Richard L. Rapson. 1993. “Emotional
contagion.” Current Directions in
Psychological
Science 2(3): 96–100.
Holt, Thomas J., and Danielle C. Graves. 2007. “A
qualitative analysis of advance fee fraud e-mail
schemes.” International Journal of Cyber
Criminology 1(1): 137–154.
Hornik, Jacob, Rinat Shaanan Satchi, Ludovica Cesareo, and Alberto Pastore. 2015. “Information
dissemination via electronic word-of-mouth: Good news travels fast, bad news
travels faster!” Computers in Human
Behavior 451: 273–280.
Jayatilaka, Asangi, Nalin Asanka Gamagedara Arachchilage, and Muhammad Ali Babar. 2021. “Falling
for phishing: An empirical investigation into people’s email response
behaviors.” Paper presented at the 42nd International Conference on Information Systems (ICIS’21). Austin, Texas, USA, 12–15 December 2021. [URL]
Jonas, Eva, Verena Graupmann, and Dieter Frey. 2006. “The
influence of mood on the search for supporting versus conflicting
information: Dissonance reduction as a means of mood
regulation?” Personality and Social
Psychology
Bulletin 32(1): 3–15.
Karamagi, Robert. 2022. “A
review of factors affecting the effectiveness of
phishing.” Computer and Information
Science 15(1): 1–32.
Karim, Asif, Sami Azam, Bharanidharan Shanmugam, Krishnan Kannoorpatti, and Mamoun Alazab. 2019. “A
comprehensive survey for intelligent spam email
detection.” IEEE
Access 71: 168261–168295.
Keil, Mark, and Roy D. Johnson. 2002. “Feedback
channels: Using social presence theory to compare voice mail to
e-mail.” Journal of Information Systems
Education 13(4): 295–303.
Kensinger, Elizabeth A., and Jaclyn H. Ford. 2020. “Retrieval
of emotional events from memory.” Annual
Review of
Psychology 71(1): 251–272.
Khan, Wazir Zada, Muhammad Khurram Khan, Fahad T. Bin Muhaya, Mohammed Y. Aalsalem, and Han-Chieh Chao. 2015. “A
comprehensive study of email spam botnet
detection.” IEEE Communications Surveys &
Tutorials 17(4): 2271–2295.
Korpela, Karina. 2015. “Improving
cyber security awareness and training programs with data
analytics.” Information Security Journal: A
Global
Perspective 24(1–3): 72–77.
Kwak, Youngsun, Seyoung Lee, Amanda Damiano, and Arun Vishwanath. 2020. “Why
do users not report spear phishing
emails?” Telematics and
Informatics 481: 101343.
Lerner, Jennifer S., Ye Li, Piercarlo Valdesolo, and Karim S. Kassam. 2015. “Emotion
and decision making.” Annual Review of
Psychology 66(1): 799–823.
Levy, Nadine. 2016. “Emotional
landscapes; discomfort in the
field.” Qualitative Research
Journal 16(1): 39–50.
Metzger, Miriam J., Andrew J. Flanagin, and Ryan B. Medders. 2010. “Social
and heuristic approaches to credibility evaluation
online.” Journal of
Communication 60(3): 413–439.
Morris, Michael W., and Dacher Keltner. 2000. “How
emotions work: The social functions of emotional expression in
negotiations.” Research in Organizational
Behavior 221: 1–50.
Nadeem, Muhammad, Syeda Wajiha Zahra, Muhammad Nouman Abbasi, Ali Arshad, Saman Riaz, and Waqas Ahmed. 2023. “Phishing
attack, its detections and prevention
techniques.” International Journal of
Wireless Security and
Networks 1(2): 13–25.
Naqvi, Bilal, Kseniia Perova, Ali Farooq, Imran Makhdoom, Shola Oyedeji, and Jari Porras. 2023. “Mitigation
strategies against the phishing attacks: A systematic literature
review.” Computers &
Security 1321, 103387.
Naylor, R. Thomas. 2007. “The
alchemy of fraud: Investment scams in the precious-metals mining
business.” Crime, Law and Social
Change 471: 89–120.
Norris, Gareth, and Alexandra Brookes. 2021. “Personality,
emotion, and individual differences in response to online
fraud.” Personality and Individual
Differences 1691, 109847.
Parsons, Kathryn, Marcus Butavicius, Paul Delfabbro, and Meredith Lillie. 2019. “Predicting
susceptibility to social influence in phishing
emails.” International Journal of
Human-Computer
Studies 1281: 17–26.
