References (67)
References
Ajayi, Temitope Michael. 2022. “Discursive-manipulative strategies in scam emails and SMS: The Nigerian perspective.” Lodz Papers in Pragmatics 18(1): 175–195. Google Scholar logo with link to Google Scholar
Aleroud, Ahmed, and Lina Zhou. 2017. “Phishing environments, techniques, and countermeasures: A survey.” Computers & Security 681: 160–196. Google Scholar logo with link to Google Scholar
Alkhalil, Zainab, Chaminda Hewage, Liqaa Nawaf, and Imtiaz Khan. 2021. “Phishing attacks: A recent comprehensive study and a new anatomy.” Frontiers in Computer Science 31, 563060. Google Scholar logo with link to Google Scholar
Almomani, Ammar, Brij B. Gupta, Samer Atawneh, Andrew Meulenberg, and Eman Almomani. 2013. “A survey of phishing email filtering techniques.” IEEE Communications Surveys & Tutorials 15(4): 2070–2090. Google Scholar logo with link to Google Scholar
Anafo, Comfort, and Richmond S. Ngula. 2020. “On the grammar of scam: transitivity, manipulation and deception in scam emails.” Word 66(1): 16–39. Google Scholar logo with link to Google Scholar
Bernal, Miriam Jiménez, and Simone Belli. 2013. “Virtual ethnography and spam: Fraud and fear in deceptive narratives on the Internet.” In Investigar la Comunicación hoy. Revisión de políticas científicas y aportaciones metodológicas: Simposio Internacional sobre Política Científica en Comunicación [International Symposium on Scientific Policy in Communication: Examining Current Research, Policy Reviews, and Methodological Advances], 205–217. Facultad de Ciencias Sociales, Juridicas y de la Comunicación.Google Scholar logo with link to Google Scholar
Blanzieri, Enrico, and Anton Bryl. 2008. “A survey of learning-based techniques of email spam filtering.” Artificial Intelligence Review 29(1): 63–92. Google Scholar logo with link to Google Scholar
Blommaert, Jan, and Tope Omoniyi. 2006. “Email fraud: Language, technology, and the indexicals of globalisation.” Social Semiotics 16(4): 573–605. Google Scholar logo with link to Google Scholar
Blunden, Hayley, and Andrew Brodsky. 2021. “Beyond the emoticon: Are there unintentional cues of emotion in email?Personality and Social Psychology Bulletin 47(4): 565–579. Google Scholar logo with link to Google Scholar
Bourne, Paul Andrew, Chad Chambers, Damion K. Blake, Charlene Sharpe-Pryce, and Ikhalfani Solan. 2013. “Lottery scam in a third-world nation: the economics of a financial crime and its breadth.” Asian Journal of Business Management 5(1): 19–51. Google Scholar logo with link to Google Scholar
Carter, Elisabeth. 2015. “The anatomy of written scam communications: An empirical analysis.” Crime, Media, Culture 11(2): 89–103. Google Scholar logo with link to Google Scholar
Chawki, Mohamed. 2009. “Nigeria tackles advance fee fraud.” Journal of information, Law and Technology 1(1): 1–20.Google Scholar logo with link to Google Scholar
Chiluwa, Innocent. 2009. “The discourse of digital deceptions and ‘419’ emails.” Discourse Studies 11(6): 635–660. Google Scholar logo with link to Google Scholar
. 2019. “‘Congratulations, your email account has won you €1,000,000’: analyzing the discourse structures of scam emails.” In The Palgrave Handbook of Deceptive Communication, ed. by Tony Docan-Morgan, 897–912. Cham: Palgrave Macmillan. Google Scholar logo with link to Google Scholar
Cukier, Wendy L., Eva J. Nesselroth, and Susan Cody. 2007. “Genre, narrative and the ‘Nigerian Letter’ in electronic mail.” Paper presented at 40th Annual Hawaii International Conference on System Sciences (HICSS’07). Waikoloa, HI, USA, 3–6 January 2007.
Daintith, John, and Edmund Wright (eds.). 2008. A Dictionary of Computing (6th edn.). Oxford: Oxford University Press. Google Scholar logo with link to Google Scholar
Dirwan, Dirwan, and Fitriani Latief. 2023. “Understanding the psychology behind consumer behavior.” Advances in Business & Industrial Marketing Research 1(3): 130–145. Google Scholar logo with link to Google Scholar
Dutt, Bindiya. 2023. “Wellbeing amid digital risks: implications of digital risks, threats, and scams on users’ wellbeing.” Media and Communication 11(2): 355–366. Google Scholar logo with link to Google Scholar
Febriyani, Widia, Dhiya Fathia, Adityas Widjajarto, and Muharman Lubis. 2023. “Security awareness strategy for phishing email scams: A case study of a company in Singapore.” JOIV: International Journal on Informatics Visualization 7(3): 808–814. Google Scholar logo with link to Google Scholar
Fischer, Peter, Eva Jonas, Dieter Frey, and Stefan Schulz-Hardt. 2005. “Selective exposure to information: The impact of information limits.” European Journal of Social Psychology 35(4): 469–492. Google Scholar logo with link to Google Scholar
Fransen, Marieke L., Edith G. Smit, and Peeter W. J. Verlegh. 2015. “Strategies and motives for resistance to persuasion: An integrative framework.” Frontiers in Psychology 61, 1201. Google Scholar logo with link to Google Scholar
Fredericks, Paul, and Matthew Rowe. 2016. “Charity fraud.” In Fraud, ed. by Alan Doig, 215–233. New York: Routledge.Google Scholar logo with link to Google Scholar
Freiermuth, Mark R. 2011. “Text, lies and electronic bait: An analysis of email fraud and the decisions of the unsuspecting.” Discourse & Communication 5(2): 123–145. Google Scholar logo with link to Google Scholar
Genc, Yegin, Harpreet Kour, Hasan T. Arslan, and Li-Chiou Chen. 2021. “Understanding Nigerian e-mail scams: A computational content analysis approach.” Information Security Journal: A Global Perspective 30(2): 88–99. Google Scholar logo with link to Google Scholar
Goldenberg, Amit, and James J. Gross. 2020. “Digital emotion contagion.” Trends in Cognitive Sciences 24(4): 316–328. Google Scholar logo with link to Google Scholar
Hatfield, Elaine, John T. Cacioppo, and Richard L. Rapson. 1993. “Emotional contagion.” Current Directions in Psychological Science 2(3): 96–100. Google Scholar logo with link to Google Scholar
Holt, Thomas J., and Danielle C. Graves. 2007. “A qualitative analysis of advance fee fraud e-mail schemes.” International Journal of Cyber Criminology 1(1): 137–154.Google Scholar logo with link to Google Scholar
Hornik, Jacob, Rinat Shaanan Satchi, Ludovica Cesareo, and Alberto Pastore. 2015. “Information dissemination via electronic word-of-mouth: Good news travels fast, bad news travels faster!Computers in Human Behavior 451: 273–280. Google Scholar logo with link to Google Scholar
Jayatilaka, Asangi, Nalin Asanka Gamagedara Arachchilage, and Muhammad Ali Babar. 2021. “Falling for phishing: An empirical investigation into people’s email response behaviors.” Paper presented at the 42nd International Conference on Information Systems (ICIS’21). Austin, Texas, USA, 12–15 December 2021. [URL]Google Scholar logo with link to Google Scholar
Jonas, Eva, Verena Graupmann, and Dieter Frey. 2006. “The influence of mood on the search for supporting versus conflicting information: Dissonance reduction as a means of mood regulation?Personality and Social Psychology Bulletin 32(1): 3–15. Google Scholar logo with link to Google Scholar
Karamagi, Robert. 2022. “A review of factors affecting the effectiveness of phishing.” Computer and Information Science 15(1): 1–32.Google Scholar logo with link to Google Scholar
Karim, Asif, Sami Azam, Bharanidharan Shanmugam, Krishnan Kannoorpatti, and Mamoun Alazab. 2019. “A comprehensive survey for intelligent spam email detection.” IEEE Access 71: 168261–168295. Google Scholar logo with link to Google Scholar
Keil, Mark, and Roy D. Johnson. 2002. “Feedback channels: Using social presence theory to compare voice mail to e-mail.” Journal of Information Systems Education 13(4): 295–303.Google Scholar logo with link to Google Scholar