Pellegrino, Alfonso, Masato Abe, and Randall Shannon. 2022. “The
dark side of social media: Content effects on the relationship between
materialism and consumption
behaviors.” Frontiers in
Psychology 131, 870614.
Robinson, David L. 2008. “Brain
function, emotional experience and
personality.” Netherlands Journal of
Psychology 641: 152–168.
Safaei Pour, Morteza, Christelle Nader, Kurt Friday, and Elias Bou-Harb. 2023. “A
comprehensive survey of recent internet measurement techniques for cyber
security.” Computers &
Security 1281, 103123.
Safi, Asadullah, and Satwinder Singh. 2023. “A
systematic literature review on phishing website detection
techniques.” Journal of King Saud University
Computer and Information
Sciences 35(2): 590–611.
Serna-Zuluaga, Juan Camilo, David Juárez-Varón, Ana Mengual-Recuerda, and Ana Medina-López. 2024. “Analysis
of the influence of emotions on the decision-making of entrepreneurs using
neurotechnologies.” International
Entrepreneurship and Management
Journal 201: 2169–2186.
Shadel, Doug, and Karla Blair Schweitzer Pak. 2007. “The
psychology of consumer fraud.” PhD
dissertation, Universiteit van Tilburg.
Shaw, Philip. 2008. “Purpose
and other paradigmatic similarities as criteria for genre analysis: The case
of ‘419 scam’
emails.” In Genre
Variation in Business Letters, ed.
by Paul Gillaerts, and Maurizio Gotti, 257–280. Bern: Peter Lang.
Shichor, David, Jeffrey Doocy, and Gilbert Geis. 1996. “Anger,
disappointment, and disgust: Reactions of victims of a telephone investment
scam.” In International
Victimology: Selected Papers From the 8th International
Symposium, ed. by Chris Sumner, Mark Israel, Michael O’Connell, and Rick Sarre, 105–112. Canberra: Australian Institute of Criminology.
Silic, Mario, and Andrea Back. 2016. “The
dark side of social networking sites: Understanding phishing
risks.” Computers in Human
Behavior 601: 35–43.
Sillence, Elizabeth, Pam Briggs, Peter Harris, and Lesley Fishwick. 2006. “A
framework for understanding trust factors in web-based health
advice.” International Journal of
Human-Computer
Studies 64(8): 697–713.
Sorell, Tom, and Monica Whitty. 2019. “Online
romance scams and victimhood.” Security
Journal 321: 342–361.
Stojnic, Tatyana, Dinusha Vatsalan, and Nalin A. G. Arachchilage. 2021. “Phishing
email strategies: Understanding cybercriminals’ strategies of crafting
phishing emails.” Security and
Privacy 4(5), e165.
Tambe Ebot, Alain Claude, Mikko Siponen, and Volkan Topalli. 2024. “Towards
a cybercontextual transmission model for online
scamming.” European Journal of Information
Systems 33(4): 571–596.
Tseng, Ming-Yu. 2010. “The
pragmatic act of fishing for personal details: From choice to
performance.” Journal of
Pragmatics 42(7): 1982–1996.
Vilardo, Mark F. 2004. “Online
impersonation in securities scams.” IEEE
Security &
Privacy 2(3): 82–85.
Vishwanath, Arun, Brynne Harrison, and Yu Jie Ng. 2018. “Suspicion,
cognition, and automaticity model of phishing
susceptibility.” Communication
Research 45(8): 1146–1166.
Vishwanath, Arun, Tejaswini Herath, Rui Chen, Jingguo Wang, and H. Raghav Rao. 2011. “Why
do people get phished? Testing individual differences in phishing
vulnerability within an integrated, information processing
model.” Decision Support
Systems 51(3): 576–586.
Wash, Rick. 2020. “How
experts detect phishing scam
emails.” Proceedings of the ACM on
Human-Computer
Interaction 4(CSCW2): 1–28.
Wiles, Rose, Graham Crow, Sue Heath, and Vikki Charles. 2008. “The
management of confidentiality and anonymity in social
research.” International Journal of Social
Research
Methodology 11(5): 417–428.
Workman, Michael. 2008. “Wisecrackers:
A theory-grounded investigation of phishing and pretext social engineering
threats to information security.” Journal of
the American Society for Information Science and
Technology 59(4): 662–674.
Zhou, Lina, Douglas P. Twitchell, Tiantian Qin, Judee K. Burgoon, and Jay F. Nunamaker. 2003. “An
exploratory study into deception detection in text-based computer-mediated
communication.” In Proceedings
of the Thirty-Sixth Hawaii International Conference on System
Sciences, 1–10. Los Alamitos, CA: IEEE Press.