Kensinger, Elizabeth A., and Jaclyn H. Ford. 2020. “Retrieval of emotional events from memory.” Annual Review of Psychology 71(1): 251–272. Google Scholar logo with link to Google Scholar
Khan, Wazir Zada, Muhammad Khurram Khan, Fahad T. Bin Muhaya, Mohammed Y. Aalsalem, and Han-Chieh Chao. 2015. “A comprehensive study of email spam botnet detection.” IEEE Communications Surveys & Tutorials 17(4): 2271–2295. Google Scholar logo with link to Google Scholar
Korpela, Karina. 2015. “Improving cyber security awareness and training programs with data analytics.” Information Security Journal: A Global Perspective 24(1–3): 72–77. Google Scholar logo with link to Google Scholar
Kwak, Youngsun, Seyoung Lee, Amanda Damiano, and Arun Vishwanath. 2020. “Why do users not report spear phishing emails?Telematics and Informatics 481: 101343. Google Scholar logo with link to Google Scholar
Lerner, Jennifer S., Ye Li, Piercarlo Valdesolo, and Karim S. Kassam. 2015. “Emotion and decision making.” Annual Review of Psychology 66(1): 799–823. Google Scholar logo with link to Google Scholar
Levy, Nadine. 2016. “Emotional landscapes; discomfort in the field.” Qualitative Research Journal 16(1): 39–50. Google Scholar logo with link to Google Scholar
Metzger, Miriam J., Andrew J. Flanagin, and Ryan B. Medders. 2010. “Social and heuristic approaches to credibility evaluation online.” Journal of Communication 60(3): 413–439. Google Scholar logo with link to Google Scholar
Morris, Michael W., and Dacher Keltner. 2000. “How emotions work: The social functions of emotional expression in negotiations.” Research in Organizational Behavior 221: 1–50. Google Scholar logo with link to Google Scholar
Nadeem, Muhammad, Syeda Wajiha Zahra, Muhammad Nouman Abbasi, Ali Arshad, Saman Riaz, and Waqas Ahmed. 2023. “Phishing attack, its detections and prevention techniques.” International Journal of Wireless Security and Networks 1(2): 13–25.Google Scholar logo with link to Google Scholar
Naqvi, Bilal, Kseniia Perova, Ali Farooq, Imran Makhdoom, Shola Oyedeji, and Jari Porras. 2023. “Mitigation strategies against the phishing attacks: A systematic literature review.” Computers & Security 1321, 103387. Google Scholar logo with link to Google Scholar
Naylor, R. Thomas. 2007. “The alchemy of fraud: Investment scams in the precious-metals mining business.” Crime, Law and Social Change 471: 89–120. Google Scholar logo with link to Google Scholar
Norris, Gareth, and Alexandra Brookes. 2021. “Personality, emotion, and individual differences in response to online fraud.” Personality and Individual Differences 1691, 109847. Google Scholar logo with link to Google Scholar
Parsons, Kathryn, Marcus Butavicius, Paul Delfabbro, and Meredith Lillie. 2019. “Predicting susceptibility to social influence in phishing emails.” International Journal of Human-Computer Studies 1281: 17–26. Google Scholar logo with link to Google Scholar
Pellegrino, Alfonso, Masato Abe, and Randall Shannon. 2022. “The dark side of social media: Content effects on the relationship between materialism and consumption behaviors.” Frontiers in Psychology 131, 870614. Google Scholar logo with link to Google Scholar
Robinson, David L. 2008. “Brain function, emotional experience and personality.” Netherlands Journal of Psychology 641: 152–168. Google Scholar logo with link to Google Scholar
Safaei Pour, Morteza, Christelle Nader, Kurt Friday, and Elias Bou-Harb. 2023. “A comprehensive survey of recent internet measurement techniques for cyber security.” Computers & Security 1281, 103123. Google Scholar logo with link to Google Scholar
Safi, Asadullah, and Satwinder Singh. 2023. “A systematic literature review on phishing website detection techniques.” Journal of King Saud University Computer and Information Sciences 35(2): 590–611. Google Scholar logo with link to Google Scholar
Serna-Zuluaga, Juan Camilo, David Juárez-Varón, Ana Mengual-Recuerda, and Ana Medina-López. 2024. “Analysis of the influence of emotions on the decision-making of entrepreneurs using neurotechnologies.” International Entrepreneurship and Management Journal 201: 2169–2186. Google Scholar logo with link to Google Scholar
Shadel, Doug, and Karla Blair Schweitzer Pak. 2007. “The psychology of consumer fraud.” PhD dissertation, Universiteit van Tilburg.
Shaw, Philip. 2008. “Purpose and other paradigmatic similarities as criteria for genre analysis: The case of ‘419 scam’ emails.” In Genre Variation in Business Letters, ed. by Paul Gillaerts, and Maurizio Gotti, 257–280. Bern: Peter Lang.Google Scholar logo with link to Google Scholar
Shichor, David, Jeffrey Doocy, and Gilbert Geis. 1996. “Anger, disappointment, and disgust: Reactions of victims of a telephone investment scam.” In International Victimology: Selected Papers From the 8th International Symposium, ed. by Chris Sumner, Mark Israel, Michael O’Connell, and Rick Sarre, 105–112. Canberra: Australian Institute of Criminology.Google Scholar logo with link to Google Scholar
Silic, Mario, and Andrea Back. 2016. “The dark side of social networking sites: Understanding phishing risks.” Computers in Human Behavior 601: 35–43. Google Scholar logo with link to Google Scholar
Sillence, Elizabeth, Pam Briggs, Peter Harris, and Lesley Fishwick. 2006. “A framework for understanding trust factors in web-based health advice.” International Journal of Human-Computer Studies 64(8): 697–713. Google Scholar logo with link to Google Scholar
Sorell, Tom, and Monica Whitty. 2019. “Online romance scams and victimhood.” Security Journal 321: 342–361. Google Scholar logo with link to Google Scholar
Stojnic, Tatyana, Dinusha Vatsalan, and Nalin A. G. Arachchilage. 2021. “Phishing email strategies: Understanding cybercriminals’ strategies of crafting phishing emails.” Security and Privacy 4(5), e165. Google Scholar logo with link to Google Scholar
Tambe Ebot, Alain Claude, Mikko Siponen, and Volkan Topalli. 2024. “Towards a cybercontextual transmission model for online scamming.” European Journal of Information Systems 33(4): 571–596. Google Scholar logo with link to Google Scholar
Tseng, Ming-Yu. 2010. “The pragmatic act of fishing for personal details: From choice to performance.” Journal of Pragmatics 42(7): 1982–1996. Google Scholar logo with link to Google Scholar
Vilardo, Mark F. 2004. “Online impersonation in securities scams.” IEEE Security & Privacy 2(3): 82–85. Google Scholar logo with link to Google Scholar
Vishwanath, Arun, Brynne Harrison, and Yu Jie Ng. 2018. “Suspicion, cognition, and automaticity model of phishing susceptibility.” Communication Research 45(8): 1146–1166. Google Scholar logo with link to Google Scholar
Vishwanath, Arun, Tejaswini Herath, Rui Chen, Jingguo Wang, and H. Raghav Rao. 2011. “Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model.” Decision Support Systems 51(3): 576–586. Google Scholar logo with link to Google Scholar
Wash, Rick. 2020. “How experts detect phishing scam emails.” Proceedings of the ACM on Human-Computer Interaction 4(CSCW2): 1–28. Google Scholar logo with link to Google Scholar
Wiles, Rose, Graham Crow, Sue Heath, and Vikki Charles. 2008. “The management of confidentiality and anonymity in social research.” International Journal of Social Research Methodology 11(5): 417–428. Google Scholar logo with link to Google Scholar
Workman, Michael. 2008. “Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security.” Journal of the American Society for Information Science and Technology 59(4): 662–674. Google Scholar logo with link to Google Scholar
Zhou, Lina, Douglas P. Twitchell, Tiantian Qin, Judee K. Burgoon, and Jay F. Nunamaker. 2003. “An exploratory study into deception detection in text-based computer-mediated communication.” In Proceedings of the Thirty-Sixth Hawaii International Conference on System Sciences, 1–10. Los Alamitos, CA: IEEE Press. Google Scholar logo with link to Google Scholar
Mobile Menu Logo with link to supplementary files background Layer 1 prag Twitter_Logo_Blue